Malware Analysis Report

2024-10-19 09:40

Sample ID 240613-pmz4ssydmh
Target 2024-06-13_1dc4a8cb4cdc9f5f4be6919586709cd2_poet-rat_snatch_zxxz
SHA256 d73ca963c4e63658225cd9942a173a4d30ce072e311530cd6db5c7ab65dc91ae
Tags
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

d73ca963c4e63658225cd9942a173a4d30ce072e311530cd6db5c7ab65dc91ae

Threat Level: Known bad

The file 2024-06-13_1dc4a8cb4cdc9f5f4be6919586709cd2_poet-rat_snatch_zxxz was found to be: Known bad.

Malicious Activity Summary


Detects Windows executables referencing non-Windows User-Agents

Unsigned PE

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-13 12:27

Signatures

Detects Windows executables referencing non-Windows User-Agents

Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 12:27

Reported

2024-06-13 12:30

Platform

win7-20240221-en

Max time kernel

117s

Max time network

119s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2024-06-13_1dc4a8cb4cdc9f5f4be6919586709cd2_poet-rat_snatch_zxxz.exe"

Signatures

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2024-06-13_1dc4a8cb4cdc9f5f4be6919586709cd2_poet-rat_snatch_zxxz.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\2024-06-13_1dc4a8cb4cdc9f5f4be6919586709cd2_poet-rat_snatch_zxxz.exe

"C:\Users\Admin\AppData\Local\Temp\2024-06-13_1dc4a8cb4cdc9f5f4be6919586709cd2_poet-rat_snatch_zxxz.exe"

Network

N/A

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-13 12:27

Reported

2024-06-13 12:30

Platform

win10v2004-20240508-en

Max time kernel

51s

Max time network

58s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2024-06-13_1dc4a8cb4cdc9f5f4be6919586709cd2_poet-rat_snatch_zxxz.exe"

Signatures

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2024-06-13_1dc4a8cb4cdc9f5f4be6919586709cd2_poet-rat_snatch_zxxz.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\2024-06-13_1dc4a8cb4cdc9f5f4be6919586709cd2_poet-rat_snatch_zxxz.exe

"C:\Users\Admin\AppData\Local\Temp\2024-06-13_1dc4a8cb4cdc9f5f4be6919586709cd2_poet-rat_snatch_zxxz.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp

Files

N/A