Analysis

  • max time kernel
    34s
  • max time network
    41s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-06-2024 00:33

General

  • Target

    2024-06-25_7a2ec7f48de7045598e84d9a6c0d7917_ngrbot_poet-rat_snatch.exe

  • Size

    9.5MB

  • MD5

    7a2ec7f48de7045598e84d9a6c0d7917

  • SHA1

    aad1bf2653923b3ace31ea30a0a1550889be2c4b

  • SHA256

    5cf28d1b370198e76b06cf7859538feaf3cad073966e38f8573318e1b2259d2c

  • SHA512

    83f4a79badaac8e2b627f39d1dc98a5a515ed0fa090dd21b6f79b37560e33a0e0835e0b4211e2d51cb6184a0a99b08cb8406674abb8c9ad51709dcac4741aac9

  • SSDEEP

    98304:9V5Y4P6vQBpwXgOlx8UJEZMFzEMaMFQvpI3:WW6vQ8d8UJE+FgMKpI3

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-25_7a2ec7f48de7045598e84d9a6c0d7917_ngrbot_poet-rat_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-25_7a2ec7f48de7045598e84d9a6c0d7917_ngrbot_poet-rat_snatch.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2964
    • C:\Windows\system32\attrib.exe
      attrib +h +s C:\Users\Admin\AppData\Local\Temp\2024-06-25_7a2ec7f48de7045598e84d9a6c0d7917_ngrbot_poet-rat_snatch.exe
      2⤵
      • Views/modifies file attributes
      PID:4580
    • C:\Windows\System32\Wbem\wmic.exe
      wmic csproduct get UUID
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3676
    • C:\Windows\system32\attrib.exe
      attrib +h +s C:\Users\Admin\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe
      2⤵
      • Views/modifies file attributes
      PID:1284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe

    Filesize

    9.5MB

    MD5

    7a2ec7f48de7045598e84d9a6c0d7917

    SHA1

    aad1bf2653923b3ace31ea30a0a1550889be2c4b

    SHA256

    5cf28d1b370198e76b06cf7859538feaf3cad073966e38f8573318e1b2259d2c

    SHA512

    83f4a79badaac8e2b627f39d1dc98a5a515ed0fa090dd21b6f79b37560e33a0e0835e0b4211e2d51cb6184a0a99b08cb8406674abb8c9ad51709dcac4741aac9