Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/06/2024, 20:13

General

  • Target

    2024-06-28_82317fb2bbfdd8d5d288750e62faf9f4_poet-rat_snatch.exe

  • Size

    5.8MB

  • MD5

    82317fb2bbfdd8d5d288750e62faf9f4

  • SHA1

    50df50e998879b17a8641adadd21f6b4d78b0ef3

  • SHA256

    65df1e70bd11d1f1fd1c4ed46fda18c3cbaf346fa4cb99c4520794de9bee1c89

  • SHA512

    fb6e8ee0c2f2e26cbb55ccbc0e7b8b1cf9965534ba54c57b47622c78fdfe533d1873f8d5d22a4eb54f3d33794d76ad25536d9efe3e762a5ba4040d29289123bb

  • SSDEEP

    49152:vzlnEcO3Cgrb/TbvO90d7HjmAFd4A64nsfJa/pJMBMvDF/4q4auspdkgKKhdvZfv:63CE/Xx4LKhdk8ESp

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-28_82317fb2bbfdd8d5d288750e62faf9f4_poet-rat_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-28_82317fb2bbfdd8d5d288750e62faf9f4_poet-rat_snatch.exe"
    1⤵
    • Drops file in Program Files directory
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2888
    • C:\Windows\system32\schtasks.exe
      C:\Windows\system32\schtasks.exe /CREATE /XML C:\Users\Admin\AppData\Local\Temp\KwyODwmIuEjoJ /F /TN ChromeUpdateTaskMachinCore
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:4856
    • C:\Windows\System32\cmd.exe
      C:\Windows\System32\cmd.exe /c "C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1528
      • C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe
        "C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe"
        3⤵
        • Executes dropped EXE
        • Modifies system certificate store
        PID:4404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe

    Filesize

    5.8MB

    MD5

    0566ececa7ca44106bc02ed2f3d09575

    SHA1

    2561fcb899324e224abc1f5771216a6aa20840ee

    SHA256

    d3e515ff52f23978fa77fc028fb036907e08f262dcb7e506163053103c36966f

    SHA512

    13e558d89098136263f7c874cc4b504a4f19badd003efa8902f11eaebbbab9f25f5671853e6eb34e28eed353c23d84abb93c04ff3a1b9a0254cdff522dfd35d6

  • C:\Users\Admin\AppData\Local\Temp\KwyODwmIuEjoJ

    Filesize

    1KB

    MD5

    0a58ba177df953f3084bc1583cf132dd

    SHA1

    a3371fd4c80311df345b7ed31a929b20da7351c0

    SHA256

    b5a284684d0d1b3df6f5111758c74826b1e0c443b693b57a021d496119f3fc37

    SHA512

    de69907ad9d1511d0faab6ee82c646ba773abb81bc1e0c90bf48418c21fa917be94557e136279a1b5993b1a6410eca0669e822145832e868967875c23a4b2298