Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    68s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/06/2024, 20:04

General

  • Target

    2024-06-30_a962d2f019c5b53b1a14f1c66a2bda49_poet-rat_snatch.exe

  • Size

    5.8MB

  • MD5

    a962d2f019c5b53b1a14f1c66a2bda49

  • SHA1

    94ccaff3fa4228d80774c3c4c4e0b993183d98b4

  • SHA256

    1bb6747636ab5a4ae0b3075d85e352c1734fec25b0641fc2595c30456197a233

  • SHA512

    b898133fbda588cfa0e272bdd5651c1c23bd9b43adb1a454dfac8fd792c0045b341e9262cd6a2ba0da85999a9229c57fb5b423e33b22cc7ae880a3e695d07816

  • SSDEEP

    49152:vzlnEcO3Cgrb/TbvO90d7HjmAFd4A64nsfJa/pJMBMvDF/4q4auspdkgKKhdvZfF:63CE/Xx4LKhdkYESp

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-30_a962d2f019c5b53b1a14f1c66a2bda49_poet-rat_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-30_a962d2f019c5b53b1a14f1c66a2bda49_poet-rat_snatch.exe"
    1⤵
    • Drops file in Program Files directory
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4336
    • C:\Windows\system32\schtasks.exe
      C:\Windows\system32\schtasks.exe /CREATE /XML C:\Users\Admin\AppData\Local\Temp\tQBwHlHO /F /TN ChromeUpdateTaskMachinCore
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:1676
    • C:\Windows\System32\cmd.exe
      C:\Windows\System32\cmd.exe /c "C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2240
      • C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe
        "C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe"
        3⤵
        • Executes dropped EXE
        • Modifies system certificate store
        PID:3404
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4136 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4912

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe

      Filesize

      5.8MB

      MD5

      cfa19c007951223c27d2b98eca133944

      SHA1

      c43f7773ca9a4a7507f322fbf9fee4a368674edf

      SHA256

      fff27e2cba02d7d846b5a654f7600282422141c6d481ea76a30629e4cf4ccfcc

      SHA512

      45c995eb5630f95f887cb5eb1e47a0d1b5aae76dcc74c0e6c21700256acb558f3d212df6c6deb9b0c2206953bb7f1f8d64cfd20458843776d393693b39c29e6e

    • C:\Users\Admin\AppData\Local\Temp\tQBwHlHO

      Filesize

      1KB

      MD5

      d12e7616283205cb0756f90e3c30cec4

      SHA1

      16d6299a329bcd503b232f109c79e96f4118d6a7

      SHA256

      a5a4b11f15c9c885f12a9e48e60d094371af0df9cc37fa22e5e91d0bad3c0169

      SHA512

      ea42398ac36dedcbedbfe6addca88a76844b6c136726232532dfc2faacae03b7d1b05bcb55eef0440feaf4429560c25bd6287d2844f46d0565647e169618cf98