Analysis

  • max time kernel
    125s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-07-2024 13:55

General

  • Target

    2024-07-06_cdef07b0773b6fe806f362f4cade0dcc_poet-rat_snatch.exe

  • Size

    7.8MB

  • MD5

    cdef07b0773b6fe806f362f4cade0dcc

  • SHA1

    d39a499d5efbe68afe94ffcc36b0f3d092536554

  • SHA256

    d9673a738b445094b7678df9fdd82f62000c578c554bf9dbdf2d6ba52cf253f6

  • SHA512

    2b4ab39583b3bf44fe3ea6a80fa5e4c02d9ac89ea63975d00b449a3900534f3697c49f8e7bdd8f22e82f34d602b873bc7a29841555bf5b15b125058b12ad9901

  • SSDEEP

    98304:FyytB/ShJ5ij+E0t4TOlG8Id0p6OrbxQAGsiwQHOy1qf4:xDShJ5k0xl+4Bd7iwYB

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Using powershell.exe command.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-07-06_cdef07b0773b6fe806f362f4cade0dcc_poet-rat_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-07-06_cdef07b0773b6fe806f362f4cade0dcc_poet-rat_snatch.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:5000
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command "Get-Partition | Select-Object DriveLetter | ConvertTo-Csv"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2416
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command "Get-ChildItem -Path C:\ -Recurse -Filter *.pdf -Verbose | Select-Object FullName, LastWriteTime, Length | Sort-Object LastWriteTime -Descending | Export-Csv -Path $env:TEMP\1720276898-out.csv -NoTypeInformation -Encoding UTF8; echo $env:TEMP\1720276898-out.csv"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2752
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command "Get-ChildItem -Path F:\ -Recurse -Filter *.pdf -Verbose | Select-Object FullName, LastWriteTime, Length | Sort-Object LastWriteTime -Descending | Export-Csv -Path $env:TEMP\1720276948-out.csv -NoTypeInformation -Encoding UTF8; echo $env:TEMP\1720276948-out.csv"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1072

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

    Filesize

    3KB

    MD5

    6103fe5d5027cab041f301df51eac4c4

    SHA1

    c657565a144127c840a918019386d0215fd8c344

    SHA256

    417c4cb2b29babf944e6c41ea1b362908782127c5894ef0fe3372abc855fbfd3

    SHA512

    6a2ec9fb27a748a8de37064cca4464dbe2758b0711e6622c8ff6f2dccd8b332d933abc8014dfe22e0a86659211fc7c394d9ccbf965d1f253e4cf59ebb290d9cd

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    3a39921d2d2d0756725f644b59bc95da

    SHA1

    6f26e3dba107181ffad6f7fa413a5a438e24a1b1

    SHA256

    9b5ccc9e3befaeb12d769e30906d7f3206f75de5e129d06e058e55c359f26e3b

    SHA512

    655789b90140005e062f909f45cb7af9ce1f53ca567609e7388a959ffe091ee45363b090f83ddb07e10099b09fbd9d40638b2cc5c0aee621b9feaad7cd4fbd41

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    353360b5eeb580694f581712e262d1bc

    SHA1

    096121645e45c1749ee6147b6d80cd7d041e5422

    SHA256

    7dd8e18d055ce6616d952a0c4ef6e7dfa80dff3ac02e43d0d07ac632c3194a6f

    SHA512

    59ed36a49e187e67693df1eefe99436f710e1db1ab7c15249e58cb28cc9ffd7e72ceae54035400d0d2ab65f1638b0489907d2b6247f927afdd049f66e69e99f9

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_t5ybrh2y.5ut.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/2416-12-0x00007FF9E9910000-0x00007FF9EA3D1000-memory.dmp

    Filesize

    10.8MB

  • memory/2416-15-0x00007FF9E9910000-0x00007FF9EA3D1000-memory.dmp

    Filesize

    10.8MB

  • memory/2416-16-0x00007FF9E9910000-0x00007FF9EA3D1000-memory.dmp

    Filesize

    10.8MB

  • memory/2416-0-0x00007FF9E9913000-0x00007FF9E9915000-memory.dmp

    Filesize

    8KB

  • memory/2416-11-0x00007FF9E9910000-0x00007FF9EA3D1000-memory.dmp

    Filesize

    10.8MB

  • memory/2416-1-0x000002426A4E0000-0x000002426A502000-memory.dmp

    Filesize

    136KB

  • memory/2752-28-0x00007FF9E9910000-0x00007FF9EA3D1000-memory.dmp

    Filesize

    10.8MB

  • memory/2752-29-0x00007FF9E9910000-0x00007FF9EA3D1000-memory.dmp

    Filesize

    10.8MB

  • memory/2752-30-0x00007FF9E9910000-0x00007FF9EA3D1000-memory.dmp

    Filesize

    10.8MB

  • memory/2752-31-0x00007FF9E9910000-0x00007FF9EA3D1000-memory.dmp

    Filesize

    10.8MB

  • memory/2752-32-0x00007FF9E9910000-0x00007FF9EA3D1000-memory.dmp

    Filesize

    10.8MB

  • memory/2752-33-0x00007FF9E9910000-0x00007FF9EA3D1000-memory.dmp

    Filesize

    10.8MB

  • memory/2752-36-0x00007FF9E9910000-0x00007FF9EA3D1000-memory.dmp

    Filesize

    10.8MB