Analysis

  • max time kernel
    141s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/07/2024, 20:53

General

  • Target

    2024-07-09_707f12266f9ddcbdb4ba84dc59cfc8de_poet-rat_snatch.exe

  • Size

    5.8MB

  • MD5

    707f12266f9ddcbdb4ba84dc59cfc8de

  • SHA1

    3f605da3a2d580d820965ef005d7690bc615ddc2

  • SHA256

    ac1adb8ce2fbd2a5a4496711a7df6d75a9a8d1e98d8b04bbe1a74c8d81fa6859

  • SHA512

    845acdeaf8737aca8d2c385bf5e3fb0fa76cfa23b844444795146a1c31d4af6472f8b1c02e4cf5c7cc811ace59b891277850894f45104afec1c8e3ca0ce7d316

  • SSDEEP

    49152:vzlnEcO3Cgrb/TbvO90d7HjmAFd4A64nsfJa/pJMBMvDF/4q4auspdkgKKhdvZfd:63CE/Xx4LKhdknESp

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-07-09_707f12266f9ddcbdb4ba84dc59cfc8de_poet-rat_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-07-09_707f12266f9ddcbdb4ba84dc59cfc8de_poet-rat_snatch.exe"
    1⤵
    • Drops file in Program Files directory
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3732
    • C:\Windows\system32\schtasks.exe
      C:\Windows\system32\schtasks.exe /CREATE /XML C:\Users\Admin\AppData\Local\Temp\VLBRTyMsuhqF /F /TN ChromeUpdateTaskMachinCore
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:2456
    • C:\Windows\System32\cmd.exe
      C:\Windows\System32\cmd.exe /c "C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2096
      • C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe
        "C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe"
        3⤵
        • Executes dropped EXE
        • Modifies system certificate store
        PID:4100

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe

          Filesize

          5.8MB

          MD5

          888de4d6fe8b8e5a2fe453e10fd9c33a

          SHA1

          aa6cbfb14163c05545174f7e41baba70270ddfa7

          SHA256

          d447ebc310e36424dc38d0aa69cad6392abeaea158a42604d2c42590db8fc930

          SHA512

          4384daf0a5d02fc4962349b70fa75b5ddeeff4a2982e697ac6fc00c0d1cf7ac102558d1a55e7d3cbfaf347b37423fcb6fb8343435423ddb43e0c2b8b7b362367

        • C:\Users\Admin\AppData\Local\Temp\VLBRTyMsuhqF

          Filesize

          1KB

          MD5

          7ecad4d7c4551c2b5c1ad76c39eee07c

          SHA1

          160ac4f70634a87b199ad0e573bf06eac64881cd

          SHA256

          8da061f859e8ae08cf382678677704fd0eb7cff37b723a41ea25d2e7cbf6d64e

          SHA512

          9e59874e1bfbba2506312655a7fe0eed347a7a35b18c7be1bb4ebe707c48906f3755ece1fbf052c762b595305ac45508dd3c08b2240d05c17774460412a4280f