Analysis

  • max time kernel
    134s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-08-2024 00:02

General

  • Target

    2024-08-08_4a5097fd66b87ad5872880f58ffb1b0f_poet-rat_snatch.exe

  • Size

    5.8MB

  • MD5

    4a5097fd66b87ad5872880f58ffb1b0f

  • SHA1

    274b4be27af5dacd56664fa007a3ad8ca45b6e1d

  • SHA256

    307079590877e346a7a67ba03b60d2593b88bcb1c04a726c6fa6f129d5e0a78b

  • SHA512

    3a36a074eb84908ae9e9653165d719f18fe63d86d08eadc04b6dd1d93a677aafead2a653ce07201a378bfeb7b7f82341c4deb2c73a5066c6b8bac6f73d646646

  • SSDEEP

    49152:vzlnEcO3Cgrb/TbvO90d7HjmAFd4A64nsfJa/pJMBMvDF/4q4auspdkgKKhdvZfu:63CE/Xx4LKhdkpESp

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-08-08_4a5097fd66b87ad5872880f58ffb1b0f_poet-rat_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-08-08_4a5097fd66b87ad5872880f58ffb1b0f_poet-rat_snatch.exe"
    1⤵
    • Drops file in Program Files directory
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3764
    • C:\Windows\system32\schtasks.exe
      C:\Windows\system32\schtasks.exe /CREATE /XML C:\Users\Admin\AppData\Local\Temp\fMJFjuwClHVdeksVQo /F /TN ChromeUpdateTaskMachinCore
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:1664
    • C:\Windows\System32\cmd.exe
      C:\Windows\System32\cmd.exe /c "C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3752
      • C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe
        "C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe"
        3⤵
        • Executes dropped EXE
        • Modifies system certificate store
        PID:3608

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe

    Filesize

    5.8MB

    MD5

    984b9101f280b30483a9a65c6563754d

    SHA1

    59d837a6853a3ff2bdf4a7d177433a71f38ac0a1

    SHA256

    fa8b06baa4f48cef0146cc4bb16b7efaf29cb2c6f9dd3b4fad2f12bc1a426283

    SHA512

    8fb3257e3e132567eaa7414e78271002e942f87583ebe1731e08c79cb025b6f0849626b79263bfb7388e7b9c93c5deb4232f76c434a71c31fdcf233e979f3a24

  • C:\Users\Admin\AppData\Local\Temp\fMJFjuwClHVdeksVQo

    Filesize

    1KB

    MD5

    637256c0fbae28103dcce37730d56446

    SHA1

    10f6b0178c92128a20bc1162973f0315a1e95f21

    SHA256

    df9b62eb6e374928c7029f6d53cc4196f4292e5f355210b9135d4b8439cb795e

    SHA512

    f974fdba0bbf9e5993c20a51f4d5eed8f4017f976b8d264c1e62665c89b5bbbade28eb428e5eee81e7a78989d80a43e6df682a8824ab65c23512bf56f35959fb