Analysis

  • max time kernel
    141s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/08/2024, 18:51

General

  • Target

    2024-08-09_4ac09b06b424ab7031ee5f0ccd3a4725_poet-rat_snatch.exe

  • Size

    5.8MB

  • MD5

    4ac09b06b424ab7031ee5f0ccd3a4725

  • SHA1

    f60987edfa790589abf7532f51a2322ba02c1917

  • SHA256

    282caf7ff33d016c53fbddd8158f56b65b3d7240c25d50d40dc5fbcb8d0a2288

  • SHA512

    b1b8274167e025c4ff055a92ec7398685cf01d6e7f09485cf6847088e8366258350e1d574b03e5c068bd16a8a99343dc95800378caf4f42cd32ce59a2e794747

  • SSDEEP

    49152:vzlnEcO3Cgrb/TbvO90d7HjmAFd4A64nsfJa/pJMBMvDF/4q4auspdkgKKhdvZf/:63CE/Xx4LKhdkaESp

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-08-09_4ac09b06b424ab7031ee5f0ccd3a4725_poet-rat_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-08-09_4ac09b06b424ab7031ee5f0ccd3a4725_poet-rat_snatch.exe"
    1⤵
    • Drops file in Program Files directory
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3380
    • C:\Windows\system32\schtasks.exe
      C:\Windows\system32\schtasks.exe /CREATE /XML C:\Users\Admin\AppData\Local\Temp\zzpQCC /F /TN ChromeUpdateTaskMachinCore
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:1212
    • C:\Windows\System32\cmd.exe
      C:\Windows\System32\cmd.exe /c "C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2076
      • C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe
        "C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe"
        3⤵
        • Executes dropped EXE
        • Modifies system certificate store
        PID:212

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe

          Filesize

          5.8MB

          MD5

          0d976def5341fb9146e9d0fd0fd143ad

          SHA1

          a3f16e61e2ac28c3e2cbf9b74a9bbdaadc606c9b

          SHA256

          fd52d11cae994b36cea9196e694ca8dd6c715d013d533c27bbec666449e200d0

          SHA512

          f21f9a196fb64cc2debbce16428cfd5f6b9b4ee21ed8db9a9591fab47cf9acf394139d69c81899d4914cfbc464b0fccc27839ec970939ebc82a188c5af559e9b

        • C:\Users\Admin\AppData\Local\Temp\zzpQCC

          Filesize

          1KB

          MD5

          62fc13a539db4a7221874d8355e65bf5

          SHA1

          2f6d78833fbb4e366ee5c49db2c3dafc3636ac46

          SHA256

          233223ddc9caa1c4f333d0c060255d29ce13429e61752007675b98d622b2e1df

          SHA512

          70915955521c29691a95b42ab0a0c0ce36800dc3d289c4c18b7c4092878c5ad9ac009db0b4389333a579e3b4b21b6790a470e033e5737ce7a4bdeb67938d0024