Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
2024-08-25_80696c196c80f8fa96b9c16e96118079_poet-rat_snatch
-
Size
14.0MB
-
Sample
240825-e4da9avbqc
-
MD5
80696c196c80f8fa96b9c16e96118079
-
SHA1
8425d9e121cb1ee385dffd8a99cb1b88a12fa5d7
-
SHA256
75ee504ebd01b58f96910432c8e6fe419b65b4a1b06fa58f5eedecfaf6ec956d
-
SHA512
9cdc2bdec8acf1f56326dc9d0815ef396ebef261e03c7f1f44b883c2feab1e0fc78619c63ea329f6221761a48b6443ed482466db0eaea4aabadfb49855c9d31d
-
SSDEEP
196608:d247x52HYfbI5+K/OIss/j9i+zpXts76p/zIf8ryQ5S:dxx5bW+KssLcMXtsezIfxA
Behavioral task
behavioral1
Sample
2024-08-25_80696c196c80f8fa96b9c16e96118079_poet-rat_snatch.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-08-25_80696c196c80f8fa96b9c16e96118079_poet-rat_snatch.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
2024-08-25_80696c196c80f8fa96b9c16e96118079_poet-rat_snatch
-
Size
14.0MB
-
MD5
80696c196c80f8fa96b9c16e96118079
-
SHA1
8425d9e121cb1ee385dffd8a99cb1b88a12fa5d7
-
SHA256
75ee504ebd01b58f96910432c8e6fe419b65b4a1b06fa58f5eedecfaf6ec956d
-
SHA512
9cdc2bdec8acf1f56326dc9d0815ef396ebef261e03c7f1f44b883c2feab1e0fc78619c63ea329f6221761a48b6443ed482466db0eaea4aabadfb49855c9d31d
-
SSDEEP
196608:d247x52HYfbI5+K/OIss/j9i+zpXts76p/zIf8ryQ5S:dxx5bW+KssLcMXtsezIfxA
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Modifies Windows Firewall
-
Legitimate hosting services abused for malware hosting/C2
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2