Analysis

  • max time kernel
    144s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/09/2024, 00:06

General

  • Target

    2024-08-31_421ede5ec92930dbbd5686a2768884c8_poet-rat_snatch.exe

  • Size

    5.8MB

  • MD5

    421ede5ec92930dbbd5686a2768884c8

  • SHA1

    ee4bdbf7ce31ecabe20def3398330695ec2bcd21

  • SHA256

    9a92cf07da9698a0deb7b62c2667a5d15d6767679202ef6d833d447ea72cc78c

  • SHA512

    17e243de8ea6a5bbf9a18a4ff0b441823ac3cb8c7c6746f4e038b317858f724b052776abb0390ceb9e0be20a750eca8de4c03d755818e1b621e88ccc7303a19f

  • SSDEEP

    49152:vzlnEcO3Cgrb/TbvO90d7HjmAFd4A64nsfJa/pJMBMvDF/4q4auspdkgKKhdvZf5:63CE/Xx4LKhdkeESp

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-08-31_421ede5ec92930dbbd5686a2768884c8_poet-rat_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-08-31_421ede5ec92930dbbd5686a2768884c8_poet-rat_snatch.exe"
    1⤵
    • Drops file in Program Files directory
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3700
    • C:\Windows\system32\schtasks.exe
      C:\Windows\system32\schtasks.exe /CREATE /XML C:\Users\Admin\AppData\Local\Temp\GGxtGxUiX /F /TN ChromeUpdateTaskMachinCore
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:3692
    • C:\Windows\System32\cmd.exe
      C:\Windows\System32\cmd.exe /c "C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2976
      • C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe
        "C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe"
        3⤵
        • Executes dropped EXE
        • Modifies system certificate store
        PID:3100

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe

          Filesize

          5.8MB

          MD5

          1c5337cac375fca8d039582b00a4d068

          SHA1

          a5e22e49898dc2af19904d197fb0f1542d1717c9

          SHA256

          63cc381292451e9b85961b5bcbc119525286be73aaef395b88f87b59b7ba5b43

          SHA512

          7b9c975f1c4f49cd521247aea8c94055766053a40a10501df78cf422900d5c9a220a98d0a9b71c122a903971ae363267c9faf72b61dc9bccf04a28f29df71724

        • C:\Users\Admin\AppData\Local\Temp\GGxtGxUiX

          Filesize

          1KB

          MD5

          ca6b088a8930f44a4a1630219a320726

          SHA1

          34ccfc2b776dcb4bdccf38799c38ac95c52ce807

          SHA256

          1e34e95eae04e12c1ebecbf19e1eb774280a1a85afbc0feaa202757c0dbeb829

          SHA512

          8ce083b3b141eb80a51ed808d57ce0852a3e6453a8c607b01fa51b474b311096a12b8c3e115cdc866cdb9f5890414e2ed2a276e8d62b7495924e3c1a4e816e1e