Analysis
-
max time kernel
91s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 10:29
Behavioral task
behavioral1
Sample
2024-09-12_2adb55dd2dbb6f50de78f19d158a1302_poet-rat_snatch.exe
Resource
win7-20240903-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-09-12_2adb55dd2dbb6f50de78f19d158a1302_poet-rat_snatch.exe
Resource
win10v2004-20240802-en
2 signatures
150 seconds
General
-
Target
2024-09-12_2adb55dd2dbb6f50de78f19d158a1302_poet-rat_snatch.exe
-
Size
9.8MB
-
MD5
2adb55dd2dbb6f50de78f19d158a1302
-
SHA1
88d59831897c608da2317c70e412124dc93d12eb
-
SHA256
cb70b5efc101cc7446faa510535b759dd3d31d6a18ac343bf36827111373767b
-
SHA512
2b4a7c90bba4f87aa646ae7a2809862bbd901afe34cd97a90f49805a6ab7be02b1f6f6cdef25ed89bd1b8007a6782e2d259e37156c1fcf651fd544019d37425f
-
SSDEEP
98304:M60jb2AWIDomQhwA2FKLhRmAY0py0E5XVgjgvCn1XoIx:RrAWIDxOTe5NNa
Score
1/10
Malware Config
Signatures
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 3664 reg.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 636 wrote to memory of 3664 636 2024-09-12_2adb55dd2dbb6f50de78f19d158a1302_poet-rat_snatch.exe 85 PID 636 wrote to memory of 3664 636 2024-09-12_2adb55dd2dbb6f50de78f19d158a1302_poet-rat_snatch.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-12_2adb55dd2dbb6f50de78f19d158a1302_poet-rat_snatch.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-12_2adb55dd2dbb6f50de78f19d158a1302_poet-rat_snatch.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\system32\reg.exereg query HKLM\SYSTEM\ControlSet001\Enum\USBSTOR2⤵
- Modifies registry key
PID:3664
-