Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 05:48 UTC
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-19_4855266dc0c1c5c274f3ed44686c6e30_hijackloader_poet-rat_snatch.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-19_4855266dc0c1c5c274f3ed44686c6e30_hijackloader_poet-rat_snatch.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-19_4855266dc0c1c5c274f3ed44686c6e30_hijackloader_poet-rat_snatch.exe
-
Size
27.8MB
-
MD5
4855266dc0c1c5c274f3ed44686c6e30
-
SHA1
5460aa5b305a80491784ce7d72b85a144e59f09d
-
SHA256
cd1521f63f03a9ed02def4f85faad4929a19eb18319d75a55e9f68f6ef674903
-
SHA512
de008f33859a6b03bb6c1bab5b8a1559bfabe8d1b9d55570b895434a092fc57e2d8b9c918cd5500aec2ccf83ecd28f1ad10c3d768e08665bc79f115a0cd84a83
-
SSDEEP
98304:iwe+bw6pfcusWXHDSk7lVB0PThRI9Q0pN5fnI69hEZgvxIpX8+V0nxcCFZvqVlAV:iwl7UusWXjXVX2Zx8fFJSI
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5024 2024-09-19_4855266dc0c1c5c274f3ed44686c6e30_hijackloader_poet-rat_snatch.exe 5024 2024-09-19_4855266dc0c1c5c274f3ed44686c6e30_hijackloader_poet-rat_snatch.exe 5024 2024-09-19_4855266dc0c1c5c274f3ed44686c6e30_hijackloader_poet-rat_snatch.exe 5024 2024-09-19_4855266dc0c1c5c274f3ed44686c6e30_hijackloader_poet-rat_snatch.exe 3200 2024-09-19_4855266dc0c1c5c274f3ed44686c6e30_hijackloader_poet-rat_snatch.exe 3200 2024-09-19_4855266dc0c1c5c274f3ed44686c6e30_hijackloader_poet-rat_snatch.exe 3200 2024-09-19_4855266dc0c1c5c274f3ed44686c6e30_hijackloader_poet-rat_snatch.exe 3200 2024-09-19_4855266dc0c1c5c274f3ed44686c6e30_hijackloader_poet-rat_snatch.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 5024 wrote to memory of 3200 5024 2024-09-19_4855266dc0c1c5c274f3ed44686c6e30_hijackloader_poet-rat_snatch.exe 83 PID 5024 wrote to memory of 3200 5024 2024-09-19_4855266dc0c1c5c274f3ed44686c6e30_hijackloader_poet-rat_snatch.exe 83 PID 5024 wrote to memory of 872 5024 2024-09-19_4855266dc0c1c5c274f3ed44686c6e30_hijackloader_poet-rat_snatch.exe 84 PID 5024 wrote to memory of 872 5024 2024-09-19_4855266dc0c1c5c274f3ed44686c6e30_hijackloader_poet-rat_snatch.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-19_4855266dc0c1c5c274f3ed44686c6e30_hijackloader_poet-rat_snatch.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-19_4855266dc0c1c5c274f3ed44686c6e30_hijackloader_poet-rat_snatch.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\2024-09-19_4855266dc0c1c5c274f3ed44686c6e30_hijackloader_poet-rat_snatch.exeC:\Users\Admin\AppData\Local\Temp\2024-09-19_4855266dc0c1c5c274f3ed44686c6e30_hijackloader_poet-rat_snatch.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3200
-
-
C:\Windows\system32\cmd.execmd.exe /K2⤵PID:872
-
Network
-
Remote address:8.8.8.8:53Request241.150.49.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request228.249.119.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request196.249.167.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request26.165.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request198.187.3.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request73.144.22.2.in-addr.arpaIN PTRResponse73.144.22.2.in-addr.arpaIN PTRa2-22-144-73deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request81.144.22.2.in-addr.arpaIN PTRResponse81.144.22.2.in-addr.arpaIN PTRa2-22-144-81deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request31.243.111.52.in-addr.arpaIN PTRResponse
-
72 B 158 B 1 1
DNS Request
241.150.49.20.in-addr.arpa
-
73 B 159 B 1 1
DNS Request
228.249.119.40.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
196.249.167.52.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
26.165.165.52.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
198.187.3.20.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
73.144.22.2.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
81.144.22.2.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
31.243.111.52.in-addr.arpa