Analysis

  • max time kernel
    78s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-09-2024 15:45

General

  • Target

    2024-09-23_22549968edc23bf55d97dfca93669ff2_cobalt-strike_poet-rat_snatch.exe

  • Size

    22.4MB

  • MD5

    22549968edc23bf55d97dfca93669ff2

  • SHA1

    8f6eafbbedb38841d742e2919a00bfa0dc0f8f7c

  • SHA256

    d5dc214b3447ff4d4cf1b34412c9d74eb4e95cda840bca80892c6fe130acc0e6

  • SHA512

    2156b003919c55bb9b41a03283bec32c2ab0ce99e24f0f267970b748c98218040a02a5e49696d66f1814a51a386336dc473ed4db16f1c0c9675f945af8d13457

  • SSDEEP

    393216:ar2MreD1/gzQnSegNPCQM2/psErTmlJhjePxnIgaheZrV:U214zQnSxJCQHscmNePxnVahehV

Malware Config

Signatures

  • An open source browser data exporter written in golang. 9 IoCs
  • HackBrowserData

    An open source golang web browser extractor.

  • Executes dropped EXE 6 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 6 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-23_22549968edc23bf55d97dfca93669ff2_cobalt-strike_poet-rat_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-23_22549968edc23bf55d97dfca93669ff2_cobalt-strike_poet-rat_snatch.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1052
    • C:\Users\Admin\script_cookie_encrypted.exe
      C:\Users\Admin\script_cookie_encrypted.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4656
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"
        3⤵
          PID:1188
      • C:\Users\Admin\rate.exe
        C:\Users\Admin\rate.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:344
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:1548
      • C:\Users\Admin\rate.exe
        C:\Users\Admin\rate.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1064
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
          3⤵
            PID:1100
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
            3⤵
              PID:3872
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"
              3⤵
                PID:4356
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                3⤵
                • System Location Discovery: System Language Discovery
                PID:4716
            • C:\Users\Admin\rate.exe
              C:\Users\Admin\rate.exe
              2⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:4296
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"
                3⤵
                  PID:2484
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:2936
              • C:\Users\Admin\rate.exe
                C:\Users\Admin\rate.exe
                2⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:2904
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:3004
              • C:\Users\Admin\rate.exe
                C:\Users\Admin\rate.exe
                2⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                PID:4656
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
                  3⤵
                    PID:3068
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:1228
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"
                    3⤵
                      PID:2604

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\Local Storage\leveldb_7.temp\CURRENT.bak

                  Filesize

                  16B

                  MD5

                  46295cac801e5d4857d09837238a6394

                  SHA1

                  44e0fa1b517dbf802b18faf0785eeea6ac51594b

                  SHA256

                  0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                  SHA512

                  8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                • C:\Users\Admin\AppData\Local\Temp\Local Storage\leveldb_7.temp\MANIFEST-000001

                  Filesize

                  41B

                  MD5

                  5af87dfd673ba2115e2fcf5cfdb727ab

                  SHA1

                  d5b5bbf396dc291274584ef71f444f420b6056f1

                  SHA256

                  f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                  SHA512

                  de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                • C:\Users\Admin\AppData\Local\Temp\Session Storage_8.temp\000004.ldb

                  Filesize

                  141B

                  MD5

                  800964100bf5522029908e4d62c8cb86

                  SHA1

                  28fa46ca8b867b24975ffa2e164a08dcb8c3838d

                  SHA256

                  4320e36c155668faf70df6378ed4748e176a45f9b38996f5529fb8dbaf7a46be

                  SHA512

                  511d001b6a05f93f113924a60cf225d03811527a2fe915b25c0305fe64f8dfc8600ae67ebe51246852eb11ea063621801c4e028292626f49ddd989ef0b245936

                • C:\Users\Admin\AppData\Local\Temp\Session Storage_8.temp\CURRENT.6

                  Filesize

                  16B

                  MD5

                  aefd77f47fb84fae5ea194496b44c67a

                  SHA1

                  dcfbb6a5b8d05662c4858664f81693bb7f803b82

                  SHA256

                  4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611

                  SHA512

                  b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3

                • C:\Users\Admin\rate.exe

                  Filesize

                  3.6MB

                  MD5

                  0c8bc5317e4b23f1e6dd3a2b7af70255

                  SHA1

                  49dd70a5dfb41a77806f0abb0b9f54d0cd01d652

                  SHA256

                  af847306fa5457d15f4d378e2622f6ff3f92c9a093810f760bf1f3cc91aacb7f

                  SHA512

                  e95a567a70df88ac1226fd4973a6103f195c38f1790750047feead51b186434d88ab5a525c77cbe509f6fa8d8c90b77fac9daf2a48d31f85db12ab1b11863878

                • C:\Users\Admin\results\chrome_def_sessionstorage.csv

                  Filesize

                  34B

                  MD5

                  d07886f7107c50304e1b9cde0793ed04

                  SHA1

                  41453a6e9db25a06b4ef031c12fdcee8a3818741

                  SHA256

                  963b596f0385f5be1b8ad2f7e5b4ff474aeb1a1a8d17d20ff67a1cd30ca70344

                  SHA512

                  a917504c89a8ec7b8fc5d89a683fce01ce45a160dbb98861cc2432c221a2f3e7aca15b7325967c171e2de2d7ce26ffa01ecef49c7b896b1a16daa5a3125eb4ca

                • C:\Users\Admin\results\chrome_default_extension.csv

                  Filesize

                  302B

                  MD5

                  81b496ce1578a88f74dcf1b5a09f98b5

                  SHA1

                  ec5b2723bf4f88d001069fccd5300096c5955d0b

                  SHA256

                  5c99c6eb19efecfdcb5da9e8e547ce78065d0de4e7dcc4b70166d03d0870b7d5

                  SHA512

                  b72794dfb6955f8a2c102d072cd650617d08ca94805c791e4549ec2b326b8b896d872f848f701ebbad46342da6df051a3799af5434092b167a233a23978e580f

                • C:\Users\Admin\script_cookie_encrypted.exe

                  Filesize

                  11.2MB

                  MD5

                  b50c04edf22d51016e00d6f385b41cc7

                  SHA1

                  22295a90e102a3ffdada9f52230fb9e604bac281

                  SHA256

                  2a7cae1fd866ff4f11e5c41c428b9b3c1078df3b523706d8a5145c55bd359ba9

                  SHA512

                  a574405593129fd729d8bf5fdcf6813cb68870cbb1124969def626db06069ccb2e18841c73ca5f34f71d33b4edd9c1982b6282a6f3e66b645e1043eff45f1f73

                • memory/344-15-0x00007FFCF0053000-0x00007FFCF0055000-memory.dmp

                  Filesize

                  8KB

                • memory/344-187-0x000001C91AA20000-0x000001C91AAD0000-memory.dmp

                  Filesize

                  704KB

                • memory/344-11-0x000001C900060000-0x000001C900068000-memory.dmp

                  Filesize

                  32KB

                • memory/1188-16-0x0000000000400000-0x0000000000DED000-memory.dmp

                  Filesize

                  9.9MB

                • memory/1188-43-0x0000000000400000-0x0000000000DED000-memory.dmp

                  Filesize

                  9.9MB

                • memory/1188-40-0x0000000000400000-0x0000000000DED000-memory.dmp

                  Filesize

                  9.9MB

                • memory/1188-12-0x0000000000400000-0x0000000000DED000-memory.dmp

                  Filesize

                  9.9MB

                • memory/1188-14-0x0000000000400000-0x0000000000DED000-memory.dmp

                  Filesize

                  9.9MB

                • memory/1188-186-0x0000000000400000-0x0000000000DED000-memory.dmp

                  Filesize

                  9.9MB

                • memory/1188-13-0x0000000000400000-0x0000000000DED000-memory.dmp

                  Filesize

                  9.9MB

                • memory/1188-10-0x0000000000400000-0x0000000000DED000-memory.dmp

                  Filesize

                  9.9MB

                • memory/1188-4-0x0000000000400000-0x0000000000DED000-memory.dmp

                  Filesize

                  9.9MB

                • memory/1548-188-0x0000000000400000-0x000000000045C000-memory.dmp

                  Filesize

                  368KB

                • memory/1548-190-0x0000000004DD0000-0x0000000004E8A000-memory.dmp

                  Filesize

                  744KB

                • memory/1548-191-0x0000000004F70000-0x0000000004FD6000-memory.dmp

                  Filesize

                  408KB