Analysis

  • max time kernel
    94s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-09-2024 16:22

General

  • Target

    2024-09-23_f4a3f6f96ce30d5a0890afb2816978ce_cobalt-strike_poet-rat_snatch.exe

  • Size

    20.2MB

  • MD5

    f4a3f6f96ce30d5a0890afb2816978ce

  • SHA1

    fcb74955b6cfb313a5a83452a0a520da956d0c5a

  • SHA256

    7b47aa3bdda6bba0b01e90f6975bb2144463156d7d52ec612532fdc1a81eb283

  • SHA512

    28db7bacf5eb531e1217e436ef925fd4b17144b95504d35acdba7fe90eba606c6310dc056607ac424fb18f43f9452a6de198460d4144dbd3d1b98404e4519fbb

  • SSDEEP

    393216:ciotTxfD1/gzQnSegNPCQM2/psErTmlJhjePxnI:itz4zQnSxJCQHscmNePxn

Malware Config

Signatures

  • An open source browser data exporter written in golang. 1 IoCs
  • HackBrowserData

    An open source golang web browser extractor.

  • Executes dropped EXE 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-23_f4a3f6f96ce30d5a0890afb2816978ce_cobalt-strike_poet-rat_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-23_f4a3f6f96ce30d5a0890afb2816978ce_cobalt-strike_poet-rat_snatch.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:932
    • C:\Users\Admin\script_cookie_encrypted.exe
      C:\Users\Admin\script_cookie_encrypted.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2572
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        3⤵
          PID:3836
      • C:\Users\Admin\rate.exe
        C:\Users\Admin\rate.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4520
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
          3⤵
            PID:5064
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
            3⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:2228
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
            3⤵
              PID:5040

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Local Storage\leveldb_7.temp\CURRENT.5

          Filesize

          16B

          MD5

          9f36605efba98dab15728fe8b5538aa0

          SHA1

          6a7cff514ae159a59b70f27dde52a3a5dd01b1c8

          SHA256

          9c283f6e81028b9eb0760d918ee4bc0aa256ed3b926393c1734c760c4bd724fd

          SHA512

          1893aa3d1abcf7f9e83911468fa2eeb2ad1d7e23f4586bd6c4d76f9f96a645c15e63e44da55700347165e97b6ac412e6d495b81c3da9faa61d617c7a71a7404c

        • C:\Users\Admin\AppData\Local\Temp\Session Storage_8.temp\CURRENT.bak

          Filesize

          16B

          MD5

          46295cac801e5d4857d09837238a6394

          SHA1

          44e0fa1b517dbf802b18faf0785eeea6ac51594b

          SHA256

          0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

          SHA512

          8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

        • C:\Users\Admin\AppData\Local\Temp\Session Storage_8.temp\MANIFEST-000001

          Filesize

          41B

          MD5

          5af87dfd673ba2115e2fcf5cfdb727ab

          SHA1

          d5b5bbf396dc291274584ef71f444f420b6056f1

          SHA256

          f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

          SHA512

          de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

        • C:\Users\Admin\rate.exe

          Filesize

          3.6MB

          MD5

          0c8bc5317e4b23f1e6dd3a2b7af70255

          SHA1

          49dd70a5dfb41a77806f0abb0b9f54d0cd01d652

          SHA256

          af847306fa5457d15f4d378e2622f6ff3f92c9a093810f760bf1f3cc91aacb7f

          SHA512

          e95a567a70df88ac1226fd4973a6103f195c38f1790750047feead51b186434d88ab5a525c77cbe509f6fa8d8c90b77fac9daf2a48d31f85db12ab1b11863878

        • C:\Users\Admin\script_cookie_encrypted.exe

          Filesize

          11.2MB

          MD5

          b50c04edf22d51016e00d6f385b41cc7

          SHA1

          22295a90e102a3ffdada9f52230fb9e604bac281

          SHA256

          2a7cae1fd866ff4f11e5c41c428b9b3c1078df3b523706d8a5145c55bd359ba9

          SHA512

          a574405593129fd729d8bf5fdcf6813cb68870cbb1124969def626db06069ccb2e18841c73ca5f34f71d33b4edd9c1982b6282a6f3e66b645e1043eff45f1f73

        • memory/2228-168-0x0000000000400000-0x000000000045C000-memory.dmp

          Filesize

          368KB

        • memory/2228-171-0x0000000005740000-0x00000000057A6000-memory.dmp

          Filesize

          408KB

        • memory/2228-170-0x00000000055A0000-0x000000000565A000-memory.dmp

          Filesize

          744KB

        • memory/3836-5-0x0000000000400000-0x0000000000DED000-memory.dmp

          Filesize

          9.9MB

        • memory/4520-10-0x000001E22E5F0000-0x000001E22E5F8000-memory.dmp

          Filesize

          32KB

        • memory/4520-167-0x000001E230380000-0x000001E230430000-memory.dmp

          Filesize

          704KB

        • memory/4520-169-0x00007FFCB1030000-0x00007FFCB1AF1000-memory.dmp

          Filesize

          10.8MB

        • memory/4520-33-0x00007FFCB1030000-0x00007FFCB1AF1000-memory.dmp

          Filesize

          10.8MB

        • memory/4520-9-0x00007FFCB1033000-0x00007FFCB1035000-memory.dmp

          Filesize

          8KB