Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 23:21
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-25_ebb200eea9df4e28343cbe48b5e04c51_kaiji_poet-rat_snatch.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-25_ebb200eea9df4e28343cbe48b5e04c51_kaiji_poet-rat_snatch.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-25_ebb200eea9df4e28343cbe48b5e04c51_kaiji_poet-rat_snatch.exe
-
Size
5.1MB
-
MD5
ebb200eea9df4e28343cbe48b5e04c51
-
SHA1
993ab8051fa9b194e2690aa24ec84e31c91a35ae
-
SHA256
3fdb118452bb00c26040ca82202a7c80c2ff0dc5c7b6820f5820d0e643cdbcbd
-
SHA512
e021946d199f24e573483e3cfade18a47ad98a22ed7b3d9e50b72426c257c61bb65677672ead714781d244578cc03ced09b500b7d28527d8894612e33fe789d5
-
SSDEEP
49152:Mg3kXf3pgz/SsMcO1fZkKLy1zpslsqzzqqALm9axp6XgcBr+wp7Cf4KGuT+X1q7e:Mg3kXPyeLcQzzqqALm9HlrI
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\Administrator = "C:\\ProgramData\\Microsoft\\csrss.exe" 2024-09-25_ebb200eea9df4e28343cbe48b5e04c51_kaiji_poet-rat_snatch.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-25_ebb200eea9df4e28343cbe48b5e04c51_kaiji_poet-rat_snatch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-25_ebb200eea9df4e28343cbe48b5e04c51_kaiji_poet-rat_snatch.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-25_ebb200eea9df4e28343cbe48b5e04c51_kaiji_poet-rat_snatch.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2552