Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240910-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2024 01:24

General

  • Target

    2024-10-02_2ae69ce3080f8a77551712094d3acbee_poet-rat_snatch.exe

  • Size

    5.8MB

  • MD5

    2ae69ce3080f8a77551712094d3acbee

  • SHA1

    3519254499ae01a37cf41db0db573681fd76f711

  • SHA256

    80ede956de3e036de564f5bbe7419480009d98c679006ad50428259a6dd45321

  • SHA512

    c656cc0b9e098e63677726307eca02c02fe85bd611f1f1ec8d30f1f383494525f2dc11db45e4ba2777214e10c197605959b0badcebac33c9c863dd4fcbbd46ec

  • SSDEEP

    49152:vzlnEcO3Cgrb/TbvO90d7HjmAFd4A64nsfJa/pJMBMvDF/4q4auspdkgKKhdvZfw:63CE/Xx4LKhdk0ESp

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-02_2ae69ce3080f8a77551712094d3acbee_poet-rat_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-02_2ae69ce3080f8a77551712094d3acbee_poet-rat_snatch.exe"
    1⤵
    • Drops file in Program Files directory
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2088
    • C:\Windows\system32\schtasks.exe
      C:\Windows\system32\schtasks.exe /CREATE /XML C:\Users\Admin\AppData\Local\Temp\fZpHucBMKzzlSAVAgA /F /TN ChromeUpdateTaskMachinCore
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:2888
    • C:\Windows\System32\cmd.exe
      C:\Windows\System32\cmd.exe /c "C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1608
      • C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe
        "C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe"
        3⤵
        • Executes dropped EXE
        • Modifies system certificate store
        PID:1912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe

    Filesize

    5.8MB

    MD5

    f42f268ce15b2e956edc9eb42d731efb

    SHA1

    fb109e4cb61b46d28f418103ad297e07f9ea157d

    SHA256

    d751cdc45afc6465db180e0b34e04bcc01d050a325c66c887730fd07d69b54dc

    SHA512

    53555864567e3585df8361409cf30d0af802b7571cff332ece05d79e1410039e2f32f58bd05298b31e043b382f78dc8a4b9b958b2c5cb10d0a60f0b8e704c09b

  • C:\Users\Admin\AppData\Local\Temp\fZpHucBMKzzlSAVAgA

    Filesize

    1KB

    MD5

    8333b4c2f3b812878d9fb905953c4fb8

    SHA1

    a90b66324fe74e0b4addf6bd4f451a44c3eed82f

    SHA256

    f8a457c82be0d5fc2b41ffb6721f2387e2553a7d5b4ce02d50d78f0dcea0acd9

    SHA512

    a1d4952a0f4a0878fab7830888212fcf6fc0c7ef4331ac91849043634e2e52d6988000a39220e1d64b956830edc23cc7c35bd7c33f1701d3bd3390ab336cc5b0