Analysis

  • max time kernel
    139s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-10-2024 20:43

General

  • Target

    2024-10-04_0f0110d252b12d284ca10bb52a23185c_poet-rat_snatch.exe

  • Size

    5.8MB

  • MD5

    0f0110d252b12d284ca10bb52a23185c

  • SHA1

    077128158af2c55d1574d20a0c8b6aa1a60fa086

  • SHA256

    479f8ddff1392fb73409730f0c5cdc2d3e133b60c515af94ba9a653e8cef7764

  • SHA512

    fa85f91e3ea1174511a2f6490250c4a38d1e4685a87f4342011bbcc1900abf3dfb6b5aac517091d1e0929fdb33cc7576d5f79f9967f6c64709cac31d4c7a4096

  • SSDEEP

    49152:vzlnEcO3Cgrb/TbvO90d7HjmAFd4A64nsfJa/pJMBMvDF/4q4auspdkgKKhdvZfN:63CE/Xx4LKhdkdESp

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-04_0f0110d252b12d284ca10bb52a23185c_poet-rat_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-04_0f0110d252b12d284ca10bb52a23185c_poet-rat_snatch.exe"
    1⤵
    • Drops file in Program Files directory
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Windows\system32\schtasks.exe
      C:\Windows\system32\schtasks.exe /CREATE /XML C:\Users\Admin\AppData\Local\Temp\fWZykz /F /TN ChromeUpdateTaskMachinCore
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:3056
    • C:\Windows\System32\cmd.exe
      C:\Windows\System32\cmd.exe /c "C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3016
      • C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe
        "C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe"
        3⤵
        • Executes dropped EXE
        • Modifies system certificate store
        PID:2092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe

    Filesize

    5.8MB

    MD5

    864832a4770cc37e472be3cdd7de0c2f

    SHA1

    1d953626c915d83069d84852bf6445fcc727a931

    SHA256

    39ab365f806043a9307e3a85266d88885c3125e4a18df8112f0a99aa1e93000d

    SHA512

    1f8b477b061de2b79bb4dc708e0041e45d6f1b480ba25acbd9cf81c236ba80d56c37f44d6b38243953078edec063f29c5fb58181df545405da4e011036479754

  • C:\Users\Admin\AppData\Local\Temp\fWZykz

    Filesize

    1KB

    MD5

    f7a3acf8a6d1ddbbe32c20c2a5186b57

    SHA1

    562f99982f12cbb01b1442eb6ddd77be5f7d0fe8

    SHA256

    91758ef395487a82d863fcac3f3c38d55664791ddde6bceaf1f851e49caf5576

    SHA512

    22e21088d51819915932690740451c1d56f5cf6a5bd33e29644510612a4112c091649b80e718522abaa58f19279481b4fbc3ba1a3ca2e2f370eca39f4607744d