Analysis
-
max time kernel
92s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 13:33
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-05_b3dd32e299632ba5134f09521de3ecdc_poet-rat_snatch.exe
Resource
win7-20240903-en
General
-
Target
2024-10-05_b3dd32e299632ba5134f09521de3ecdc_poet-rat_snatch.exe
-
Size
31.6MB
-
MD5
b3dd32e299632ba5134f09521de3ecdc
-
SHA1
e2c11ddf6da69a24ea53b341aa8f22f7fec44b17
-
SHA256
585cec4a30e4500578277551b5646e82dae78624e30d083fd9cc8d67c979bc48
-
SHA512
2a8d894892101b4a54990d71bc790959e6dbc0f1513d23f1639fd27a93db131a90330c32c3ef9e4629d8289331f214a5bb2873c25f27802e7260d3f3c8a5fe98
-
SSDEEP
196608:EtpgafwsTMC8pvsXfMfpO7ZsoD2ZIiFX/Ip++oxKqchQnZ7PAg/fMNFE5uUEVjXI:6Io8eEAmekI+7n91G1j1jx
Malware Config
Extracted
lumma
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 896 set thread context of 3540 896 2024-10-05_b3dd32e299632ba5134f09521de3ecdc_poet-rat_snatch.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-05_b3dd32e299632ba5134f09521de3ecdc_poet-rat_snatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 896 wrote to memory of 3540 896 2024-10-05_b3dd32e299632ba5134f09521de3ecdc_poet-rat_snatch.exe 82 PID 896 wrote to memory of 3540 896 2024-10-05_b3dd32e299632ba5134f09521de3ecdc_poet-rat_snatch.exe 82 PID 896 wrote to memory of 3540 896 2024-10-05_b3dd32e299632ba5134f09521de3ecdc_poet-rat_snatch.exe 82 PID 896 wrote to memory of 3540 896 2024-10-05_b3dd32e299632ba5134f09521de3ecdc_poet-rat_snatch.exe 82 PID 896 wrote to memory of 3540 896 2024-10-05_b3dd32e299632ba5134f09521de3ecdc_poet-rat_snatch.exe 82 PID 896 wrote to memory of 3540 896 2024-10-05_b3dd32e299632ba5134f09521de3ecdc_poet-rat_snatch.exe 82 PID 896 wrote to memory of 3540 896 2024-10-05_b3dd32e299632ba5134f09521de3ecdc_poet-rat_snatch.exe 82 PID 896 wrote to memory of 3540 896 2024-10-05_b3dd32e299632ba5134f09521de3ecdc_poet-rat_snatch.exe 82 PID 896 wrote to memory of 3540 896 2024-10-05_b3dd32e299632ba5134f09521de3ecdc_poet-rat_snatch.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-05_b3dd32e299632ba5134f09521de3ecdc_poet-rat_snatch.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-05_b3dd32e299632ba5134f09521de3ecdc_poet-rat_snatch.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3540
-