Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/10/2024, 05:00

General

  • Target

    2024-10-09_fbeb8eeda5ddbf0e02fe1d2ef9b689e8_poet-rat_snatch.exe

  • Size

    5.8MB

  • MD5

    fbeb8eeda5ddbf0e02fe1d2ef9b689e8

  • SHA1

    504b2f8bd5b9356f4b0a70f276588fc7389d4ae4

  • SHA256

    df7dbd26aef718ef9763b2916e1709ae2712398113d2170176ae6fdf2edbe2c4

  • SHA512

    1607c7e9bf0495963069e66bab89c420cabd29e581838e65eeaf3ba3a186483af806758d5c8c84c3a80f08552152ab15da7feb71186c3ada9ef4cf51147bcf76

  • SSDEEP

    49152:vzlnEcO3Cgrb/TbvO90d7HjmAFd4A64nsfJa/pJMBMvDF/4q4auspdkgKKhdvZfl:63CE/Xx4LKhdkPESp

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-09_fbeb8eeda5ddbf0e02fe1d2ef9b689e8_poet-rat_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-09_fbeb8eeda5ddbf0e02fe1d2ef9b689e8_poet-rat_snatch.exe"
    1⤵
    • Drops file in Program Files directory
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1968
    • C:\Windows\system32\schtasks.exe
      C:\Windows\system32\schtasks.exe /CREATE /XML C:\Users\Admin\AppData\Local\Temp\stuJTQkOdGcpCKN /F /TN ChromeUpdateTaskMachinCore
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:1328
    • C:\Windows\System32\cmd.exe
      C:\Windows\System32\cmd.exe /c "C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:224
      • C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe
        "C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe"
        3⤵
        • Executes dropped EXE
        • Modifies system certificate store
        PID:4980

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe

    Filesize

    5.8MB

    MD5

    3bf32a10e4537a0f07a2a2267d0c216c

    SHA1

    955d2f8c738654bfbc4b828ddc445d14a0ae308b

    SHA256

    c88e6f7a6e0666c3514590ffc092c33b01699191f734e298ff41efc108a64d26

    SHA512

    cbe74ba2825af600ec2b6142cf04c7097b01a8114be97b3168535dec359f748dabb2925efd95916aeed0c26c8deb448b06fc987f3693c1bf59654b1c009a21a0

  • C:\Users\Admin\AppData\Local\Temp\stuJTQkOdGcpCKN

    Filesize

    1KB

    MD5

    f2985a784d08a1a1934324d8b2614b20

    SHA1

    72f24ae35004b6c323f9a18c383c8d0765d6cb07

    SHA256

    d84d141e8c9e894e2ac1224643e74e8bbeec7eb422bb2a8e4ede99ad1f89417d

    SHA512

    08f60512ec8f2879c3f976b52b3cf9fa3bbe943e15b2c599785785fc0aa9c20c818bdff862d199aa0166addc8156cbd7e92c1024f52dc983efe853fa66bb6d39