Analysis

  • max time kernel
    94s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2024, 22:46

General

  • Target

    2024-10-11_83ddddbf2b982d90eb5a30c08452c063_poet-rat_snatch.exe

  • Size

    9.7MB

  • MD5

    83ddddbf2b982d90eb5a30c08452c063

  • SHA1

    747f8f5c1375b26c3e9925230f4b2e562fa8ad15

  • SHA256

    2f7dd88bbe115ddc7ad751bdf7d862f22313b9cf78aa5b55c98c3b79aa223847

  • SHA512

    6666ffd7e1d355eeecbf6c7cf4fca302219b5599aafc77d5dc140035078718e1045369b834857ff3db3066a56ae95cb045fc88c82f5713a49d4aaa187759c197

  • SSDEEP

    98304:YgfkP4YnRtdPEIO1gcQ/5K6fMo7A1Em/eLl8kSaGPpI:H+Rtd0cJ3m/eLl8kS

Score
1/10

Malware Config

Signatures

  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-11_83ddddbf2b982d90eb5a30c08452c063_poet-rat_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-11_83ddddbf2b982d90eb5a30c08452c063_poet-rat_snatch.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1044
    • C:\Windows\system32\reg.exe
      reg query HKLM\SYSTEM\ControlSet001\Enum\USBSTOR
      2⤵
      • Modifies registry key
      PID:3664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads