Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2024, 17:12

General

  • Target

    2024-10-12_8e55cdf110c1bf7670735266ba61e6c2_poet-rat_snatch.exe

  • Size

    5.8MB

  • MD5

    8e55cdf110c1bf7670735266ba61e6c2

  • SHA1

    bbc5159f9d37e9942baf0b9c24962cc49a8f8524

  • SHA256

    88bf3a06fa0b03b255b493b31ca0a73f2e111aaf7509c57047d5ddc2d45cf270

  • SHA512

    27d244a6e7dcc99c4e66d422a2553a4d807a953da6b50957ec660151f716c14fe5f00bca937a04c064b8514b59611a374944faeac8b31c42d9a62aa34a68c4a8

  • SSDEEP

    49152:vzlnEcO3Cgrb/TbvO90d7HjmAFd4A64nsfJa/pJMBMvDF/4q4auspdkgKKhdvZfi:63CE/Xx4LKhdkcESp

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-12_8e55cdf110c1bf7670735266ba61e6c2_poet-rat_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-12_8e55cdf110c1bf7670735266ba61e6c2_poet-rat_snatch.exe"
    1⤵
    • Drops file in Program Files directory
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4080
    • C:\Windows\system32\schtasks.exe
      C:\Windows\system32\schtasks.exe /CREATE /XML C:\Users\Admin\AppData\Local\Temp\ZzhUHCaHiajU /F /TN ChromeUpdateTaskMachinCore
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:2832
    • C:\Windows\System32\cmd.exe
      C:\Windows\System32\cmd.exe /c "C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1896
      • C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe
        "C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe"
        3⤵
        • Executes dropped EXE
        • Modifies system certificate store
        PID:2012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe

    Filesize

    5.8MB

    MD5

    4b50838054463daceea6006c336ef6ce

    SHA1

    d3a61ca5c488573b2e0018d6fe1277ddf6f15275

    SHA256

    b23c860f32bcdec9c3e05a1e2e018abbaa7cf3432f1f1119e6733a72ce16f1b1

    SHA512

    1216930796f5da81f73b48fbdcff191b00dcdb9b5543d2a1d8c4394a22b67b93d21c1e21a0002d014c1270c8753baa06fc30fd74db2fa082fc625ae6306975dc

  • C:\Users\Admin\AppData\Local\Temp\ZzhUHCaHiajU

    Filesize

    1KB

    MD5

    f0dabfa19a9e99a8dc75b165aa0c4010

    SHA1

    93c0bf8ddc3c9f071c7a8fc4218eeab53f721471

    SHA256

    59d0f27f74f284fac4d7ce92d65b0ff0cb89068ad6878d173186f6cf3715ad45

    SHA512

    2e3f7ba676ba2947e56025032347257e60409d97c4380680f7deeab79878e5d5dcb4989b3c4cb02040e5215a6a3197e6cd0d63ab4c66e76deadd11feef484b1b