Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 20:23
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-12_ce9a68dc735510dddbd76989ae2adb76_poet-rat_snatch.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-10-12_ce9a68dc735510dddbd76989ae2adb76_poet-rat_snatch.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-12_ce9a68dc735510dddbd76989ae2adb76_poet-rat_snatch.exe
-
Size
12.6MB
-
MD5
ce9a68dc735510dddbd76989ae2adb76
-
SHA1
a10ee37a11940d27598db61018446b4b6ddd2b1c
-
SHA256
3b9a545a879e311ca105cdb79c25e2aa262e6b7c97812959be677d994e5afce0
-
SHA512
e7185d04fb76f52e4a8f877a606f84b5195048c903d64881c1e0aed8f4bc63fa7383e35879409d4f8d1f64174fd3c0f344a60210a5e97beb4c8a31e7fb8ffb34
-
SSDEEP
196608:pnfHEFsISrhTJyU69zK2OGOOcg3RQb0jLNtTYz3:pfHE6IC/GOOc8QY/ET
Malware Config
Signatures
-
Detect Lumma Stealer payload V2 2 IoCs
resource yara_rule behavioral2/files/0x0007000000023d2d-141.dat family_lumma_V2 behavioral2/memory/2840-164-0x0000000000400000-0x0000000000C41000-memory.dmp family_lumma_V2 -
Executes dropped EXE 1 IoCs
pid Process 2840 rqaiglb.exe -
Loads dropped DLL 2 IoCs
pid Process 2840 rqaiglb.exe 2840 rqaiglb.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\FovComputingManager = "C:\\Users\\Admin\\Steam\\saved\\adaptais\\rqaiglb.exe" rqaiglb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rqaiglb.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 2024-10-12_ce9a68dc735510dddbd76989ae2adb76_poet-rat_snatch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 2024-10-12_ce9a68dc735510dddbd76989ae2adb76_poet-rat_snatch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 2024-10-12_ce9a68dc735510dddbd76989ae2adb76_poet-rat_snatch.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe 2840 rqaiglb.exe -
Suspicious use of AdjustPrivilegeToken 56 IoCs
description pid Process Token: 33 2840 rqaiglb.exe Token: SeIncBasePriorityPrivilege 2840 rqaiglb.exe Token: 33 2840 rqaiglb.exe Token: SeIncBasePriorityPrivilege 2840 rqaiglb.exe Token: 33 2840 rqaiglb.exe Token: SeIncBasePriorityPrivilege 2840 rqaiglb.exe Token: 33 2840 rqaiglb.exe Token: SeIncBasePriorityPrivilege 2840 rqaiglb.exe Token: 33 2840 rqaiglb.exe Token: SeIncBasePriorityPrivilege 2840 rqaiglb.exe Token: 33 2840 rqaiglb.exe Token: SeIncBasePriorityPrivilege 2840 rqaiglb.exe Token: 33 2840 rqaiglb.exe Token: SeIncBasePriorityPrivilege 2840 rqaiglb.exe Token: 33 2840 rqaiglb.exe Token: SeIncBasePriorityPrivilege 2840 rqaiglb.exe Token: 33 2840 rqaiglb.exe Token: SeIncBasePriorityPrivilege 2840 rqaiglb.exe Token: 33 2840 rqaiglb.exe Token: SeIncBasePriorityPrivilege 2840 rqaiglb.exe Token: 33 2840 rqaiglb.exe Token: SeIncBasePriorityPrivilege 2840 rqaiglb.exe Token: 33 2840 rqaiglb.exe Token: SeIncBasePriorityPrivilege 2840 rqaiglb.exe Token: 33 2840 rqaiglb.exe Token: SeIncBasePriorityPrivilege 2840 rqaiglb.exe Token: 33 2840 rqaiglb.exe Token: SeIncBasePriorityPrivilege 2840 rqaiglb.exe Token: 33 2840 rqaiglb.exe Token: SeIncBasePriorityPrivilege 2840 rqaiglb.exe Token: 33 2840 rqaiglb.exe Token: SeIncBasePriorityPrivilege 2840 rqaiglb.exe Token: 33 2840 rqaiglb.exe Token: SeIncBasePriorityPrivilege 2840 rqaiglb.exe Token: 33 2840 rqaiglb.exe Token: SeIncBasePriorityPrivilege 2840 rqaiglb.exe Token: 33 2840 rqaiglb.exe Token: SeIncBasePriorityPrivilege 2840 rqaiglb.exe Token: 33 2840 rqaiglb.exe Token: SeIncBasePriorityPrivilege 2840 rqaiglb.exe Token: 33 2840 rqaiglb.exe Token: SeIncBasePriorityPrivilege 2840 rqaiglb.exe Token: 33 2840 rqaiglb.exe Token: SeIncBasePriorityPrivilege 2840 rqaiglb.exe Token: 33 2840 rqaiglb.exe Token: SeIncBasePriorityPrivilege 2840 rqaiglb.exe Token: 33 2840 rqaiglb.exe Token: SeIncBasePriorityPrivilege 2840 rqaiglb.exe Token: 33 2840 rqaiglb.exe Token: SeIncBasePriorityPrivilege 2840 rqaiglb.exe Token: 33 2840 rqaiglb.exe Token: SeIncBasePriorityPrivilege 2840 rqaiglb.exe Token: 33 2840 rqaiglb.exe Token: SeIncBasePriorityPrivilege 2840 rqaiglb.exe Token: 33 2840 rqaiglb.exe Token: SeIncBasePriorityPrivilege 2840 rqaiglb.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2840 rqaiglb.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3488 wrote to memory of 2216 3488 2024-10-12_ce9a68dc735510dddbd76989ae2adb76_poet-rat_snatch.exe 90 PID 3488 wrote to memory of 2216 3488 2024-10-12_ce9a68dc735510dddbd76989ae2adb76_poet-rat_snatch.exe 90 PID 2216 wrote to memory of 2840 2216 cmd.exe 92 PID 2216 wrote to memory of 2840 2216 cmd.exe 92 PID 2216 wrote to memory of 2840 2216 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-12_ce9a68dc735510dddbd76989ae2adb76_poet-rat_snatch.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-12_ce9a68dc735510dddbd76989ae2adb76_poet-rat_snatch.exe"1⤵
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Windows\system32\cmd.execmd /C start C:\Users\Admin\Steam\saved\adaptais\rqaiglb.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\Steam\saved\adaptais\rqaiglb.exeC:\Users\Admin\Steam\saved\adaptais\rqaiglb.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2840
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD5c3ff36f2afb368e84a140201f8a4d5fa
SHA1100fc97b76b191ff745f95b3455b5640b21f0269
SHA256720c936eced83ebdc3ef65ecb3af1018a2bad155188a71b1b61fc476f53e1464
SHA512cde9034094b65a4e328752bdcbf23db5c9846259b2f656c04f3000827ce0878721ccc1f9c9dd850cab292d1b5647dd07c0877090d082f76947942e611f4ad9cc
-
Filesize
13KB
MD598a324a8cee8c2bf63f54eaa762b5a86
SHA127965caca83b9927a7fcce2c8f0a52b5e806b679
SHA25628b8424812c76765ff26f44d3e709e404b0531ba602bc7b1029c8038ba4c1d97
SHA512198a9da2af3213a58557e111f768b8e97f36f4938c608c03cb4a6ca8aa2b8e1cd7924dc3e7847877faddd20a0153da88a1c20cd9b6fa5651695b2a127a83782e
-
Filesize
2.9MB
MD55d320299f6fcefe759626f0a07dde4f2
SHA1aee8914fb193e8ebb7e57e55ef054776ac1781b1
SHA2563c8a6e9126bf505b86a4e4176d9d45de2965117d14b11d42ab3359d631024e7e
SHA5127e9fc8446cc0bf985ddcf40b457431d723b8124bd43038999aca03b42a2785b194808f458d60a5a8031feaa22340898df8f048e42ce549850ce931f6cfe3da29
-
Filesize
1.3MB
MD591b03eb0187c15ec0a16249db67fb7c0
SHA1b225b461034b352d88f0ad9bd6abbabfee62cff8
SHA256f8302c368b2710a87aa69d99157f396f825bcbcea03b6b1bdf3808da54c45725
SHA512448943e22b1be7c869a8394b5c9747d4409c7ce833525dc0c7d910bf6c71640c436135e5ea86d55cf2eca490d38ef1aa35df96c4f983ea6ba981b913c5925997
-
Filesize
22KB
MD5ae556c1ba47966f102128bbae8c217f8
SHA1e0c7e29c400eefffdd493cb03e97b776b1b2d717
SHA256a1e806c79fa764cb481aa8bba5bca7f503c9f3711bf380503d588b0d6eccbd63
SHA51278eef37e4199dd34d560a5964d2fef14a2ce360692319661a7d155ffba87e32291715299a8e1592ff211ea3eb44a3f5f53ee918d8a3853727fec941210654cef
-
Filesize
14KB
MD57b1d0579348444cc11fb1cc3fbf00514
SHA14fb011cd891f7570573579cdc04dc1038b3a5563
SHA2569af7a22185117967727fe19c3db45e96c14cda3b0607eb576d3d9cca0de9f689
SHA5123cd89c0e3c43ab71852041ddc962a215fe411e7728989ba20481b7efe598aec3296c3174fdcd63c6908744800d784258e9195e27f7614cdb70131aa8db502880
-
Filesize
13KB
MD54ee840e71054942e6a2f28448c690d60
SHA113a4e387358245952320cbbb478295d4c047ba07
SHA256a11083ee812b6cc9a0e93ce75856ca16802024c3a13618a2f6c4859cdefa58b5
SHA512b8ac3bb249e6de012f54b772fc75c459a7b15afdab571e93a740a7a0b0f4d402d9210e26e7e472bbe7b982858edbb7f832194d9d62b3ae230ac6e9eea4ba963b
-
Filesize
8.2MB
MD50a5eb75d76c319da5f902b76c843a3c7
SHA1b2c8dd2194756001223568f6d1ff3e36f121d7d7
SHA25639222481d69aa4d92a5c4d5c094a86909ebff762f6336f1a186fa94d3cc01012
SHA512b5d58fbc14faf141d72b755a55c5f980ef5c86192a14b6534d2930f9f0198557909da060dd3bb81d72fbf5ab1ee0b690e772af99e9bf7025fb4913e4874bb7b0