Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/10/2024, 15:45

General

  • Target

    2024-10-14_0d66c289473d146b481d1014ad00a8fa_poet-rat_snatch.exe

  • Size

    5.8MB

  • MD5

    0d66c289473d146b481d1014ad00a8fa

  • SHA1

    ace4fd433ae0becf28e1ee2f081615f7c8b4b107

  • SHA256

    720c92346f7443174a3cf466a50580ba533d57f95781753fd35910a7f13f433f

  • SHA512

    cd0a28f85f710e20a6065dbd066eb1845d858e01305e5c89a44592dcb750f193096b17af562635851418a1d5a8125e978a6a932229d0d247be23ce7776eaad25

  • SSDEEP

    49152:vzlnEcO3Cgrb/TbvO90d7HjmAFd4A64nsfJa/pJMBMvDF/4q4auspdkgKKhdvZfa:63CE/Xx4LKhdkHESpF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-14_0d66c289473d146b481d1014ad00a8fa_poet-rat_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-14_0d66c289473d146b481d1014ad00a8fa_poet-rat_snatch.exe"
    1⤵
    • Drops file in Program Files directory
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1952
    • C:\Windows\system32\schtasks.exe
      C:\Windows\system32\schtasks.exe /CREATE /XML C:\Users\Admin\AppData\Local\Temp\IowOUYS /F /TN ChromeUpdateTaskMachinCore
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:1676
    • C:\Windows\System32\cmd.exe
      C:\Windows\System32\cmd.exe /c "C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2932
      • C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe
        "C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe"
        3⤵
        • Executes dropped EXE
        • Modifies system certificate store
        PID:3940

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe

    Filesize

    5.8MB

    MD5

    9ca95f861deaa33e59e20833d8e9445a

    SHA1

    e97719fde24b200c4f41883c6b749121b5bd5396

    SHA256

    05d36df560a7d531b1f29149ed383ee3a318f691d9a6b5383eace981bbef6bcb

    SHA512

    30a4ac396c84a5fc858ef8d3d8187dd82787ed3ce97da95147d4a998c2803db654044d704b39b3521c874db2685f592e405f8aa702cd4f49507fcb69bb5ea833

  • C:\Users\Admin\AppData\Local\Temp\IowOUYS

    Filesize

    1KB

    MD5

    45445ed276ed8f30e28f340ac1282385

    SHA1

    0778458c8280e0dd6579da7aa8899236f81f0628

    SHA256

    33714c53cba7ee4633f3dfa4dd43b2ee1dfbb914a9a15fa53e712fafa799280b

    SHA512

    ec2e3fd247f32836f19aeb7a975fb3d5ebac1d78726f4ceda0432dbdce94abae161650b21a4ecd34cfe18f5b231e90140fcaba2aa202a506d21baba965426382