Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    21-05-2022 11:58

General

  • Target

    EduCefWarper.dll

  • Size

    1.1MB

  • MD5

    55c32cb9a881b49bcc0d1b36868a3e98

  • SHA1

    e0d623b55e5e307540d05a55fadc323d9615d3b2

  • SHA256

    8795836a86dc61f9fe1d4b3f798ebf3a4c1900ddac2f207f4d1f46e87b85850f

  • SHA512

    dba66ec3002d7f08bc17c63b34028775d5d9dde7c0c3cd0778e120aba0a273ed130924954a23fcdbbcac4c10c76c991712895ff971979a9a865632bb659e0414

Malware Config

Signatures

  • FatalRat

    FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

  • suricata: ET MALWARE FatalRAT CnC Activity

    suricata: ET MALWARE FatalRAT CnC Activity

  • Fatal Rat Payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Sets service image path in registry 2 TTPs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Drops file in System32 directory 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\EduCefWarper.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4532
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\EduCefWarper.dll,#1
      2⤵
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4324
      • C:\Users\Public\Downloads\Tencente\YYDS\ApplicationFrame.exe
        C:\Users\Public\Downloads\Tencente\YYDS\ApplicationFrame.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4200
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s Netman
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:4420
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k netsvcs -p -s NetSetupSvc
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:216

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Public\Downloads\Tencente\YYDS\ApplicationFrame.exe

    Filesize

    44KB

    MD5

    8b7741a2ae1664d9f1e45c3db481d896

    SHA1

    e841741c443fab28c4370e1404106c104e0b139b

    SHA256

    3b79bc26d722162b14619636e96efe06f9586da5fad9d7673555be99bf194e82

    SHA512

    4ec159948450af0d2deab7bb9f4ea6e83503b1f61d4322c6dbef90f0fb7a101158886712124862c8f52c73eb9928b6028ea01608b7a19269c28bd7b1876ae5cc

  • C:\Users\Public\Downloads\Tencente\YYDS\ApplicationFrame.exe

    Filesize

    44KB

    MD5

    8b7741a2ae1664d9f1e45c3db481d896

    SHA1

    e841741c443fab28c4370e1404106c104e0b139b

    SHA256

    3b79bc26d722162b14619636e96efe06f9586da5fad9d7673555be99bf194e82

    SHA512

    4ec159948450af0d2deab7bb9f4ea6e83503b1f61d4322c6dbef90f0fb7a101158886712124862c8f52c73eb9928b6028ea01608b7a19269c28bd7b1876ae5cc

  • C:\Users\Public\Downloads\Tencente\YYDS\Perl510.dll

    Filesize

    924KB

    MD5

    dbf8b9ab8ae650d5b452240c0e9c90df

    SHA1

    1215872c6f7306d6ba14133eb706483f04445885

    SHA256

    9c7feb98fb5804f1f80dd03db1f84a06b68ea6043d2d34ab53edce82b83827b2

    SHA512

    f9ab16d7946f4dfab4abbe368d6863dbaa1e0c49b6b051ff44eecdf0053ee0d1204272b08ffc925d76335874ca1099ebebc84ba80be3aa9c9bd5e5007a62d3a9

  • C:\Users\Public\Downloads\Tencente\YYDS\perl510.dll

    Filesize

    924KB

    MD5

    dbf8b9ab8ae650d5b452240c0e9c90df

    SHA1

    1215872c6f7306d6ba14133eb706483f04445885

    SHA256

    9c7feb98fb5804f1f80dd03db1f84a06b68ea6043d2d34ab53edce82b83827b2

    SHA512

    f9ab16d7946f4dfab4abbe368d6863dbaa1e0c49b6b051ff44eecdf0053ee0d1204272b08ffc925d76335874ca1099ebebc84ba80be3aa9c9bd5e5007a62d3a9

  • memory/4200-136-0x00000000777E0000-0x0000000077983000-memory.dmp

    Filesize

    1.6MB

  • memory/4200-137-0x00000000769C0000-0x0000000076BD5000-memory.dmp

    Filesize

    2.1MB

  • memory/4200-139-0x0000000075900000-0x0000000075AA0000-memory.dmp

    Filesize

    1.6MB

  • memory/4200-140-0x0000000075FF0000-0x000000007606A000-memory.dmp

    Filesize

    488KB

  • memory/4200-1484-0x0000000001540000-0x000000000155D000-memory.dmp

    Filesize

    116KB

  • memory/4200-1485-0x0000000010000000-0x00000000100E7000-memory.dmp

    Filesize

    924KB

  • memory/4200-1486-0x00000000052D0000-0x00000000053D0000-memory.dmp

    Filesize

    1024KB