Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 11:58
Static task
static1
Behavioral task
behavioral1
Sample
EduCefWarper.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
EduCefWarper.dll
Resource
win10v2004-20220414-en
General
-
Target
EduCefWarper.dll
-
Size
1.1MB
-
MD5
55c32cb9a881b49bcc0d1b36868a3e98
-
SHA1
e0d623b55e5e307540d05a55fadc323d9615d3b2
-
SHA256
8795836a86dc61f9fe1d4b3f798ebf3a4c1900ddac2f207f4d1f46e87b85850f
-
SHA512
dba66ec3002d7f08bc17c63b34028775d5d9dde7c0c3cd0778e120aba0a273ed130924954a23fcdbbcac4c10c76c991712895ff971979a9a865632bb659e0414
Malware Config
Signatures
-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
suricata: ET MALWARE FatalRAT CnC Activity
suricata: ET MALWARE FatalRAT CnC Activity
-
Fatal Rat Payload 2 IoCs
resource yara_rule behavioral2/memory/4200-1484-0x0000000001540000-0x000000000155D000-memory.dmp fatalrat behavioral2/memory/4200-1485-0x0000000010000000-0x00000000100E7000-memory.dmp fatalrat -
Executes dropped EXE 1 IoCs
pid Process 4200 ApplicationFrame.exe -
Sets service image path in registry 2 TTPs
-
Loads dropped DLL 1 IoCs
pid Process 4200 ApplicationFrame.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\software\WOW6432Node\microsoft\windows\CurrentVersion\Run rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Éù¿¨Çý¶¯ = "C:\\Windows\\SysWOW64\\rundll32.exe" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Public\\Downloads\\Tencente\\YYDS\\ApplicationFrame.exe" ApplicationFrame.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\TestDriver.sys rundll32.exe File created C:\Windows\SysWOW64\AAscit.exe rundll32.exe File created C:\Windows\SysWOW64\Perl510.dll rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4200 ApplicationFrame.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ApplicationFrame.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ApplicationFrame.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@%SystemRoot%\system32\hnetcfgclient.dll,-201 = "HNetCfg Client" svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4324 rundll32.exe 4324 rundll32.exe 4324 rundll32.exe 4324 rundll32.exe 4324 rundll32.exe 4324 rundll32.exe 4324 rundll32.exe 4324 rundll32.exe 4324 rundll32.exe 4324 rundll32.exe 4324 rundll32.exe 4324 rundll32.exe 4324 rundll32.exe 4324 rundll32.exe 4324 rundll32.exe 4324 rundll32.exe 4324 rundll32.exe 4324 rundll32.exe 4324 rundll32.exe 4324 rundll32.exe 4324 rundll32.exe 4324 rundll32.exe 4324 rundll32.exe 4324 rundll32.exe 4324 rundll32.exe 4324 rundll32.exe 4324 rundll32.exe 4324 rundll32.exe 4324 rundll32.exe 4324 rundll32.exe 4200 ApplicationFrame.exe 4200 ApplicationFrame.exe 4200 ApplicationFrame.exe 4200 ApplicationFrame.exe 4200 ApplicationFrame.exe 4200 ApplicationFrame.exe 4200 ApplicationFrame.exe 4200 ApplicationFrame.exe 4200 ApplicationFrame.exe 4200 ApplicationFrame.exe 4200 ApplicationFrame.exe 4200 ApplicationFrame.exe 4200 ApplicationFrame.exe 4200 ApplicationFrame.exe 4200 ApplicationFrame.exe 4200 ApplicationFrame.exe 4200 ApplicationFrame.exe 4200 ApplicationFrame.exe 4200 ApplicationFrame.exe 4200 ApplicationFrame.exe 4200 ApplicationFrame.exe 4200 ApplicationFrame.exe 4200 ApplicationFrame.exe 4200 ApplicationFrame.exe 4200 ApplicationFrame.exe 4200 ApplicationFrame.exe 4200 ApplicationFrame.exe 4200 ApplicationFrame.exe 4200 ApplicationFrame.exe 4200 ApplicationFrame.exe 4200 ApplicationFrame.exe 4200 ApplicationFrame.exe 4200 ApplicationFrame.exe 4200 ApplicationFrame.exe -
Suspicious behavior: LoadsDriver 4 IoCs
pid Process 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeShutdownPrivilege 216 svchost.exe Token: SeCreatePagefilePrivilege 216 svchost.exe Token: SeLoadDriverPrivilege 4420 svchost.exe Token: SeLoadDriverPrivilege 4420 svchost.exe Token: SeDebugPrivilege 4200 ApplicationFrame.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4532 wrote to memory of 4324 4532 rundll32.exe 83 PID 4532 wrote to memory of 4324 4532 rundll32.exe 83 PID 4532 wrote to memory of 4324 4532 rundll32.exe 83 PID 4324 wrote to memory of 4200 4324 rundll32.exe 88 PID 4324 wrote to memory of 4200 4324 rundll32.exe 88 PID 4324 wrote to memory of 4200 4324 rundll32.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\EduCefWarper.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\EduCefWarper.dll,#12⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Users\Public\Downloads\Tencente\YYDS\ApplicationFrame.exeC:\Users\Public\Downloads\Tencente\YYDS\ApplicationFrame.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4200
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s Netman1⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4420
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s NetSetupSvc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:216
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD58b7741a2ae1664d9f1e45c3db481d896
SHA1e841741c443fab28c4370e1404106c104e0b139b
SHA2563b79bc26d722162b14619636e96efe06f9586da5fad9d7673555be99bf194e82
SHA5124ec159948450af0d2deab7bb9f4ea6e83503b1f61d4322c6dbef90f0fb7a101158886712124862c8f52c73eb9928b6028ea01608b7a19269c28bd7b1876ae5cc
-
Filesize
44KB
MD58b7741a2ae1664d9f1e45c3db481d896
SHA1e841741c443fab28c4370e1404106c104e0b139b
SHA2563b79bc26d722162b14619636e96efe06f9586da5fad9d7673555be99bf194e82
SHA5124ec159948450af0d2deab7bb9f4ea6e83503b1f61d4322c6dbef90f0fb7a101158886712124862c8f52c73eb9928b6028ea01608b7a19269c28bd7b1876ae5cc
-
Filesize
924KB
MD5dbf8b9ab8ae650d5b452240c0e9c90df
SHA11215872c6f7306d6ba14133eb706483f04445885
SHA2569c7feb98fb5804f1f80dd03db1f84a06b68ea6043d2d34ab53edce82b83827b2
SHA512f9ab16d7946f4dfab4abbe368d6863dbaa1e0c49b6b051ff44eecdf0053ee0d1204272b08ffc925d76335874ca1099ebebc84ba80be3aa9c9bd5e5007a62d3a9
-
Filesize
924KB
MD5dbf8b9ab8ae650d5b452240c0e9c90df
SHA11215872c6f7306d6ba14133eb706483f04445885
SHA2569c7feb98fb5804f1f80dd03db1f84a06b68ea6043d2d34ab53edce82b83827b2
SHA512f9ab16d7946f4dfab4abbe368d6863dbaa1e0c49b6b051ff44eecdf0053ee0d1204272b08ffc925d76335874ca1099ebebc84ba80be3aa9c9bd5e5007a62d3a9