Analysis
-
max time kernel
161s -
max time network
167s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 03:31
Behavioral task
behavioral1
Sample
d2c1eeaa94359fa6755d648652144d50.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d2c1eeaa94359fa6755d648652144d50.exe
Resource
win10v2004-20221111-en
General
-
Target
d2c1eeaa94359fa6755d648652144d50.exe
-
Size
92KB
-
MD5
d2c1eeaa94359fa6755d648652144d50
-
SHA1
b145b3e25eb5f0e390858208c4a4e20763c32377
-
SHA256
e8c0a00f7230e5bc8f1b56204ed6e9618411f9294f082e6a184f20d6d3c5b66b
-
SHA512
bd048edaaf937fe9dac757e496bf4b855e8906cc465ee49ad1c8018d951af7369b5814633374ca9be6e6848d36c2cd9a6fd55bfb839fa0864562acc604cb43c2
-
SSDEEP
1536:uSdoOrkNrU6Ul4cl7S082EBO05Pa3qSxMM07TcSAetXxXJXXEtCUetvy+YG3L1Yc:uSOGkNtcle03EBPavATccthXJi9+YKSV
Malware Config
Signatures
-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Fatal Rat payload 3 IoCs
resource yara_rule behavioral1/memory/972-55-0x0000000000400000-0x0000000000433000-memory.dmp fatalrat behavioral1/memory/972-56-0x0000000010000000-0x000000001002A000-memory.dmp fatalrat behavioral1/memory/1492-69-0x0000000000400000-0x0000000000433000-memory.dmp fatalrat -
Executes dropped EXE 1 IoCs
pid Process 1492 d2c1eeaa94359fa6755d648652144d50.exe -
resource yara_rule behavioral1/memory/972-55-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/files/0x000b0000000122f6-59.dat upx behavioral1/files/0x000b0000000122f6-60.dat upx behavioral1/files/0x000b0000000122f6-62.dat upx behavioral1/memory/1492-69-0x0000000000400000-0x0000000000433000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 972 d2c1eeaa94359fa6755d648652144d50.exe 972 d2c1eeaa94359fa6755d648652144d50.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run d2c1eeaa94359fa6755d648652144d50.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\SVP7 = "C:\\Users\\Admin\\AppData\\Local\\d2c1eeaa94359fa6755d648652144d50.exe" d2c1eeaa94359fa6755d648652144d50.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1492 d2c1eeaa94359fa6755d648652144d50.exe 1492 d2c1eeaa94359fa6755d648652144d50.exe 1492 d2c1eeaa94359fa6755d648652144d50.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 972 d2c1eeaa94359fa6755d648652144d50.exe Token: SeDebugPrivilege 1492 d2c1eeaa94359fa6755d648652144d50.exe Token: SeDebugPrivilege 1492 d2c1eeaa94359fa6755d648652144d50.exe Token: SeDebugPrivilege 1492 d2c1eeaa94359fa6755d648652144d50.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 972 wrote to memory of 1492 972 d2c1eeaa94359fa6755d648652144d50.exe 28 PID 972 wrote to memory of 1492 972 d2c1eeaa94359fa6755d648652144d50.exe 28 PID 972 wrote to memory of 1492 972 d2c1eeaa94359fa6755d648652144d50.exe 28 PID 972 wrote to memory of 1492 972 d2c1eeaa94359fa6755d648652144d50.exe 28 PID 1492 wrote to memory of 1156 1492 d2c1eeaa94359fa6755d648652144d50.exe 29 PID 1492 wrote to memory of 1156 1492 d2c1eeaa94359fa6755d648652144d50.exe 29 PID 1492 wrote to memory of 1156 1492 d2c1eeaa94359fa6755d648652144d50.exe 29 PID 1492 wrote to memory of 1156 1492 d2c1eeaa94359fa6755d648652144d50.exe 29 PID 1492 wrote to memory of 1156 1492 d2c1eeaa94359fa6755d648652144d50.exe 29 PID 1492 wrote to memory of 1156 1492 d2c1eeaa94359fa6755d648652144d50.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2c1eeaa94359fa6755d648652144d50.exe"C:\Users\Admin\AppData\Local\Temp\d2c1eeaa94359fa6755d648652144d50.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Users\Admin\AppData\Local\d2c1eeaa94359fa6755d648652144d50.exe"C:\Users\Admin\AppData\Local\d2c1eeaa94359fa6755d648652144d50.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵PID:1156
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5d2c1eeaa94359fa6755d648652144d50
SHA1b145b3e25eb5f0e390858208c4a4e20763c32377
SHA256e8c0a00f7230e5bc8f1b56204ed6e9618411f9294f082e6a184f20d6d3c5b66b
SHA512bd048edaaf937fe9dac757e496bf4b855e8906cc465ee49ad1c8018d951af7369b5814633374ca9be6e6848d36c2cd9a6fd55bfb839fa0864562acc604cb43c2
-
Filesize
92KB
MD5d2c1eeaa94359fa6755d648652144d50
SHA1b145b3e25eb5f0e390858208c4a4e20763c32377
SHA256e8c0a00f7230e5bc8f1b56204ed6e9618411f9294f082e6a184f20d6d3c5b66b
SHA512bd048edaaf937fe9dac757e496bf4b855e8906cc465ee49ad1c8018d951af7369b5814633374ca9be6e6848d36c2cd9a6fd55bfb839fa0864562acc604cb43c2
-
Filesize
92KB
MD5d2c1eeaa94359fa6755d648652144d50
SHA1b145b3e25eb5f0e390858208c4a4e20763c32377
SHA256e8c0a00f7230e5bc8f1b56204ed6e9618411f9294f082e6a184f20d6d3c5b66b
SHA512bd048edaaf937fe9dac757e496bf4b855e8906cc465ee49ad1c8018d951af7369b5814633374ca9be6e6848d36c2cd9a6fd55bfb839fa0864562acc604cb43c2