Analysis
-
max time kernel
181s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 03:31
Behavioral task
behavioral1
Sample
d2c1eeaa94359fa6755d648652144d50.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d2c1eeaa94359fa6755d648652144d50.exe
Resource
win10v2004-20221111-en
General
-
Target
d2c1eeaa94359fa6755d648652144d50.exe
-
Size
92KB
-
MD5
d2c1eeaa94359fa6755d648652144d50
-
SHA1
b145b3e25eb5f0e390858208c4a4e20763c32377
-
SHA256
e8c0a00f7230e5bc8f1b56204ed6e9618411f9294f082e6a184f20d6d3c5b66b
-
SHA512
bd048edaaf937fe9dac757e496bf4b855e8906cc465ee49ad1c8018d951af7369b5814633374ca9be6e6848d36c2cd9a6fd55bfb839fa0864562acc604cb43c2
-
SSDEEP
1536:uSdoOrkNrU6Ul4cl7S082EBO05Pa3qSxMM07TcSAetXxXJXXEtCUetvy+YG3L1Yc:uSOGkNtcle03EBPavATccthXJi9+YKSV
Malware Config
Signatures
-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Fatal Rat payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3208-132-0x0000000000400000-0x0000000000433000-memory.dmp fatalrat behavioral2/memory/3208-133-0x0000000010000000-0x000000001002A000-memory.dmp fatalrat behavioral2/memory/3604-142-0x0000000000400000-0x0000000000433000-memory.dmp fatalrat -
Executes dropped EXE 1 IoCs
Processes:
d2c1eeaa94359fa6755d648652144d50.exepid process 3604 d2c1eeaa94359fa6755d648652144d50.exe -
Processes:
resource yara_rule behavioral2/memory/3208-132-0x0000000000400000-0x0000000000433000-memory.dmp upx C:\Users\Admin\AppData\Local\d2c1eeaa94359fa6755d648652144d50.exe upx C:\Users\Admin\AppData\Local\d2c1eeaa94359fa6755d648652144d50.exe upx behavioral2/memory/3604-142-0x0000000000400000-0x0000000000433000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
d2c1eeaa94359fa6755d648652144d50.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation d2c1eeaa94359fa6755d648652144d50.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
d2c1eeaa94359fa6755d648652144d50.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SVP7 = "C:\\Users\\Admin\\AppData\\Local\\d2c1eeaa94359fa6755d648652144d50.exe" d2c1eeaa94359fa6755d648652144d50.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run d2c1eeaa94359fa6755d648652144d50.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
d2c1eeaa94359fa6755d648652144d50.exepid process 3604 d2c1eeaa94359fa6755d648652144d50.exe 3604 d2c1eeaa94359fa6755d648652144d50.exe 3604 d2c1eeaa94359fa6755d648652144d50.exe 3604 d2c1eeaa94359fa6755d648652144d50.exe 3604 d2c1eeaa94359fa6755d648652144d50.exe 3604 d2c1eeaa94359fa6755d648652144d50.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
d2c1eeaa94359fa6755d648652144d50.exed2c1eeaa94359fa6755d648652144d50.exedescription pid process Token: SeDebugPrivilege 3208 d2c1eeaa94359fa6755d648652144d50.exe Token: SeDebugPrivilege 3604 d2c1eeaa94359fa6755d648652144d50.exe Token: SeDebugPrivilege 3604 d2c1eeaa94359fa6755d648652144d50.exe Token: SeDebugPrivilege 3604 d2c1eeaa94359fa6755d648652144d50.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
d2c1eeaa94359fa6755d648652144d50.exed2c1eeaa94359fa6755d648652144d50.exedescription pid process target process PID 3208 wrote to memory of 3604 3208 d2c1eeaa94359fa6755d648652144d50.exe d2c1eeaa94359fa6755d648652144d50.exe PID 3208 wrote to memory of 3604 3208 d2c1eeaa94359fa6755d648652144d50.exe d2c1eeaa94359fa6755d648652144d50.exe PID 3208 wrote to memory of 3604 3208 d2c1eeaa94359fa6755d648652144d50.exe d2c1eeaa94359fa6755d648652144d50.exe PID 3604 wrote to memory of 2588 3604 d2c1eeaa94359fa6755d648652144d50.exe notepad.exe PID 3604 wrote to memory of 2588 3604 d2c1eeaa94359fa6755d648652144d50.exe notepad.exe PID 3604 wrote to memory of 2588 3604 d2c1eeaa94359fa6755d648652144d50.exe notepad.exe PID 3604 wrote to memory of 2588 3604 d2c1eeaa94359fa6755d648652144d50.exe notepad.exe PID 3604 wrote to memory of 2588 3604 d2c1eeaa94359fa6755d648652144d50.exe notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2c1eeaa94359fa6755d648652144d50.exe"C:\Users\Admin\AppData\Local\Temp\d2c1eeaa94359fa6755d648652144d50.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Users\Admin\AppData\Local\d2c1eeaa94359fa6755d648652144d50.exe"C:\Users\Admin\AppData\Local\d2c1eeaa94359fa6755d648652144d50.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵PID:2588
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5d2c1eeaa94359fa6755d648652144d50
SHA1b145b3e25eb5f0e390858208c4a4e20763c32377
SHA256e8c0a00f7230e5bc8f1b56204ed6e9618411f9294f082e6a184f20d6d3c5b66b
SHA512bd048edaaf937fe9dac757e496bf4b855e8906cc465ee49ad1c8018d951af7369b5814633374ca9be6e6848d36c2cd9a6fd55bfb839fa0864562acc604cb43c2
-
Filesize
92KB
MD5d2c1eeaa94359fa6755d648652144d50
SHA1b145b3e25eb5f0e390858208c4a4e20763c32377
SHA256e8c0a00f7230e5bc8f1b56204ed6e9618411f9294f082e6a184f20d6d3c5b66b
SHA512bd048edaaf937fe9dac757e496bf4b855e8906cc465ee49ad1c8018d951af7369b5814633374ca9be6e6848d36c2cd9a6fd55bfb839fa0864562acc604cb43c2