Analysis
-
max time kernel
91s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
17-02-2023 20:52
Behavioral task
behavioral1
Sample
34c70475f657861d20276abb440d9c8d02ad393e7f0769ad3a74c1cdc8f2b289.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
34c70475f657861d20276abb440d9c8d02ad393e7f0769ad3a74c1cdc8f2b289.exe
Resource
win10v2004-20221111-en
General
-
Target
34c70475f657861d20276abb440d9c8d02ad393e7f0769ad3a74c1cdc8f2b289.exe
-
Size
176KB
-
MD5
b51790ddbba1775b3d4a2c2d21f8b138
-
SHA1
b118e50acb76fc7078a28d68260972d594e75bb3
-
SHA256
34c70475f657861d20276abb440d9c8d02ad393e7f0769ad3a74c1cdc8f2b289
-
SHA512
3981108313ac2f5fdebe062f11c6e6297de589de4adf1e4307a300e4bb4fb1d1d8b994acf0ee4f11c6a0a0351f600f17afa2107a47bec58d8caa6510fc36750e
-
SSDEEP
3072:ZU+rdTSw8IPpU+FsXdmH64W/qNEwwCioeFNdRFjHUGkKsWJcdKi7IW8:ZjrdWmPCBA6YHHcF6WGdKCP
Malware Config
Signatures
-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Fatal Rat payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4388-146-0x0000000004EB0000-0x0000000004ED8000-memory.dmp fatalrat behavioral2/memory/4388-149-0x00000000050F0000-0x000000000513E000-memory.dmp fatalrat -
Downloads MZ/PE file
-
Processes:
resource yara_rule C:\Users\Public\QQ\Application.exe aspack_v212_v242 C:\Users\Public\QQ\Application.exe aspack_v212_v242 -
Executes dropped EXE 2 IoCs
Processes:
Updaater.exeApplication.exepid process 4388 Updaater.exe 4588 Application.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Updaater.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Updaater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Updaater.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
34c70475f657861d20276abb440d9c8d02ad393e7f0769ad3a74c1cdc8f2b289.exeApplication.exeUpdaater.exepid process 4876 34c70475f657861d20276abb440d9c8d02ad393e7f0769ad3a74c1cdc8f2b289.exe 4876 34c70475f657861d20276abb440d9c8d02ad393e7f0769ad3a74c1cdc8f2b289.exe 4588 Application.exe 4588 Application.exe 4588 Application.exe 4588 Application.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe 4388 Updaater.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Application.exedescription pid process Token: SeDebugPrivilege 4588 Application.exe Token: SeDebugPrivilege 4588 Application.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Updaater.exepid process 4388 Updaater.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
34c70475f657861d20276abb440d9c8d02ad393e7f0769ad3a74c1cdc8f2b289.execmd.execmd.exedescription pid process target process PID 4876 wrote to memory of 2932 4876 34c70475f657861d20276abb440d9c8d02ad393e7f0769ad3a74c1cdc8f2b289.exe cmd.exe PID 4876 wrote to memory of 2932 4876 34c70475f657861d20276abb440d9c8d02ad393e7f0769ad3a74c1cdc8f2b289.exe cmd.exe PID 4876 wrote to memory of 2932 4876 34c70475f657861d20276abb440d9c8d02ad393e7f0769ad3a74c1cdc8f2b289.exe cmd.exe PID 2932 wrote to memory of 4388 2932 cmd.exe Updaater.exe PID 2932 wrote to memory of 4388 2932 cmd.exe Updaater.exe PID 2932 wrote to memory of 4388 2932 cmd.exe Updaater.exe PID 4876 wrote to memory of 3216 4876 34c70475f657861d20276abb440d9c8d02ad393e7f0769ad3a74c1cdc8f2b289.exe cmd.exe PID 4876 wrote to memory of 3216 4876 34c70475f657861d20276abb440d9c8d02ad393e7f0769ad3a74c1cdc8f2b289.exe cmd.exe PID 4876 wrote to memory of 3216 4876 34c70475f657861d20276abb440d9c8d02ad393e7f0769ad3a74c1cdc8f2b289.exe cmd.exe PID 3216 wrote to memory of 4588 3216 cmd.exe Application.exe PID 3216 wrote to memory of 4588 3216 cmd.exe Application.exe PID 3216 wrote to memory of 4588 3216 cmd.exe Application.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\34c70475f657861d20276abb440d9c8d02ad393e7f0769ad3a74c1cdc8f2b289.exe"C:\Users\Admin\AppData\Local\Temp\34c70475f657861d20276abb440d9c8d02ad393e7f0769ad3a74c1cdc8f2b289.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c start C:\Users\Public\QQ\Updaater.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Public\QQ\Updaater.exeC:\Users\Public\QQ\Updaater.exe3⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c start C:\Users\Public\QQ\Application.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Public\QQ\Application.exeC:\Users\Public\QQ\Application.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Public\QQ\Application.exeFilesize
87KB
MD5940ab9fc18380a00dd82e1c6328fa92f
SHA1dfe975d50d5c190c0666332740b3ed2747e9eaf6
SHA2568367c91c8ad10fe8de7b166c9644fab7c577ba68f79c6ebfde9e6d8f3f917d6b
SHA512bf3db349476bcafada7e9f7fd0a7bee19b6e3e089e90c87beedabc65e7c96006f2091625d87ec5d5337a4475d05f046ef24b4397911f71110921d04df962a433
-
C:\Users\Public\QQ\Application.exeFilesize
87KB
MD5940ab9fc18380a00dd82e1c6328fa92f
SHA1dfe975d50d5c190c0666332740b3ed2747e9eaf6
SHA2568367c91c8ad10fe8de7b166c9644fab7c577ba68f79c6ebfde9e6d8f3f917d6b
SHA512bf3db349476bcafada7e9f7fd0a7bee19b6e3e089e90c87beedabc65e7c96006f2091625d87ec5d5337a4475d05f046ef24b4397911f71110921d04df962a433
-
C:\Users\Public\QQ\Updaater.exeFilesize
176KB
MD59ca0b6d4b98cd17fd73617442d4fdbd3
SHA10e19d4b8d05b9b4517121157cdca8f31ececc9c3
SHA25684397eb06ac563cfc61c29ca0545e93a03335a289976faa254d63cebb8779687
SHA5128550cf667efa26a74c42ab1e8e8cb646c997a3918246b45720c1bec917c902382856cd952d3adbc6939f8d1d2ada21241e1752f4840bd8331345d4bc99370201
-
C:\Users\Public\QQ\Updaater.exeFilesize
176KB
MD59ca0b6d4b98cd17fd73617442d4fdbd3
SHA10e19d4b8d05b9b4517121157cdca8f31ececc9c3
SHA25684397eb06ac563cfc61c29ca0545e93a03335a289976faa254d63cebb8779687
SHA5128550cf667efa26a74c42ab1e8e8cb646c997a3918246b45720c1bec917c902382856cd952d3adbc6939f8d1d2ada21241e1752f4840bd8331345d4bc99370201
-
memory/2932-135-0x0000000000000000-mapping.dmp
-
memory/3216-139-0x0000000000000000-mapping.dmp
-
memory/4388-149-0x00000000050F0000-0x000000000513E000-memory.dmpFilesize
312KB
-
memory/4388-146-0x0000000004EB0000-0x0000000004ED8000-memory.dmpFilesize
160KB
-
memory/4388-136-0x0000000000000000-mapping.dmp
-
memory/4588-140-0x0000000000000000-mapping.dmp
-
memory/4588-144-0x0000000000820000-0x000000000084E000-memory.dmpFilesize
184KB
-
memory/4588-145-0x0000000000820000-0x000000000084E000-memory.dmpFilesize
184KB
-
memory/4876-132-0x00000000003C0000-0x000000000043E000-memory.dmpFilesize
504KB
-
memory/4876-143-0x00000000003C0000-0x000000000043E000-memory.dmpFilesize
504KB
-
memory/4876-134-0x00000000003C0000-0x000000000043E000-memory.dmpFilesize
504KB
-
memory/4876-133-0x00000000003C0000-0x000000000043E000-memory.dmpFilesize
504KB