Analysis

  • max time kernel
    91s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-02-2023 18:59

General

  • Target

    3632599571a4d48730d07a09343d1bde.dll

  • Size

    108KB

  • MD5

    3632599571a4d48730d07a09343d1bde

  • SHA1

    83b1ede8c8f10b92d7296d375fb0612e0b080da3

  • SHA256

    a3cd7a6ace2b75e39ea2a4ff5a3e4e27c840dc32606cd74990224814b2d3ac9d

  • SHA512

    947e71dbdad185c469cd04d5e0f5c1429098e3fe861f9f158e42348a937f85cedfb0892c09457d70547bf5e27cf880c05e49bdd1f8f431df9db3280b5573f9e7

  • SSDEEP

    1536:Oh3MU/5bLDCMtm/ejs5x2WcHG82RqNoRKV2KoyqkvILnzZh/Qz6r:mt5bLDtm/ejs5xqHG82RWqWILzZRQO

Malware Config

Signatures

  • FatalRat

    FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

  • Fatal Rat payload 2 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Drops file in System32 directory 8 IoCs
  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\3632599571a4d48730d07a09343d1bde.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4888
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\3632599571a4d48730d07a09343d1bde.dll,#1
      2⤵
      • Blocklisted process makes network request
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:4112
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k netsvcs -p
    1⤵
    • Drops file in System32 directory
    • Checks processor information in registry
    • Enumerates system info in registry
    PID:4356

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4112-134-0x00000000026A0000-0x00000000026EE000-memory.dmp

    Filesize

    312KB

  • memory/4112-135-0x0000000000DB0000-0x0000000000DD8000-memory.dmp

    Filesize

    160KB