Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 08:55
Static task
static1
Behavioral task
behavioral1
Sample
(电-子-发-票).exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
(电-子-发-票).exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral3
Sample
Dekont,pdf.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
Dekont,pdf.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
资金账户对账单导出.exe
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
资金账户对账单导出.exe
Resource
win10v2004-20230220-en
General
-
Target
资金账户对账单导出.exe
-
Size
6.7MB
-
MD5
3856a53ca2dca3c535746c194c7afb1d
-
SHA1
89b3c74be1520a0932fed53e783212fe092641cc
-
SHA256
7086ed025a5c4089495785a51fc9685e853e780eee24a1fefe695d486f0066a1
-
SHA512
85d4b667f670deeb48d5d782965be8c7a06bb236d4db31373b93ec2379d78c6b67add6f88c0240d14bf91b8e728f167ebbf99299df1bb4be246eeebaa4e960c8
-
SSDEEP
196608:LCj744gpV+cTnIknHCdzRFY4Mx53wOOj7Wl:LCjUfdbxnHcznY4M33TI
Malware Config
Signatures
-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Fatal Rat payload 1 IoCs
resource yara_rule behavioral6/memory/2100-138-0x0000000010000000-0x000000001002A000-memory.dmp fatalrat -
Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
pid Process 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 资金账户对账单导出.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 资金账户对账单导出.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2100 资金账户对账单导出.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2100 资金账户对账单导出.exe 2100 资金账户对账单导出.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\资金账户对账单导出.exe"C:\Users\Admin\AppData\Local\Temp\资金账户对账单导出.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2100