Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08/06/2023, 19:15
Static task
static1
Behavioral task
behavioral1
Sample
f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe
Resource
win10v2004-20230220-en
General
-
Target
f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe
-
Size
136KB
-
MD5
86edc3658df8a67db32fcafb6a1e298f
-
SHA1
107e53392d6b7b8b24e31cc0aa98a20866a5cce1
-
SHA256
f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c
-
SHA512
44cc40afe5cd10699901c0bb22c0902c2ec096f4ff50e770f6de1d9e558227c845d7fade72ae74f3fac156158286a730d15d908eba36bbc61a36e7d0f74ad79e
-
SSDEEP
3072:SbsmeDtyVoD8oUnIB5BcyxyvZcMO/6T+:swpyVo4INRAZcR/6T
Malware Config
Signatures
-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Fatal Rat payload 4 IoCs
resource yara_rule behavioral2/memory/3800-152-0x0000000010000000-0x0000000010020000-memory.dmp fatalrat behavioral2/memory/3800-156-0x0000000003160000-0x000000000317E000-memory.dmp fatalrat behavioral2/memory/796-161-0x0000000010000000-0x0000000010020000-memory.dmp fatalrat behavioral2/memory/796-165-0x0000000004C50000-0x0000000004C6E000-memory.dmp fatalrat -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe -
Executes dropped EXE 2 IoCs
pid Process 796 Win Soft.exe 4456 Win Soft.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Win Soft.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Win Soft.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 796 Win Soft.exe 796 Win Soft.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3800 wrote to memory of 796 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 88 PID 3800 wrote to memory of 796 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 88 PID 3800 wrote to memory of 796 3800 f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe 88 PID 796 wrote to memory of 4456 796 Win Soft.exe 89 PID 796 wrote to memory of 4456 796 Win Soft.exe 89 PID 796 wrote to memory of 4456 796 Win Soft.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe"C:\Users\Admin\AppData\Local\Temp\f80f4efbba8fd17b87fa5f672340a64beb532fcd10a5ea4a913bc350aadda15c.exe"1⤵
- Checks computer location settings
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\ProgramData\Micsoft Windoews\Win Soft.exe"C:\ProgramData\Micsoft Windoews\Win Soft.exe"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:796 -
C:\ProgramData\Micsoft Windoews\Win Soft.exe"C:\ProgramData\Micsoft Windoews\Win Soft.exe"3⤵
- Executes dropped EXE
PID:4456
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.8MB
MD59068a3d8251716410e5baa7c95db8755
SHA1d92d985a74a27591718ea4fe50eee965823b0ea1
SHA25664b2695097ec03c0c7538389dc46641e0db93cf91f8cc6055dcc8d76637e28e5
SHA5125d56f33340b2ee7bbb39be857d5d4c51e1e0baa460c3941406ec67b473e7556d81fd79ea0730db8abe267a74361a74c84945a8ff6ab891bab20084144167dc80
-
Filesize
8.8MB
MD59068a3d8251716410e5baa7c95db8755
SHA1d92d985a74a27591718ea4fe50eee965823b0ea1
SHA25664b2695097ec03c0c7538389dc46641e0db93cf91f8cc6055dcc8d76637e28e5
SHA5125d56f33340b2ee7bbb39be857d5d4c51e1e0baa460c3941406ec67b473e7556d81fd79ea0730db8abe267a74361a74c84945a8ff6ab891bab20084144167dc80
-
Filesize
8.8MB
MD59068a3d8251716410e5baa7c95db8755
SHA1d92d985a74a27591718ea4fe50eee965823b0ea1
SHA25664b2695097ec03c0c7538389dc46641e0db93cf91f8cc6055dcc8d76637e28e5
SHA5125d56f33340b2ee7bbb39be857d5d4c51e1e0baa460c3941406ec67b473e7556d81fd79ea0730db8abe267a74361a74c84945a8ff6ab891bab20084144167dc80
-
Filesize
8.8MB
MD59068a3d8251716410e5baa7c95db8755
SHA1d92d985a74a27591718ea4fe50eee965823b0ea1
SHA25664b2695097ec03c0c7538389dc46641e0db93cf91f8cc6055dcc8d76637e28e5
SHA5125d56f33340b2ee7bbb39be857d5d4c51e1e0baa460c3941406ec67b473e7556d81fd79ea0730db8abe267a74361a74c84945a8ff6ab891bab20084144167dc80