Analysis
-
max time kernel
124s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
06-08-2023 06:29
Static task
static1
Behavioral task
behavioral1
Sample
u9.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
u9.exe
Resource
win10-20230703-en
Behavioral task
behavioral3
Sample
u9.exe
Resource
win10v2004-20230703-en
General
-
Target
u9.exe
-
Size
4.5MB
-
MD5
92bd14c4a22b2aed0fe832f2b1174af0
-
SHA1
f08d2d2e6a6ffc92a7133d0ceaf01963cfaebe86
-
SHA256
7107606074d34bfb3d9a659b21bf84e55692b810b8e7d60c677b86b6477fdd7a
-
SHA512
bbc16c3595cf20a6aec3811975d8ae4121220f4549456dca9a4cc03e0d13131139736fa669d0dd941052f0cee25cf7d6d251e5cc61e34a22e712b19751c68b6a
-
SSDEEP
98304:sJizlahPkloq0/nubwpJPYSeHrNYgLVBwsrX:sJiQIoq+ubwpxANYs0sr
Malware Config
Signatures
-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Fatal Rat payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4752-12520-0x0000000010000000-0x000000001002A000-memory.dmp fatalrat -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
spolsvt.exeelf.exepid process 4752 spolsvt.exe 4800 elf.exe -
Loads dropped DLL 2 IoCs
Processes:
u9.exeelf.exepid process 4692 u9.exe 4800 elf.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
elf.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2393848421-2120571652-2495149697-1000\Software\Microsoft\Windows\CurrentVersion\Run\hxrobot = "C:\\Users\\Admin\\Documents\\robot\\elf.exe" elf.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 19 IoCs
Processes:
u9.exepid process 4692 u9.exe 4692 u9.exe 4692 u9.exe 4692 u9.exe 4692 u9.exe 4692 u9.exe 4692 u9.exe 4692 u9.exe 4692 u9.exe 4692 u9.exe 4692 u9.exe 4692 u9.exe 4692 u9.exe 4692 u9.exe 4692 u9.exe 4692 u9.exe 4692 u9.exe 4692 u9.exe 4692 u9.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
u9.exedescription pid process target process PID 4692 set thread context of 4752 4692 u9.exe spolsvt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
u9.exespolsvt.exepid process 4692 u9.exe 4692 u9.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe 4752 spolsvt.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
spolsvt.exedescription pid process Token: SeDebugPrivilege 4752 spolsvt.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
u9.exepid process 4692 u9.exe 4692 u9.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
u9.exedescription pid process target process PID 4692 wrote to memory of 4752 4692 u9.exe spolsvt.exe PID 4692 wrote to memory of 4752 4692 u9.exe spolsvt.exe PID 4692 wrote to memory of 4752 4692 u9.exe spolsvt.exe PID 4692 wrote to memory of 4752 4692 u9.exe spolsvt.exe PID 4692 wrote to memory of 4752 4692 u9.exe spolsvt.exe PID 4692 wrote to memory of 4752 4692 u9.exe spolsvt.exe PID 4692 wrote to memory of 4752 4692 u9.exe spolsvt.exe PID 4692 wrote to memory of 4752 4692 u9.exe spolsvt.exe PID 4692 wrote to memory of 4800 4692 u9.exe elf.exe PID 4692 wrote to memory of 4800 4692 u9.exe elf.exe PID 4692 wrote to memory of 4800 4692 u9.exe elf.exe PID 4692 wrote to memory of 3336 4692 u9.exe cmd.exe PID 4692 wrote to memory of 3336 4692 u9.exe cmd.exe PID 4692 wrote to memory of 3336 4692 u9.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\u9.exe"C:\Users\Admin\AppData\Local\Temp\u9.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Public\Documents\t\spolsvt.exeC:\Users\Public\Documents\t\spolsvt.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4752 -
C:\Users\Admin\Documents\robot\elf.exe"C:\Users\Admin\Documents\robot\elf.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:4800 -
C:\Windows\SysWOW64\cmd.execmd.exe /c del u9.exe2⤵PID:3336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
278KB
MD5c5587655293f83c72f0c88c74660dd10
SHA1675d7cac72e4caebebd7c2a88403d138b69acd89
SHA256a647aec65edb9736ad9bbc60a99779d18438b783b3a7045533de97ba4134f4fe
SHA5126b275764ba29dd5d2f789107de1b98095f42fe4929b725b5599136a6a626e32432fcb223ce1cf89050874102f0d24e6911c170e4d50a023dab4604c383380fd1
-
Filesize
510KB
MD547fe0ab041a9c28fe838eb1b11556e33
SHA1b7128f679230730cf477f3c081235de118c98960
SHA25629fc393b56fcfa4a242c7bc5177b0861072f35c7c8be2546115e0f34d059e2bf
SHA5127191170e244dac3b176bf89c67511b5938751471d84f73c58c3ff7fef3e6e1e70c3af5d3143cf3b66be461152b80845231fc6a3fafc31328193d47edd2961a40
-
Filesize
2.2MB
MD533922d12e5bb8f40ecddf816124ae93d
SHA128244217fa205f12cf40278e97a3a01e6d7366a3
SHA256255e4c5b81ddabc02455b7b4560e168b4064e63ec3721230201d1a7928c9f158
SHA5121fdc906fdf3a89105d8e8996ec58e26e4d802fbbc99004d2f9a13a94cabeabde104fd55135763d5b959d1741d53e06ca18879407864c1e37e0a8764df9ea1973
-
Filesize
2.2MB
MD533922d12e5bb8f40ecddf816124ae93d
SHA128244217fa205f12cf40278e97a3a01e6d7366a3
SHA256255e4c5b81ddabc02455b7b4560e168b4064e63ec3721230201d1a7928c9f158
SHA5121fdc906fdf3a89105d8e8996ec58e26e4d802fbbc99004d2f9a13a94cabeabde104fd55135763d5b959d1741d53e06ca18879407864c1e37e0a8764df9ea1973
-
Filesize
260B
MD52fdb0ba1aa4f2088d10468757490b3fc
SHA13757f286d6fa2585747bf6135eb8c927bc3145b8
SHA2566f1d5abe5173cab5a5d5553d6ebf4c78f0b0d587337c8c942c170acf24d9f02a
SHA512aba55dd158a645d76c05c5b4e226547b42619f123de30050963cced626b914dce7c79574eca4f222b6eaae3a0acfd737818a423fc4bdf1402a31979f859fdaaa
-
Filesize
629B
MD5f74ff1f559d4f5a7af7b09b00d17a3f7
SHA17ae57ae206977eb874cf1037e7dedb37cb464e4b
SHA2561ebba2b9a0d222642016121ca19ee5cd6d1b32f40b43bd57aed165dc8dcdf781
SHA512fc26f6af3c8e0d642a91e31e5060db94d7ed2cce33619a4d8e9b78c68b95b397db15863165ce536fbc364f2e361772ffb86be61e3d9a921011f167ca9c9d9c51
-
Filesize
1KB
MD5ee58358ad4380ad0da672cdb49247454
SHA1e99376e5eaa92538221789ff8f25768d83f0cf1e
SHA256633b462f98038aa0f9ab302d3cd0def8352fde79990af747b3c97b49ebab2103
SHA512eded6474a11deb02292682e3354b2d7d17ac898348f533fc13a74451fb5a312ec25a0de69bd40d2b9a4159e2284834277b47072b2e8990780f6783519b0dfda3
-
Filesize
671B
MD547fb824e5df4deb39e5b5342e833d8e4
SHA13196520d4dabefd5b4eb6c689210d5ce459476da
SHA25604fb5ba3130fb6cb99ce5d5ffa11a8df2d2c02fcb9dd3517d691bf97e0369289
SHA512fb64455995630400f73a4725e365e44c8d77dd1ccb534c2ba8a0ff50cf42c9b838abe7bf63e98596bc40466a3c7eafda29d7981564684772afd3cba136e6bb42
-
Filesize
142B
MD52084f8639c21c2b3a325173000175f41
SHA159e3b758d3557d5e005ce1be3e9bd60691925085
SHA256a95d5440caac07a22200206fac2e7c79eb2873684f685fe8200bda7875ce6ac9
SHA5123c9df2fc83e360f1a37577f6bc1a3ee2f2f17cb8ffdd378b097fc35f5eff843f20c22f743cb0448b8afeacc7f545005ffc09b5220f54934b92dcb36e2dd0ba5d
-
Filesize
16KB
MD5cdce4713e784ae069d73723034a957ff
SHA19a393a6bab6568f1a774fb753353223f11367e09
SHA256b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8
SHA5120a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f
-
Filesize
16KB
MD5cdce4713e784ae069d73723034a957ff
SHA19a393a6bab6568f1a774fb753353223f11367e09
SHA256b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8
SHA5120a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f
-
Filesize
278KB
MD5c5587655293f83c72f0c88c74660dd10
SHA1675d7cac72e4caebebd7c2a88403d138b69acd89
SHA256a647aec65edb9736ad9bbc60a99779d18438b783b3a7045533de97ba4134f4fe
SHA5126b275764ba29dd5d2f789107de1b98095f42fe4929b725b5599136a6a626e32432fcb223ce1cf89050874102f0d24e6911c170e4d50a023dab4604c383380fd1
-
Filesize
510KB
MD547fe0ab041a9c28fe838eb1b11556e33
SHA1b7128f679230730cf477f3c081235de118c98960
SHA25629fc393b56fcfa4a242c7bc5177b0861072f35c7c8be2546115e0f34d059e2bf
SHA5127191170e244dac3b176bf89c67511b5938751471d84f73c58c3ff7fef3e6e1e70c3af5d3143cf3b66be461152b80845231fc6a3fafc31328193d47edd2961a40