Analysis

  • max time kernel
    121s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    10-08-2023 12:06

General

  • Target

    c04e31d99459edf3a093e49d163f2f650ba789a1b3c6c7c98f26af14909615b2.exe

  • Size

    236KB

  • MD5

    bebcd675fed7940179932dd5aa63b61c

  • SHA1

    bace66cdc1a67a7b32bd7fdd882f2781b9dac672

  • SHA256

    c04e31d99459edf3a093e49d163f2f650ba789a1b3c6c7c98f26af14909615b2

  • SHA512

    d50ece5d75d0aefe741c35874817972a73bc642d33a5a4074a07ab57bbcbaf76a0c3d2e42be2ae0f3ddf59957197019619bf61746818473eb26f22757d8a434d

  • SSDEEP

    6144:pGgyduw1wqkQ5Qc3yHnFjBq0EAkYIkRHXkYIkRH:p4jZkQCieFpzxHXxH

Malware Config

Signatures

  • FatalRat

    FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

  • Fatal Rat payload 1 IoCs
  • Downloads MZ/PE file
  • ASPack v2.12-2.42 4 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 52 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c04e31d99459edf3a093e49d163f2f650ba789a1b3c6c7c98f26af14909615b2.exe
    "C:\Users\Admin\AppData\Local\Temp\c04e31d99459edf3a093e49d163f2f650ba789a1b3c6c7c98f26af14909615b2.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2300
    • C:\Users\Public\Documents\Admin558\Adam.exe
      C:\Users\Public\Documents\Admin558\Adam.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1488
    • C:\Users\Public\Documents\Admin558\Taskmg.exe
      C:\Users\Public\Documents\Admin558\Taskmg.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\CabC257.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarC3A2.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Public\Documents\Admin558\Adam.exe

    Filesize

    48KB

    MD5

    2cca2c467cfafb31500b0f5fae518372

    SHA1

    823a897d3ac313c2c28d9e7276ef8beb0f6ad8d1

    SHA256

    8071edb914b488e5e693b750f99e25eaaf74d6e587fce4eb5ddcd36ade9a07f2

    SHA512

    d66f97dd68b15795eccace13e92eebd3d1330637c052e0a0c9e2ef87b5ddc62d4676de74ec9b56aa8084406502a6ab5d547ce6a727427e5f15e53b8e272d7592

  • C:\Users\Public\Documents\Admin558\Adam.exe

    Filesize

    48KB

    MD5

    2cca2c467cfafb31500b0f5fae518372

    SHA1

    823a897d3ac313c2c28d9e7276ef8beb0f6ad8d1

    SHA256

    8071edb914b488e5e693b750f99e25eaaf74d6e587fce4eb5ddcd36ade9a07f2

    SHA512

    d66f97dd68b15795eccace13e92eebd3d1330637c052e0a0c9e2ef87b5ddc62d4676de74ec9b56aa8084406502a6ab5d547ce6a727427e5f15e53b8e272d7592

  • C:\Users\Public\Documents\Admin558\Taskmg.exe

    Filesize

    2.0MB

    MD5

    a341b3a7990a811f0666bc0bedefb1dd

    SHA1

    647b053c5308b18b9202c6133b9c85c72b611760

    SHA256

    e09a30a80a3dfc9ec7357358a61227815ef7cc3ae2bd07f7587cec0dc52d8ab1

    SHA512

    9860c5bc63097c3cbfd52eb26528750eb7925488218781c55cb4244fe4a426c5c05c193b16a5ac2624dd708cfe2265d84ef864e47a3fa1c9682139b5e011da73

  • C:\Users\Public\Documents\Admin558\Taskmg.exe

    Filesize

    2.0MB

    MD5

    a341b3a7990a811f0666bc0bedefb1dd

    SHA1

    647b053c5308b18b9202c6133b9c85c72b611760

    SHA256

    e09a30a80a3dfc9ec7357358a61227815ef7cc3ae2bd07f7587cec0dc52d8ab1

    SHA512

    9860c5bc63097c3cbfd52eb26528750eb7925488218781c55cb4244fe4a426c5c05c193b16a5ac2624dd708cfe2265d84ef864e47a3fa1c9682139b5e011da73

  • C:\Users\Public\Documents\Admin558\Taskmg.exe

    Filesize

    2.0MB

    MD5

    a341b3a7990a811f0666bc0bedefb1dd

    SHA1

    647b053c5308b18b9202c6133b9c85c72b611760

    SHA256

    e09a30a80a3dfc9ec7357358a61227815ef7cc3ae2bd07f7587cec0dc52d8ab1

    SHA512

    9860c5bc63097c3cbfd52eb26528750eb7925488218781c55cb4244fe4a426c5c05c193b16a5ac2624dd708cfe2265d84ef864e47a3fa1c9682139b5e011da73

  • C:\Users\Public\Documents\Admin558\Thunder.exe

    Filesize

    932KB

    MD5

    7dd16a3c5ee05579e756b34c23ea1c6e

    SHA1

    f9df773ebd835addadfea97b353c4b6a11922380

    SHA256

    387058c609bf7ba4a60b30677c03778ab1a80c3eaa38b0b3e8ca3f354dde1fb0

    SHA512

    543d51fcf6c5bda5b37497815ab1f1a3e43e31824fb7b14fd63f978a6514bc07eea3bf50b1a5ce58e8a7dd46b87eb78988b6a665bc08931e503c2ad0a55bdbe1

  • C:\Users\Public\Documents\Admin558\libcef.dll

    Filesize

    795KB

    MD5

    1367469d2e42b0d2d3d33d65c0f99a06

    SHA1

    5d177af01e5a7c5b1c0920296c7c411a0bfef2d0

    SHA256

    220533caffc31750c9e7d8226eca3d05c525df59fc81093c175001a0c2e68fb5

    SHA512

    5bb1590dbe4b72c3bbacb00c48a4495f8ddd9276630c01019cfca86c65eff6f2daebc0c8f243230831d639be14bcef14cc77b8785017dcbbc7d769f457f8005d

  • \Users\Public\Documents\Admin558\Adam.exe

    Filesize

    48KB

    MD5

    2cca2c467cfafb31500b0f5fae518372

    SHA1

    823a897d3ac313c2c28d9e7276ef8beb0f6ad8d1

    SHA256

    8071edb914b488e5e693b750f99e25eaaf74d6e587fce4eb5ddcd36ade9a07f2

    SHA512

    d66f97dd68b15795eccace13e92eebd3d1330637c052e0a0c9e2ef87b5ddc62d4676de74ec9b56aa8084406502a6ab5d547ce6a727427e5f15e53b8e272d7592

  • \Users\Public\Documents\Admin558\Taskmg.exe

    Filesize

    2.0MB

    MD5

    a341b3a7990a811f0666bc0bedefb1dd

    SHA1

    647b053c5308b18b9202c6133b9c85c72b611760

    SHA256

    e09a30a80a3dfc9ec7357358a61227815ef7cc3ae2bd07f7587cec0dc52d8ab1

    SHA512

    9860c5bc63097c3cbfd52eb26528750eb7925488218781c55cb4244fe4a426c5c05c193b16a5ac2624dd708cfe2265d84ef864e47a3fa1c9682139b5e011da73

  • memory/312-152-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/312-151-0x0000000000630000-0x0000000000730000-memory.dmp

    Filesize

    1024KB

  • memory/312-154-0x00000000004C0000-0x00000000004F8000-memory.dmp

    Filesize

    224KB

  • memory/312-153-0x0000000010000000-0x0000000010031000-memory.dmp

    Filesize

    196KB

  • memory/312-157-0x0000000000550000-0x000000000057A000-memory.dmp

    Filesize

    168KB

  • memory/312-163-0x0000000000630000-0x0000000000730000-memory.dmp

    Filesize

    1024KB

  • memory/1488-143-0x0000000001340000-0x000000000135C000-memory.dmp

    Filesize

    112KB

  • memory/1488-144-0x0000000001340000-0x000000000135C000-memory.dmp

    Filesize

    112KB

  • memory/2300-140-0x0000000000B10000-0x0000000000B2C000-memory.dmp

    Filesize

    112KB

  • memory/2300-56-0x0000000000B60000-0x0000000000BD9000-memory.dmp

    Filesize

    484KB

  • memory/2300-149-0x0000000000B60000-0x0000000000BD9000-memory.dmp

    Filesize

    484KB

  • memory/2300-55-0x0000000000B60000-0x0000000000BD9000-memory.dmp

    Filesize

    484KB

  • memory/2300-54-0x0000000000B60000-0x0000000000BD9000-memory.dmp

    Filesize

    484KB