Analysis
-
max time kernel
143s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
10-08-2023 14:52
Behavioral task
behavioral1
Sample
Rat/2345Capture.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Rat/2345Capture.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
Rat/Taskmg.exe
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
Rat/Taskmg.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
Rat/libcef.dll
Resource
win7-20230712-en
Behavioral task
behavioral6
Sample
Rat/libcef.dll
Resource
win10v2004-20230703-en
General
-
Target
Rat/libcef.dll
-
Size
795KB
-
MD5
1367469d2e42b0d2d3d33d65c0f99a06
-
SHA1
5d177af01e5a7c5b1c0920296c7c411a0bfef2d0
-
SHA256
220533caffc31750c9e7d8226eca3d05c525df59fc81093c175001a0c2e68fb5
-
SHA512
5bb1590dbe4b72c3bbacb00c48a4495f8ddd9276630c01019cfca86c65eff6f2daebc0c8f243230831d639be14bcef14cc77b8785017dcbbc7d769f457f8005d
-
SSDEEP
12288:8VbGGQ7NoRFNsqejyVP79uM9jaU1fzjuWu5tYXxPSUu0oe8RrOb0EoA:8Z25onNjZDjagzqRM8TdA
Malware Config
Signatures
-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Fatal Rat payload 1 IoCs
resource yara_rule behavioral6/memory/928-143-0x0000000002A40000-0x0000000002A6A000-memory.dmp fatalrat -
Blocklisted process makes network request 2 IoCs
flow pid Process 6 928 rundll32.exe 16 928 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 928 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1292 wrote to memory of 928 1292 rundll32.exe 82 PID 1292 wrote to memory of 928 1292 rundll32.exe 82 PID 1292 wrote to memory of 928 1292 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Rat\libcef.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Rat\libcef.dll,#12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:928
-