Analysis

  • max time kernel
    143s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-08-2023 14:52

General

  • Target

    Rat/libcef.dll

  • Size

    795KB

  • MD5

    1367469d2e42b0d2d3d33d65c0f99a06

  • SHA1

    5d177af01e5a7c5b1c0920296c7c411a0bfef2d0

  • SHA256

    220533caffc31750c9e7d8226eca3d05c525df59fc81093c175001a0c2e68fb5

  • SHA512

    5bb1590dbe4b72c3bbacb00c48a4495f8ddd9276630c01019cfca86c65eff6f2daebc0c8f243230831d639be14bcef14cc77b8785017dcbbc7d769f457f8005d

  • SSDEEP

    12288:8VbGGQ7NoRFNsqejyVP79uM9jaU1fzjuWu5tYXxPSUu0oe8RrOb0EoA:8Z25onNjZDjagzqRM8TdA

Malware Config

Signatures

  • FatalRat

    FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

  • Fatal Rat payload 1 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\Rat\libcef.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1292
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\Rat\libcef.dll,#1
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:928

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/928-133-0x0000000075610000-0x00000000757A3000-memory.dmp

    Filesize

    1.6MB

  • memory/928-134-0x0000000075610000-0x00000000757A3000-memory.dmp

    Filesize

    1.6MB

  • memory/928-135-0x0000000075610000-0x00000000757A3000-memory.dmp

    Filesize

    1.6MB

  • memory/928-136-0x0000000075610000-0x00000000757A3000-memory.dmp

    Filesize

    1.6MB

  • memory/928-137-0x0000000002930000-0x0000000002A30000-memory.dmp

    Filesize

    1024KB

  • memory/928-138-0x0000000002370000-0x0000000002371000-memory.dmp

    Filesize

    4KB

  • memory/928-139-0x0000000010000000-0x0000000010031000-memory.dmp

    Filesize

    196KB

  • memory/928-141-0x0000000002500000-0x0000000002538000-memory.dmp

    Filesize

    224KB

  • memory/928-143-0x0000000002A40000-0x0000000002A6A000-memory.dmp

    Filesize

    168KB

  • memory/928-148-0x0000000002930000-0x0000000002A30000-memory.dmp

    Filesize

    1024KB

  • memory/928-149-0x0000000075610000-0x00000000757A3000-memory.dmp

    Filesize

    1.6MB

  • memory/928-152-0x0000000075610000-0x00000000757A3000-memory.dmp

    Filesize

    1.6MB