Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    10/08/2023, 17:16

General

  • Target

    a6108ee9f106dfa91427fdec33e519ba94e61a678d65f5b16e54eb9d44291517.exe

  • Size

    299KB

  • MD5

    5b8b5b65e19ac1bde4757df37cc514f2

  • SHA1

    302ee18b546d39d2f7d99d55a8fdb41839dfffae

  • SHA256

    a6108ee9f106dfa91427fdec33e519ba94e61a678d65f5b16e54eb9d44291517

  • SHA512

    951b16e3811823301ef5c3f799d1243d8e357060af943866e7ad61b331fc49464a5d133c79bf321970e2f7ed0cfc6dbfdcdef4b7a2a9f1d74a5db6bd621a5831

  • SSDEEP

    384:yf11c+U6A8pWfG+Ax7r6+Y9PffPztcOB8lpI7:yfrAgWfGJxCbPrtc68E7

Malware Config

Signatures

  • FatalRat

    FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

  • Fatal Rat payload 1 IoCs
  • Downloads MZ/PE file
  • ASPack v2.12-2.42 3 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 52 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a6108ee9f106dfa91427fdec33e519ba94e61a678d65f5b16e54eb9d44291517.exe
    "C:\Users\Admin\AppData\Local\Temp\a6108ee9f106dfa91427fdec33e519ba94e61a678d65f5b16e54eb9d44291517.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:748
    • C:\Users\Public\Documents\Admin558\Adam.exe
      C:\Users\Public\Documents\Admin558\Adam.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2232
    • C:\Users\Public\Documents\Admin558\WmiSrv.exe
      C:\Users\Public\Documents\Admin558\WmiSrv.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1604

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9008480b99589fd232cf9d00ae0b5f22

    SHA1

    4c31e529fe24a6f6b7b54130cc0b2173ef9dc243

    SHA256

    cdbe969349e4b505abfcc7911f8a0ae54a571da4678f6e0ce67fbed6a0344da2

    SHA512

    05b887bd026fa41a31ee4ba17c31b4b51e222879473a39a2486d862a5cd3aae02e03937c6b5c4d82e71d32588a94a02b4dffb0a9b8d9f27bc228d47d74314c98

  • C:\Users\Admin\AppData\Local\Temp\Cab7C53.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar7EF5.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Public\Documents\Admin558\Adam.exe

    Filesize

    48KB

    MD5

    2cca2c467cfafb31500b0f5fae518372

    SHA1

    823a897d3ac313c2c28d9e7276ef8beb0f6ad8d1

    SHA256

    8071edb914b488e5e693b750f99e25eaaf74d6e587fce4eb5ddcd36ade9a07f2

    SHA512

    d66f97dd68b15795eccace13e92eebd3d1330637c052e0a0c9e2ef87b5ddc62d4676de74ec9b56aa8084406502a6ab5d547ce6a727427e5f15e53b8e272d7592

  • C:\Users\Public\Documents\Admin558\Adam.exe

    Filesize

    48KB

    MD5

    2cca2c467cfafb31500b0f5fae518372

    SHA1

    823a897d3ac313c2c28d9e7276ef8beb0f6ad8d1

    SHA256

    8071edb914b488e5e693b750f99e25eaaf74d6e587fce4eb5ddcd36ade9a07f2

    SHA512

    d66f97dd68b15795eccace13e92eebd3d1330637c052e0a0c9e2ef87b5ddc62d4676de74ec9b56aa8084406502a6ab5d547ce6a727427e5f15e53b8e272d7592

  • C:\Users\Public\Documents\Admin558\Thunder.exe

    Filesize

    932KB

    MD5

    7dd16a3c5ee05579e756b34c23ea1c6e

    SHA1

    f9df773ebd835addadfea97b353c4b6a11922380

    SHA256

    387058c609bf7ba4a60b30677c03778ab1a80c3eaa38b0b3e8ca3f354dde1fb0

    SHA512

    543d51fcf6c5bda5b37497815ab1f1a3e43e31824fb7b14fd63f978a6514bc07eea3bf50b1a5ce58e8a7dd46b87eb78988b6a665bc08931e503c2ad0a55bdbe1

  • C:\Users\Public\Documents\Admin558\WmiSrv.exe

    Filesize

    2.0MB

    MD5

    c7c90fbcbd1a3faa9541dff69636709d

    SHA1

    2667d3f5c76dd2b6c6f0118bcf43e19cca142c66

    SHA256

    eed4c28152fa4f961848dd6ef50458b3154db3541d4e32b45564bb9bf65d7614

    SHA512

    7ce221a2d57dbb4612232153906417f748683badd3f52ad8af5bbe7b74364195361441fb4e2edcd6fe5d210a5a91d4f768acb59761e8ac67118a8b685c7bfe13

  • C:\Users\Public\Documents\Admin558\WmiSrv.exe

    Filesize

    2.0MB

    MD5

    c7c90fbcbd1a3faa9541dff69636709d

    SHA1

    2667d3f5c76dd2b6c6f0118bcf43e19cca142c66

    SHA256

    eed4c28152fa4f961848dd6ef50458b3154db3541d4e32b45564bb9bf65d7614

    SHA512

    7ce221a2d57dbb4612232153906417f748683badd3f52ad8af5bbe7b74364195361441fb4e2edcd6fe5d210a5a91d4f768acb59761e8ac67118a8b685c7bfe13

  • C:\Users\Public\Documents\Admin558\WmiSrv.exe

    Filesize

    2.0MB

    MD5

    c7c90fbcbd1a3faa9541dff69636709d

    SHA1

    2667d3f5c76dd2b6c6f0118bcf43e19cca142c66

    SHA256

    eed4c28152fa4f961848dd6ef50458b3154db3541d4e32b45564bb9bf65d7614

    SHA512

    7ce221a2d57dbb4612232153906417f748683badd3f52ad8af5bbe7b74364195361441fb4e2edcd6fe5d210a5a91d4f768acb59761e8ac67118a8b685c7bfe13

  • C:\Users\Public\Documents\Admin558\libcef.dll

    Filesize

    6KB

    MD5

    a66332a6c7cdda1045ea2a1cd29bf562

    SHA1

    821ed5f58714c0d0dbc98758d34db583536d8fbc

    SHA256

    a97b92126ba0c3fce702a5ec7015071b52fb4b3d2746a117c4de7bfb98b38d4b

    SHA512

    ef8fbf24ec453cd7dfbf819cdb91a14d906a566e6e54b9b6b6139da658da83cabd74a185549a6b0050678c6beff1fa0e31701e562e83c0263d426566fd23f2d2

  • \Users\Public\Documents\Admin558\Adam.exe

    Filesize

    48KB

    MD5

    2cca2c467cfafb31500b0f5fae518372

    SHA1

    823a897d3ac313c2c28d9e7276ef8beb0f6ad8d1

    SHA256

    8071edb914b488e5e693b750f99e25eaaf74d6e587fce4eb5ddcd36ade9a07f2

    SHA512

    d66f97dd68b15795eccace13e92eebd3d1330637c052e0a0c9e2ef87b5ddc62d4676de74ec9b56aa8084406502a6ab5d547ce6a727427e5f15e53b8e272d7592

  • \Users\Public\Documents\Admin558\WmiSrv.exe

    Filesize

    2.0MB

    MD5

    c7c90fbcbd1a3faa9541dff69636709d

    SHA1

    2667d3f5c76dd2b6c6f0118bcf43e19cca142c66

    SHA256

    eed4c28152fa4f961848dd6ef50458b3154db3541d4e32b45564bb9bf65d7614

    SHA512

    7ce221a2d57dbb4612232153906417f748683badd3f52ad8af5bbe7b74364195361441fb4e2edcd6fe5d210a5a91d4f768acb59761e8ac67118a8b685c7bfe13

  • memory/748-155-0x0000000000840000-0x000000000085C000-memory.dmp

    Filesize

    112KB

  • memory/748-54-0x0000000000870000-0x0000000000907000-memory.dmp

    Filesize

    604KB

  • memory/748-136-0x0000000000870000-0x0000000000907000-memory.dmp

    Filesize

    604KB

  • memory/1604-168-0x00000000006D0000-0x00000000007D0000-memory.dmp

    Filesize

    1024KB

  • memory/1604-170-0x0000000000690000-0x00000000006C8000-memory.dmp

    Filesize

    224KB

  • memory/1604-172-0x0000000000570000-0x0000000000571000-memory.dmp

    Filesize

    4KB

  • memory/1604-167-0x0000000010000000-0x0000000010031000-memory.dmp

    Filesize

    196KB

  • memory/1604-173-0x0000000002010000-0x000000000203A000-memory.dmp

    Filesize

    168KB

  • memory/1604-179-0x00000000006D0000-0x00000000007D0000-memory.dmp

    Filesize

    1024KB

  • memory/2232-159-0x0000000000EC0000-0x0000000000EDC000-memory.dmp

    Filesize

    112KB

  • memory/2232-160-0x0000000000EC0000-0x0000000000EDC000-memory.dmp

    Filesize

    112KB