Analysis

  • max time kernel
    144s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-08-2023 06:50

General

  • Target

    1fa649d9365b3c2ff45f35af1bbf8ebdbdcc455928827475252e8417a07f2519.exe

  • Size

    67KB

  • MD5

    d282040c9d730bd938b59221127cda01

  • SHA1

    c7b33599f867961b3ebff699751cb31f84a2ebc7

  • SHA256

    1fa649d9365b3c2ff45f35af1bbf8ebdbdcc455928827475252e8417a07f2519

  • SHA512

    a777394653ecf04d632ecf13a4b9581878c3d8fa953f4e4928846ae79bfa08399c50416a4b9dc9e7d30e98449cebd07d0e4b647c5172e96fe555289d8b663ea0

  • SSDEEP

    1536:Lpmh8mcUyppcli5GXZCNeFzW+loL+v9k11zFT4v:LO5cUyppoiEgEFlOL++PzFC

Malware Config

Signatures

  • FatalRat

    FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

  • Fatal Rat payload 2 IoCs
  • ASPack v2.12-2.42 3 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1fa649d9365b3c2ff45f35af1bbf8ebdbdcc455928827475252e8417a07f2519.exe
    "C:\Users\Admin\AppData\Local\Temp\1fa649d9365b3c2ff45f35af1bbf8ebdbdcc455928827475252e8417a07f2519.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1584
    • C:\Users\Admin\AppData\Local\1fa649d9365b3c2ff45f35af1bbf8ebdbdcc455928827475252e8417a07f2519.exe
      "C:\Users\Admin\AppData\Local\1fa649d9365b3c2ff45f35af1bbf8ebdbdcc455928827475252e8417a07f2519.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3252

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\1fa649d9365b3c2ff45f35af1bbf8ebdbdcc455928827475252e8417a07f2519.exe

    Filesize

    67KB

    MD5

    d282040c9d730bd938b59221127cda01

    SHA1

    c7b33599f867961b3ebff699751cb31f84a2ebc7

    SHA256

    1fa649d9365b3c2ff45f35af1bbf8ebdbdcc455928827475252e8417a07f2519

    SHA512

    a777394653ecf04d632ecf13a4b9581878c3d8fa953f4e4928846ae79bfa08399c50416a4b9dc9e7d30e98449cebd07d0e4b647c5172e96fe555289d8b663ea0

  • C:\Users\Admin\AppData\Local\1fa649d9365b3c2ff45f35af1bbf8ebdbdcc455928827475252e8417a07f2519.exe

    Filesize

    67KB

    MD5

    d282040c9d730bd938b59221127cda01

    SHA1

    c7b33599f867961b3ebff699751cb31f84a2ebc7

    SHA256

    1fa649d9365b3c2ff45f35af1bbf8ebdbdcc455928827475252e8417a07f2519

    SHA512

    a777394653ecf04d632ecf13a4b9581878c3d8fa953f4e4928846ae79bfa08399c50416a4b9dc9e7d30e98449cebd07d0e4b647c5172e96fe555289d8b663ea0

  • C:\Users\Admin\AppData\Local\1fa649d9365b3c2ff45f35af1bbf8ebdbdcc455928827475252e8417a07f2519.exe

    Filesize

    67KB

    MD5

    d282040c9d730bd938b59221127cda01

    SHA1

    c7b33599f867961b3ebff699751cb31f84a2ebc7

    SHA256

    1fa649d9365b3c2ff45f35af1bbf8ebdbdcc455928827475252e8417a07f2519

    SHA512

    a777394653ecf04d632ecf13a4b9581878c3d8fa953f4e4928846ae79bfa08399c50416a4b9dc9e7d30e98449cebd07d0e4b647c5172e96fe555289d8b663ea0

  • memory/1584-160-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/1584-134-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/1584-135-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/1584-136-0x0000000001300000-0x0000000001400000-memory.dmp

    Filesize

    1024KB

  • memory/1584-138-0x0000000010000000-0x0000000010031000-memory.dmp

    Filesize

    196KB

  • memory/1584-137-0x0000000000E80000-0x0000000000E81000-memory.dmp

    Filesize

    4KB

  • memory/1584-139-0x0000000001250000-0x0000000001288000-memory.dmp

    Filesize

    224KB

  • memory/1584-142-0x0000000001290000-0x00000000012BA000-memory.dmp

    Filesize

    168KB

  • memory/1584-133-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/3252-158-0x0000000000E30000-0x0000000000E4D000-memory.dmp

    Filesize

    116KB

  • memory/3252-162-0x0000000000E30000-0x0000000000E4D000-memory.dmp

    Filesize

    116KB

  • memory/3252-161-0x0000000000E30000-0x0000000000E4D000-memory.dmp

    Filesize

    116KB

  • memory/3252-163-0x0000000000F10000-0x0000000001010000-memory.dmp

    Filesize

    1024KB

  • memory/3252-164-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/3252-168-0x0000000000DD0000-0x0000000000DFA000-memory.dmp

    Filesize

    168KB

  • memory/3252-173-0x0000000000F10000-0x0000000001010000-memory.dmp

    Filesize

    1024KB

  • memory/3252-174-0x0000000000E30000-0x0000000000E4D000-memory.dmp

    Filesize

    116KB

  • memory/3252-175-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB