Analysis Overview
SHA256
1fa649d9365b3c2ff45f35af1bbf8ebdbdcc455928827475252e8417a07f2519
Threat Level: Known bad
The file 1fa649d9365b3c2ff45f35af1bbf8ebdbdcc455928827475252e8417a07f2519 was found to be: Known bad.
Malicious Activity Summary
FatalRat
Fatal Rat payload
ASPack v2.12-2.42
Executes dropped EXE
Program crash
Enumerates physical storage devices
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2023-08-12 06:50
Signatures
ASPack v2.12-2.42
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2023-08-12 06:50
Reported
2023-08-12 06:53
Platform
win7-20230712-en
Max time kernel
141s
Max time network
123s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\1fa649d9365b3c2ff45f35af1bbf8ebdbdcc455928827475252e8417a07f2519.exe |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1532 wrote to memory of 1820 | N/A | C:\Users\Admin\AppData\Local\Temp\1fa649d9365b3c2ff45f35af1bbf8ebdbdcc455928827475252e8417a07f2519.exe | C:\Windows\SysWOW64\WerFault.exe |
| PID 1532 wrote to memory of 1820 | N/A | C:\Users\Admin\AppData\Local\Temp\1fa649d9365b3c2ff45f35af1bbf8ebdbdcc455928827475252e8417a07f2519.exe | C:\Windows\SysWOW64\WerFault.exe |
| PID 1532 wrote to memory of 1820 | N/A | C:\Users\Admin\AppData\Local\Temp\1fa649d9365b3c2ff45f35af1bbf8ebdbdcc455928827475252e8417a07f2519.exe | C:\Windows\SysWOW64\WerFault.exe |
| PID 1532 wrote to memory of 1820 | N/A | C:\Users\Admin\AppData\Local\Temp\1fa649d9365b3c2ff45f35af1bbf8ebdbdcc455928827475252e8417a07f2519.exe | C:\Windows\SysWOW64\WerFault.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\1fa649d9365b3c2ff45f35af1bbf8ebdbdcc455928827475252e8417a07f2519.exe
"C:\Users\Admin\AppData\Local\Temp\1fa649d9365b3c2ff45f35af1bbf8ebdbdcc455928827475252e8417a07f2519.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1532 -s 116
Network
| Country | Destination | Domain | Proto |
| HK | 154.92.16.100:16553 | tcp |
Files
memory/1532-56-0x00000000008B0000-0x00000000008CD000-memory.dmp
memory/1532-55-0x00000000008B0000-0x00000000008CD000-memory.dmp
memory/1532-54-0x00000000008B0000-0x00000000008CD000-memory.dmp
memory/1532-57-0x0000000002510000-0x0000000002550000-memory.dmp
memory/1532-58-0x00000000008B0000-0x00000000008CD000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2023-08-12 06:50
Reported
2023-08-12 06:53
Platform
win10v2004-20230703-en
Max time kernel
144s
Max time network
146s
Command Line
Signatures
FatalRat
Fatal Rat payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
ASPack v2.12-2.42
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\1fa649d9365b3c2ff45f35af1bbf8ebdbdcc455928827475252e8417a07f2519.exe | N/A |
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\1fa649d9365b3c2ff45f35af1bbf8ebdbdcc455928827475252e8417a07f2519.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\1fa649d9365b3c2ff45f35af1bbf8ebdbdcc455928827475252e8417a07f2519.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1584 wrote to memory of 3252 | N/A | C:\Users\Admin\AppData\Local\Temp\1fa649d9365b3c2ff45f35af1bbf8ebdbdcc455928827475252e8417a07f2519.exe | C:\Users\Admin\AppData\Local\1fa649d9365b3c2ff45f35af1bbf8ebdbdcc455928827475252e8417a07f2519.exe |
| PID 1584 wrote to memory of 3252 | N/A | C:\Users\Admin\AppData\Local\Temp\1fa649d9365b3c2ff45f35af1bbf8ebdbdcc455928827475252e8417a07f2519.exe | C:\Users\Admin\AppData\Local\1fa649d9365b3c2ff45f35af1bbf8ebdbdcc455928827475252e8417a07f2519.exe |
| PID 1584 wrote to memory of 3252 | N/A | C:\Users\Admin\AppData\Local\Temp\1fa649d9365b3c2ff45f35af1bbf8ebdbdcc455928827475252e8417a07f2519.exe | C:\Users\Admin\AppData\Local\1fa649d9365b3c2ff45f35af1bbf8ebdbdcc455928827475252e8417a07f2519.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\1fa649d9365b3c2ff45f35af1bbf8ebdbdcc455928827475252e8417a07f2519.exe
"C:\Users\Admin\AppData\Local\Temp\1fa649d9365b3c2ff45f35af1bbf8ebdbdcc455928827475252e8417a07f2519.exe"
C:\Users\Admin\AppData\Local\1fa649d9365b3c2ff45f35af1bbf8ebdbdcc455928827475252e8417a07f2519.exe
"C:\Users\Admin\AppData\Local\1fa649d9365b3c2ff45f35af1bbf8ebdbdcc455928827475252e8417a07f2519.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 146.78.124.51.in-addr.arpa | udp |
| HK | 154.92.16.100:16553 | tcp | |
| US | 8.8.8.8:53 | 100.16.92.154.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 108.211.229.192.in-addr.arpa | udp |
| HK | 154.92.16.100:16553 | tcp | |
| HK | 154.92.16.100:8858 | tcp | |
| US | 8.8.8.8:53 | 208.194.73.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 183.59.114.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 8.3.197.209.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.81.21.72.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 64.13.109.52.in-addr.arpa | udp |
Files
memory/1584-133-0x0000000000400000-0x000000000041D000-memory.dmp
memory/1584-134-0x0000000000400000-0x000000000041D000-memory.dmp
memory/1584-135-0x0000000000400000-0x000000000041D000-memory.dmp
memory/1584-136-0x0000000001300000-0x0000000001400000-memory.dmp
memory/1584-138-0x0000000010000000-0x0000000010031000-memory.dmp
memory/1584-137-0x0000000000E80000-0x0000000000E81000-memory.dmp
memory/1584-139-0x0000000001250000-0x0000000001288000-memory.dmp
memory/1584-142-0x0000000001290000-0x00000000012BA000-memory.dmp
C:\Users\Admin\AppData\Local\1fa649d9365b3c2ff45f35af1bbf8ebdbdcc455928827475252e8417a07f2519.exe
| MD5 | d282040c9d730bd938b59221127cda01 |
| SHA1 | c7b33599f867961b3ebff699751cb31f84a2ebc7 |
| SHA256 | 1fa649d9365b3c2ff45f35af1bbf8ebdbdcc455928827475252e8417a07f2519 |
| SHA512 | a777394653ecf04d632ecf13a4b9581878c3d8fa953f4e4928846ae79bfa08399c50416a4b9dc9e7d30e98449cebd07d0e4b647c5172e96fe555289d8b663ea0 |
C:\Users\Admin\AppData\Local\1fa649d9365b3c2ff45f35af1bbf8ebdbdcc455928827475252e8417a07f2519.exe
| MD5 | d282040c9d730bd938b59221127cda01 |
| SHA1 | c7b33599f867961b3ebff699751cb31f84a2ebc7 |
| SHA256 | 1fa649d9365b3c2ff45f35af1bbf8ebdbdcc455928827475252e8417a07f2519 |
| SHA512 | a777394653ecf04d632ecf13a4b9581878c3d8fa953f4e4928846ae79bfa08399c50416a4b9dc9e7d30e98449cebd07d0e4b647c5172e96fe555289d8b663ea0 |
memory/3252-158-0x0000000000E30000-0x0000000000E4D000-memory.dmp
memory/3252-161-0x0000000000E30000-0x0000000000E4D000-memory.dmp
memory/3252-162-0x0000000000E30000-0x0000000000E4D000-memory.dmp
memory/1584-160-0x0000000000400000-0x000000000041D000-memory.dmp
C:\Users\Admin\AppData\Local\1fa649d9365b3c2ff45f35af1bbf8ebdbdcc455928827475252e8417a07f2519.exe
| MD5 | d282040c9d730bd938b59221127cda01 |
| SHA1 | c7b33599f867961b3ebff699751cb31f84a2ebc7 |
| SHA256 | 1fa649d9365b3c2ff45f35af1bbf8ebdbdcc455928827475252e8417a07f2519 |
| SHA512 | a777394653ecf04d632ecf13a4b9581878c3d8fa953f4e4928846ae79bfa08399c50416a4b9dc9e7d30e98449cebd07d0e4b647c5172e96fe555289d8b663ea0 |
memory/3252-163-0x0000000000F10000-0x0000000001010000-memory.dmp
memory/3252-164-0x0000000000400000-0x0000000000438000-memory.dmp
memory/3252-168-0x0000000000DD0000-0x0000000000DFA000-memory.dmp
memory/3252-173-0x0000000000F10000-0x0000000001010000-memory.dmp
memory/3252-174-0x0000000000E30000-0x0000000000E4D000-memory.dmp
memory/3252-175-0x0000000000400000-0x0000000000438000-memory.dmp