Analysis

  • max time kernel
    144s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-08-2023 20:46

General

  • Target

    ae8b0e57f441be4c3bd36928b5d886d51b68f50331d3d0e7ba8503f0fc5374d8.exe

  • Size

    62KB

  • MD5

    9eb3217ac274ced01d826fc87f35f11d

  • SHA1

    6cd757027771caaf6f22f741e9b9158a3c6f9e6b

  • SHA256

    ae8b0e57f441be4c3bd36928b5d886d51b68f50331d3d0e7ba8503f0fc5374d8

  • SHA512

    49382a278924414518657558e0129cd4ddc67f0e8fff81f55006ca28d7e2169babe8ce48d5ad33de950b35158c4cb72a94b08217dbcee810d8f5a733fc306268

  • SSDEEP

    1536:Hpmh8mcUyppcli5xsLPFldzW+loL+v98vwpY9:HO5cUyppoiILDdlOL+3y9

Malware Config

Signatures

  • FatalRat

    FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

  • Fatal Rat payload 2 IoCs
  • ASPack v2.12-2.42 3 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ae8b0e57f441be4c3bd36928b5d886d51b68f50331d3d0e7ba8503f0fc5374d8.exe
    "C:\Users\Admin\AppData\Local\Temp\ae8b0e57f441be4c3bd36928b5d886d51b68f50331d3d0e7ba8503f0fc5374d8.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4068
    • C:\Users\Admin\AppData\Local\ae8b0e57f441be4c3bd36928b5d886d51b68f50331d3d0e7ba8503f0fc5374d8.exe
      "C:\Users\Admin\AppData\Local\ae8b0e57f441be4c3bd36928b5d886d51b68f50331d3d0e7ba8503f0fc5374d8.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\ae8b0e57f441be4c3bd36928b5d886d51b68f50331d3d0e7ba8503f0fc5374d8.exe

    Filesize

    62KB

    MD5

    9eb3217ac274ced01d826fc87f35f11d

    SHA1

    6cd757027771caaf6f22f741e9b9158a3c6f9e6b

    SHA256

    ae8b0e57f441be4c3bd36928b5d886d51b68f50331d3d0e7ba8503f0fc5374d8

    SHA512

    49382a278924414518657558e0129cd4ddc67f0e8fff81f55006ca28d7e2169babe8ce48d5ad33de950b35158c4cb72a94b08217dbcee810d8f5a733fc306268

  • C:\Users\Admin\AppData\Local\ae8b0e57f441be4c3bd36928b5d886d51b68f50331d3d0e7ba8503f0fc5374d8.exe

    Filesize

    62KB

    MD5

    9eb3217ac274ced01d826fc87f35f11d

    SHA1

    6cd757027771caaf6f22f741e9b9158a3c6f9e6b

    SHA256

    ae8b0e57f441be4c3bd36928b5d886d51b68f50331d3d0e7ba8503f0fc5374d8

    SHA512

    49382a278924414518657558e0129cd4ddc67f0e8fff81f55006ca28d7e2169babe8ce48d5ad33de950b35158c4cb72a94b08217dbcee810d8f5a733fc306268

  • C:\Users\Admin\AppData\Local\ae8b0e57f441be4c3bd36928b5d886d51b68f50331d3d0e7ba8503f0fc5374d8.exe

    Filesize

    62KB

    MD5

    9eb3217ac274ced01d826fc87f35f11d

    SHA1

    6cd757027771caaf6f22f741e9b9158a3c6f9e6b

    SHA256

    ae8b0e57f441be4c3bd36928b5d886d51b68f50331d3d0e7ba8503f0fc5374d8

    SHA512

    49382a278924414518657558e0129cd4ddc67f0e8fff81f55006ca28d7e2169babe8ce48d5ad33de950b35158c4cb72a94b08217dbcee810d8f5a733fc306268

  • memory/3800-163-0x00000000008D0000-0x00000000009D0000-memory.dmp

    Filesize

    1024KB

  • memory/3800-165-0x00000000009D0000-0x0000000000A08000-memory.dmp

    Filesize

    224KB

  • memory/3800-174-0x0000000000C20000-0x0000000000C3D000-memory.dmp

    Filesize

    116KB

  • memory/3800-173-0x00000000008D0000-0x00000000009D0000-memory.dmp

    Filesize

    1024KB

  • memory/3800-168-0x0000000000A20000-0x0000000000A4A000-memory.dmp

    Filesize

    168KB

  • memory/3800-162-0x0000000000C20000-0x0000000000C3D000-memory.dmp

    Filesize

    116KB

  • memory/3800-158-0x0000000000C20000-0x0000000000C3D000-memory.dmp

    Filesize

    116KB

  • memory/3800-161-0x0000000000C20000-0x0000000000C3D000-memory.dmp

    Filesize

    116KB

  • memory/4068-134-0x0000000000E00000-0x0000000000E1D000-memory.dmp

    Filesize

    116KB

  • memory/4068-135-0x0000000000E00000-0x0000000000E1D000-memory.dmp

    Filesize

    116KB

  • memory/4068-136-0x00000000013F0000-0x00000000014F0000-memory.dmp

    Filesize

    1024KB

  • memory/4068-160-0x0000000000E00000-0x0000000000E1D000-memory.dmp

    Filesize

    116KB

  • memory/4068-133-0x0000000000E00000-0x0000000000E1D000-memory.dmp

    Filesize

    116KB

  • memory/4068-137-0x0000000000BD0000-0x0000000000BD1000-memory.dmp

    Filesize

    4KB

  • memory/4068-142-0x00000000014F0000-0x000000000151A000-memory.dmp

    Filesize

    168KB

  • memory/4068-138-0x0000000010000000-0x0000000010031000-memory.dmp

    Filesize

    196KB

  • memory/4068-139-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB