Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    23-08-2023 04:12

General

  • Target

    Wps.exe

  • Size

    4.2MB

  • MD5

    6f5df8e00902ba60401c69463d280ba7

  • SHA1

    7183d6a403bf51a61dbf37196ec9e0b2cb15779d

  • SHA256

    de33644dcb241185d89c7606a8fc7239a274ad277c7b9abf5778736edcb674a9

  • SHA512

    1a0fce1f96235997b8144f5e016050413cd74db2fdc90d9fc2fa30db173a3053e9cc141e88b65624f64c03929d07c9acdd3bacdfc94e406e659023232b7ea386

  • SSDEEP

    98304:n2Jg31PBVygltLW1fvbG05DOyq/FwZ7aujE+tfxe:2Jw1+glta1fvb/NOHwZ3jE+tfc

Malware Config

Signatures

  • FatalRat

    FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

  • Gh0st RAT payload 2 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Fatal Rat payload 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • UPX packed file 14 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 58 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Wps.exe
    "C:\Users\Admin\AppData\Local\Temp\Wps.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:2436
    • C:\Program Files (x86)\uu6.exe
      "C:\Program Files (x86)\uu6.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2644
  • C:\Users\Public\Documents\123\PTvrst.exe
    "C:\Users\Public\Documents\123\PTvrst.exe"
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1664
    • C:\WINDOWS\DNomb\spolsvt.exe
      C:\WINDOWS\DNomb\spolsvt.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1192
      • C:\Users\Public\Documents\t\spolsvt.exe
        C:\Users\Public\Documents\t\spolsvt.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\uu6.exe

    Filesize

    1.3MB

    MD5

    46a9d07a97b5b35bfb3d61509b4110bb

    SHA1

    a4fc26da50e1f06782fbfb1a46368600e881c66e

    SHA256

    7916c0b39135619a5f8cbc0c71ea762e6e65624c7c85ccd5900039bbb5e056ba

    SHA512

    50a4adcf22cacf43df14fc6e7730cce535f3718775aaee6fc5b71f80db6cdd66a8738dcf71daa09b199b1066d880942215d67fb986c37ba6998a11210681101a

  • C:\Program Files (x86)\uu6.exe

    Filesize

    1.3MB

    MD5

    46a9d07a97b5b35bfb3d61509b4110bb

    SHA1

    a4fc26da50e1f06782fbfb1a46368600e881c66e

    SHA256

    7916c0b39135619a5f8cbc0c71ea762e6e65624c7c85ccd5900039bbb5e056ba

    SHA512

    50a4adcf22cacf43df14fc6e7730cce535f3718775aaee6fc5b71f80db6cdd66a8738dcf71daa09b199b1066d880942215d67fb986c37ba6998a11210681101a

  • C:\Users\Public\Documents\123\PTvrst.exe

    Filesize

    1.2MB

    MD5

    d22cfb5bfaeb1503b12b07e53ef0a149

    SHA1

    8ea2c85e363f551a159fabd65377affed4e417a1

    SHA256

    260464fb05210cfb30ef7a12d568f75eb781634b251d958cae8911948f6ca360

    SHA512

    151024cb2960b1ee485ded7ccbb753fe368a93fda5699af72e568667fa54bfb0d1732444e7b60efaab6d372204157cdb6abbf8862d0e89d612dd963342215e45

  • C:\Users\Public\Documents\123\PTvrst.exe

    Filesize

    1.2MB

    MD5

    d22cfb5bfaeb1503b12b07e53ef0a149

    SHA1

    8ea2c85e363f551a159fabd65377affed4e417a1

    SHA256

    260464fb05210cfb30ef7a12d568f75eb781634b251d958cae8911948f6ca360

    SHA512

    151024cb2960b1ee485ded7ccbb753fe368a93fda5699af72e568667fa54bfb0d1732444e7b60efaab6d372204157cdb6abbf8862d0e89d612dd963342215e45

  • C:\Users\Public\Documents\t\spolsvt.exe

    Filesize

    16KB

    MD5

    cdce4713e784ae069d73723034a957ff

    SHA1

    9a393a6bab6568f1a774fb753353223f11367e09

    SHA256

    b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8

    SHA512

    0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

  • C:\Users\Public\Documents\t\spolsvt.exe

    Filesize

    16KB

    MD5

    cdce4713e784ae069d73723034a957ff

    SHA1

    9a393a6bab6568f1a774fb753353223f11367e09

    SHA256

    b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8

    SHA512

    0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

  • C:\WINDOWS\DNomb\Mpec.mbt

    Filesize

    488KB

    MD5

    6894403c7124ed7b24d6a6fc7158cb4e

    SHA1

    802290c110dd05631e2dda8ba18bfbfccaa10331

    SHA256

    21d81876aa65d400a3569f3db177435718f94aa7e7e47448319e704894b17f72

    SHA512

    38e7214f8cf1944650512d53fbb03f9de8ff5c52717445b376f603a462ea55ddd8a199a71f00d4b0b293271c475fc72a111ff9028e5029e72d85a39bfa4c2f01

  • C:\WINDOWS\DNomb\spolsvt.exe

    Filesize

    9KB

    MD5

    523d5c39f9d8d2375c3df68251fa2249

    SHA1

    d4ed365c44bec9246fc1a65a32a7791792647a10

    SHA256

    20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

    SHA512

    526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

  • C:\Windows\DNomb\spolsvt.exe

    Filesize

    9KB

    MD5

    523d5c39f9d8d2375c3df68251fa2249

    SHA1

    d4ed365c44bec9246fc1a65a32a7791792647a10

    SHA256

    20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

    SHA512

    526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

  • \Program Files (x86)\WPS_Installer.exe

    Filesize

    2.9MB

    MD5

    b52ba2b99108c496389ae5bb81fa6537

    SHA1

    9073d8c4a1968be24357862015519f2afecd833a

    SHA256

    c6ac7d9add40b913112b265d4f366d9ef80bbd711049db085fc750fcad4e14d8

    SHA512

    6637506ee80d359e729e0011b97e8d827e14356393193247f502b7fcfbbca249dc045b8acfe4b31ce462468f421dc5d9a4e31183bedb66c45a9aa43c01f81397

  • \Program Files (x86)\uu6.exe

    Filesize

    1.3MB

    MD5

    46a9d07a97b5b35bfb3d61509b4110bb

    SHA1

    a4fc26da50e1f06782fbfb1a46368600e881c66e

    SHA256

    7916c0b39135619a5f8cbc0c71ea762e6e65624c7c85ccd5900039bbb5e056ba

    SHA512

    50a4adcf22cacf43df14fc6e7730cce535f3718775aaee6fc5b71f80db6cdd66a8738dcf71daa09b199b1066d880942215d67fb986c37ba6998a11210681101a

  • \Users\Public\Documents\t\spolsvt.exe

    Filesize

    16KB

    MD5

    cdce4713e784ae069d73723034a957ff

    SHA1

    9a393a6bab6568f1a774fb753353223f11367e09

    SHA256

    b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8

    SHA512

    0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

  • \Windows\DNomb\spolsvt.exe

    Filesize

    9KB

    MD5

    523d5c39f9d8d2375c3df68251fa2249

    SHA1

    d4ed365c44bec9246fc1a65a32a7791792647a10

    SHA256

    20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

    SHA512

    526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

  • memory/1192-141-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/1192-137-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1192-136-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/1192-133-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/1192-130-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/1192-127-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/1192-125-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/1192-123-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/1664-100-0x00000000042A0000-0x00000000042A1000-memory.dmp

    Filesize

    4KB

  • memory/1664-103-0x0000000004240000-0x0000000004241000-memory.dmp

    Filesize

    4KB

  • memory/1664-115-0x00000000042C0000-0x00000000042C1000-memory.dmp

    Filesize

    4KB

  • memory/1664-114-0x0000000004280000-0x0000000004281000-memory.dmp

    Filesize

    4KB

  • memory/1664-113-0x00000000041D0000-0x00000000041D1000-memory.dmp

    Filesize

    4KB

  • memory/1664-112-0x0000000004370000-0x0000000004371000-memory.dmp

    Filesize

    4KB

  • memory/1664-111-0x0000000004320000-0x0000000004321000-memory.dmp

    Filesize

    4KB

  • memory/1664-110-0x00000000042B0000-0x00000000042B1000-memory.dmp

    Filesize

    4KB

  • memory/1664-108-0x0000000004290000-0x0000000004291000-memory.dmp

    Filesize

    4KB

  • memory/1664-107-0x0000000004200000-0x0000000004201000-memory.dmp

    Filesize

    4KB

  • memory/1664-106-0x0000000004310000-0x0000000004311000-memory.dmp

    Filesize

    4KB

  • memory/1664-105-0x0000000004230000-0x0000000004231000-memory.dmp

    Filesize

    4KB

  • memory/1664-104-0x00000000042E0000-0x00000000042E2000-memory.dmp

    Filesize

    8KB

  • memory/1664-89-0x0000000000400000-0x00000000006A2000-memory.dmp

    Filesize

    2.6MB

  • memory/1664-102-0x00000000042F0000-0x00000000042F1000-memory.dmp

    Filesize

    4KB

  • memory/1664-101-0x0000000004270000-0x0000000004271000-memory.dmp

    Filesize

    4KB

  • memory/1664-118-0x0000000000400000-0x00000000006A2000-memory.dmp

    Filesize

    2.6MB

  • memory/1664-117-0x0000000004380000-0x0000000004381000-memory.dmp

    Filesize

    4KB

  • memory/1664-109-0x00000000042D0000-0x00000000042D1000-memory.dmp

    Filesize

    4KB

  • memory/1664-120-0x00000000041E0000-0x00000000041E1000-memory.dmp

    Filesize

    4KB

  • memory/1664-98-0x0000000004300000-0x0000000004301000-memory.dmp

    Filesize

    4KB

  • memory/1664-99-0x0000000004210000-0x0000000004211000-memory.dmp

    Filesize

    4KB

  • memory/1664-170-0x0000000000400000-0x00000000006A2000-memory.dmp

    Filesize

    2.6MB

  • memory/1664-116-0x0000000004350000-0x0000000004351000-memory.dmp

    Filesize

    4KB

  • memory/1664-96-0x00000000779B0000-0x00000000779B2000-memory.dmp

    Filesize

    8KB

  • memory/2436-97-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2436-94-0x00000000026C0000-0x00000000026D0000-memory.dmp

    Filesize

    64KB

  • memory/2436-84-0x00000000026C0000-0x0000000002948000-memory.dmp

    Filesize

    2.5MB

  • memory/2436-83-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2436-54-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2436-64-0x00000000026C0000-0x0000000002948000-memory.dmp

    Filesize

    2.5MB

  • memory/2644-90-0x0000000000400000-0x0000000000688000-memory.dmp

    Filesize

    2.5MB

  • memory/2644-87-0x0000000000400000-0x0000000000688000-memory.dmp

    Filesize

    2.5MB

  • memory/2644-65-0x0000000000400000-0x0000000000688000-memory.dmp

    Filesize

    2.5MB

  • memory/3044-159-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/3044-152-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/3044-148-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/3044-158-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/3044-163-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/3044-164-0x0000000010000000-0x000000001002A000-memory.dmp

    Filesize

    168KB

  • memory/3044-155-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/3044-150-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/3044-171-0x0000000000FD0000-0x0000000000FE4000-memory.dmp

    Filesize

    80KB

  • memory/3044-175-0x0000000000FD0000-0x0000000000FE4000-memory.dmp

    Filesize

    80KB

  • memory/3044-174-0x0000000000FD0000-0x0000000000FE4000-memory.dmp

    Filesize

    80KB