Analysis

  • max time kernel
    142s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-08-2023 04:12

General

  • Target

    Wps.exe

  • Size

    4.2MB

  • MD5

    6f5df8e00902ba60401c69463d280ba7

  • SHA1

    7183d6a403bf51a61dbf37196ec9e0b2cb15779d

  • SHA256

    de33644dcb241185d89c7606a8fc7239a274ad277c7b9abf5778736edcb674a9

  • SHA512

    1a0fce1f96235997b8144f5e016050413cd74db2fdc90d9fc2fa30db173a3053e9cc141e88b65624f64c03929d07c9acdd3bacdfc94e406e659023232b7ea386

  • SSDEEP

    98304:n2Jg31PBVygltLW1fvbG05DOyq/FwZ7aujE+tfxe:2Jw1+glta1fvb/NOHwZ3jE+tfc

Malware Config

Signatures

  • FatalRat

    FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

  • Fatal Rat payload 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Wps.exe
    "C:\Users\Admin\AppData\Local\Temp\Wps.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:904
    • C:\Program Files (x86)\uu6.exe
      "C:\Program Files (x86)\uu6.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2648
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:3856
    • C:\Users\Public\Documents\123\PTvrst.exe
      "C:\Users\Public\Documents\123\PTvrst.exe"
      1⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3660
      • C:\WINDOWS\DNomb\spolsvt.exe
        C:\WINDOWS\DNomb\spolsvt.exe
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1592
        • C:\Users\Public\Documents\t\spolsvt.exe
          C:\Users\Public\Documents\t\spolsvt.exe
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4216

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\uu6.exe

      Filesize

      1.3MB

      MD5

      46a9d07a97b5b35bfb3d61509b4110bb

      SHA1

      a4fc26da50e1f06782fbfb1a46368600e881c66e

      SHA256

      7916c0b39135619a5f8cbc0c71ea762e6e65624c7c85ccd5900039bbb5e056ba

      SHA512

      50a4adcf22cacf43df14fc6e7730cce535f3718775aaee6fc5b71f80db6cdd66a8738dcf71daa09b199b1066d880942215d67fb986c37ba6998a11210681101a

    • C:\Program Files (x86)\uu6.exe

      Filesize

      1.3MB

      MD5

      46a9d07a97b5b35bfb3d61509b4110bb

      SHA1

      a4fc26da50e1f06782fbfb1a46368600e881c66e

      SHA256

      7916c0b39135619a5f8cbc0c71ea762e6e65624c7c85ccd5900039bbb5e056ba

      SHA512

      50a4adcf22cacf43df14fc6e7730cce535f3718775aaee6fc5b71f80db6cdd66a8738dcf71daa09b199b1066d880942215d67fb986c37ba6998a11210681101a

    • C:\Program Files (x86)\uu6.exe

      Filesize

      1.3MB

      MD5

      46a9d07a97b5b35bfb3d61509b4110bb

      SHA1

      a4fc26da50e1f06782fbfb1a46368600e881c66e

      SHA256

      7916c0b39135619a5f8cbc0c71ea762e6e65624c7c85ccd5900039bbb5e056ba

      SHA512

      50a4adcf22cacf43df14fc6e7730cce535f3718775aaee6fc5b71f80db6cdd66a8738dcf71daa09b199b1066d880942215d67fb986c37ba6998a11210681101a

    • C:\Users\Public\Documents\123\PTvrst.exe

      Filesize

      1.2MB

      MD5

      d22cfb5bfaeb1503b12b07e53ef0a149

      SHA1

      8ea2c85e363f551a159fabd65377affed4e417a1

      SHA256

      260464fb05210cfb30ef7a12d568f75eb781634b251d958cae8911948f6ca360

      SHA512

      151024cb2960b1ee485ded7ccbb753fe368a93fda5699af72e568667fa54bfb0d1732444e7b60efaab6d372204157cdb6abbf8862d0e89d612dd963342215e45

    • C:\Users\Public\Documents\123\PTvrst.exe

      Filesize

      1.2MB

      MD5

      d22cfb5bfaeb1503b12b07e53ef0a149

      SHA1

      8ea2c85e363f551a159fabd65377affed4e417a1

      SHA256

      260464fb05210cfb30ef7a12d568f75eb781634b251d958cae8911948f6ca360

      SHA512

      151024cb2960b1ee485ded7ccbb753fe368a93fda5699af72e568667fa54bfb0d1732444e7b60efaab6d372204157cdb6abbf8862d0e89d612dd963342215e45

    • C:\Users\Public\Documents\t\spolsvt.exe

      Filesize

      16KB

      MD5

      cdce4713e784ae069d73723034a957ff

      SHA1

      9a393a6bab6568f1a774fb753353223f11367e09

      SHA256

      b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8

      SHA512

      0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

    • C:\Users\Public\Documents\t\spolsvt.exe

      Filesize

      16KB

      MD5

      cdce4713e784ae069d73723034a957ff

      SHA1

      9a393a6bab6568f1a774fb753353223f11367e09

      SHA256

      b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8

      SHA512

      0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

    • C:\WINDOWS\DNomb\Mpec.mbt

      Filesize

      488KB

      MD5

      6894403c7124ed7b24d6a6fc7158cb4e

      SHA1

      802290c110dd05631e2dda8ba18bfbfccaa10331

      SHA256

      21d81876aa65d400a3569f3db177435718f94aa7e7e47448319e704894b17f72

      SHA512

      38e7214f8cf1944650512d53fbb03f9de8ff5c52717445b376f603a462ea55ddd8a199a71f00d4b0b293271c475fc72a111ff9028e5029e72d85a39bfa4c2f01

    • C:\WINDOWS\DNomb\spolsvt.exe

      Filesize

      9KB

      MD5

      523d5c39f9d8d2375c3df68251fa2249

      SHA1

      d4ed365c44bec9246fc1a65a32a7791792647a10

      SHA256

      20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

      SHA512

      526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

    • C:\Windows\DNomb\spolsvt.exe

      Filesize

      9KB

      MD5

      523d5c39f9d8d2375c3df68251fa2249

      SHA1

      d4ed365c44bec9246fc1a65a32a7791792647a10

      SHA256

      20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

      SHA512

      526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

    • memory/904-159-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/904-209-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/904-133-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1592-196-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/1592-197-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/1592-188-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/1592-190-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/1592-187-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/1592-185-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/2648-161-0x0000000000400000-0x0000000000688000-memory.dmp

      Filesize

      2.5MB

    • memory/2648-160-0x0000000000400000-0x0000000000688000-memory.dmp

      Filesize

      2.5MB

    • memory/2648-148-0x0000000000400000-0x0000000000688000-memory.dmp

      Filesize

      2.5MB

    • memory/3660-169-0x00000000047E0000-0x00000000047E1000-memory.dmp

      Filesize

      4KB

    • memory/3660-174-0x0000000004770000-0x0000000004771000-memory.dmp

      Filesize

      4KB

    • memory/3660-182-0x0000000004740000-0x0000000004741000-memory.dmp

      Filesize

      4KB

    • memory/3660-180-0x0000000004860000-0x0000000004861000-memory.dmp

      Filesize

      4KB

    • memory/3660-184-0x0000000004790000-0x0000000004791000-memory.dmp

      Filesize

      4KB

    • memory/3660-178-0x00000000047B0000-0x00000000047B1000-memory.dmp

      Filesize

      4KB

    • memory/3660-177-0x00000000047C0000-0x00000000047C1000-memory.dmp

      Filesize

      4KB

    • memory/3660-189-0x0000000000400000-0x00000000006A2000-memory.dmp

      Filesize

      2.6MB

    • memory/3660-191-0x00000000048F0000-0x00000000048F1000-memory.dmp

      Filesize

      4KB

    • memory/3660-193-0x0000000004870000-0x0000000004871000-memory.dmp

      Filesize

      4KB

    • memory/3660-176-0x00000000047F0000-0x00000000047F1000-memory.dmp

      Filesize

      4KB

    • memory/3660-175-0x0000000004760000-0x0000000004761000-memory.dmp

      Filesize

      4KB

    • memory/3660-186-0x0000000004840000-0x0000000004841000-memory.dmp

      Filesize

      4KB

    • memory/3660-179-0x0000000004810000-0x0000000004811000-memory.dmp

      Filesize

      4KB

    • memory/3660-173-0x00000000047D0000-0x00000000047D2000-memory.dmp

      Filesize

      8KB

    • memory/3660-172-0x0000000004780000-0x0000000004781000-memory.dmp

      Filesize

      4KB

    • memory/3660-171-0x00000000047A0000-0x00000000047A1000-memory.dmp

      Filesize

      4KB

    • memory/3660-215-0x0000000000400000-0x00000000006A2000-memory.dmp

      Filesize

      2.6MB

    • memory/3660-167-0x0000000000400000-0x00000000006A2000-memory.dmp

      Filesize

      2.6MB

    • memory/3660-168-0x00000000779D4000-0x00000000779D6000-memory.dmp

      Filesize

      8KB

    • memory/3660-170-0x0000000004750000-0x0000000004751000-memory.dmp

      Filesize

      4KB

    • memory/4216-208-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4216-204-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4216-203-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4216-210-0x0000000010000000-0x000000001002A000-memory.dmp

      Filesize

      168KB

    • memory/4216-202-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB