Analysis

  • max time kernel
    122s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    05-09-2023 23:47

General

  • Target

    150daf72d05fd62f2aecb50e25b7d6e4ffda38a7459bd4b2b22a05377fc46527.exe

  • Size

    260KB

  • MD5

    b82fac29e28d912654e8b1f92b3cc0c7

  • SHA1

    f1a645c26816e114501e25e7e8da2c0b97bb0acc

  • SHA256

    150daf72d05fd62f2aecb50e25b7d6e4ffda38a7459bd4b2b22a05377fc46527

  • SHA512

    a50986bd34bf4e2e297b74d8d592e5e7cd1ccade0f290478637d5d49b7aec4b50cc2eb8eea355f2f36f0d697b4064bb721a131625b25451bab30a471fc281d2f

  • SSDEEP

    6144:Ic5M+ZJcIpJ2TktDMMtEALBXAOf5vK77fN:Ic5MgyIpkOrRp67fN

Malware Config

Signatures

  • FatalRat

    FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

  • Fatal Rat payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 59 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\150daf72d05fd62f2aecb50e25b7d6e4ffda38a7459bd4b2b22a05377fc46527.exe
    "C:\Users\Admin\AppData\Local\Temp\150daf72d05fd62f2aecb50e25b7d6e4ffda38a7459bd4b2b22a05377fc46527.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2796
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command -
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2772
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2532
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command -
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1328
    • C:\Users\Admin\AppData\Local\150daf72d05fd62f2aecb50e25b7d6e4ffda38a7459bd4b2b22a05377fc46527.exe
      "C:\Users\Admin\AppData\Local\150daf72d05fd62f2aecb50e25b7d6e4ffda38a7459bd4b2b22a05377fc46527.exe"
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1084
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1964
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command -
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2336
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1672
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command -
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\150daf72d05fd62f2aecb50e25b7d6e4ffda38a7459bd4b2b22a05377fc46527.exe

    Filesize

    260KB

    MD5

    b82fac29e28d912654e8b1f92b3cc0c7

    SHA1

    f1a645c26816e114501e25e7e8da2c0b97bb0acc

    SHA256

    150daf72d05fd62f2aecb50e25b7d6e4ffda38a7459bd4b2b22a05377fc46527

    SHA512

    a50986bd34bf4e2e297b74d8d592e5e7cd1ccade0f290478637d5d49b7aec4b50cc2eb8eea355f2f36f0d697b4064bb721a131625b25451bab30a471fc281d2f

  • C:\Users\Admin\AppData\Local\150daf72d05fd62f2aecb50e25b7d6e4ffda38a7459bd4b2b22a05377fc46527.exe

    Filesize

    260KB

    MD5

    b82fac29e28d912654e8b1f92b3cc0c7

    SHA1

    f1a645c26816e114501e25e7e8da2c0b97bb0acc

    SHA256

    150daf72d05fd62f2aecb50e25b7d6e4ffda38a7459bd4b2b22a05377fc46527

    SHA512

    a50986bd34bf4e2e297b74d8d592e5e7cd1ccade0f290478637d5d49b7aec4b50cc2eb8eea355f2f36f0d697b4064bb721a131625b25451bab30a471fc281d2f

  • C:\Users\Admin\AppData\Local\150daf72d05fd62f2aecb50e25b7d6e4ffda38a7459bd4b2b22a05377fc46527.exe

    Filesize

    260KB

    MD5

    b82fac29e28d912654e8b1f92b3cc0c7

    SHA1

    f1a645c26816e114501e25e7e8da2c0b97bb0acc

    SHA256

    150daf72d05fd62f2aecb50e25b7d6e4ffda38a7459bd4b2b22a05377fc46527

    SHA512

    a50986bd34bf4e2e297b74d8d592e5e7cd1ccade0f290478637d5d49b7aec4b50cc2eb8eea355f2f36f0d697b4064bb721a131625b25451bab30a471fc281d2f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\C1E1NBQ8T8P85OF1YUZA.temp

    Filesize

    7KB

    MD5

    42dd8bd9f1f0791c6bf6246ce7b10799

    SHA1

    e487914e6caeb5c68c0a74eda1ad16bdb8e39c94

    SHA256

    bd6f35b91d6835f6bf9c1085b3110c0150b12c443bba03f8555f00c6134c9da5

    SHA512

    8e40b5384712997d3148535ecf444440327fb5c995e46901082bffc41482a79b039740e2f862203a58e0acb12f81b1407aad0c399db0dad217f9fa8b16e2398e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    42dd8bd9f1f0791c6bf6246ce7b10799

    SHA1

    e487914e6caeb5c68c0a74eda1ad16bdb8e39c94

    SHA256

    bd6f35b91d6835f6bf9c1085b3110c0150b12c443bba03f8555f00c6134c9da5

    SHA512

    8e40b5384712997d3148535ecf444440327fb5c995e46901082bffc41482a79b039740e2f862203a58e0acb12f81b1407aad0c399db0dad217f9fa8b16e2398e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    d2fd07ec2d22698c78cd6b66d4da474c

    SHA1

    486012e2e81dadcbbb81fb8c9f841921d004128d

    SHA256

    cbeacf29bf0d9ac2fcd9290337038fb658320d87eae1f60993fc6347d011b3b3

    SHA512

    ff23892ab38875b3cba1ea71e321a508d2c9f2167bcac103b11f2b87efaf53378b793b8e9376ba7d69d8f8d9d0c566f16c3397bdb3bd23b72dd96c5a0f024ec8

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    d2fd07ec2d22698c78cd6b66d4da474c

    SHA1

    486012e2e81dadcbbb81fb8c9f841921d004128d

    SHA256

    cbeacf29bf0d9ac2fcd9290337038fb658320d87eae1f60993fc6347d011b3b3

    SHA512

    ff23892ab38875b3cba1ea71e321a508d2c9f2167bcac103b11f2b87efaf53378b793b8e9376ba7d69d8f8d9d0c566f16c3397bdb3bd23b72dd96c5a0f024ec8

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    42dd8bd9f1f0791c6bf6246ce7b10799

    SHA1

    e487914e6caeb5c68c0a74eda1ad16bdb8e39c94

    SHA256

    bd6f35b91d6835f6bf9c1085b3110c0150b12c443bba03f8555f00c6134c9da5

    SHA512

    8e40b5384712997d3148535ecf444440327fb5c995e46901082bffc41482a79b039740e2f862203a58e0acb12f81b1407aad0c399db0dad217f9fa8b16e2398e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    42dd8bd9f1f0791c6bf6246ce7b10799

    SHA1

    e487914e6caeb5c68c0a74eda1ad16bdb8e39c94

    SHA256

    bd6f35b91d6835f6bf9c1085b3110c0150b12c443bba03f8555f00c6134c9da5

    SHA512

    8e40b5384712997d3148535ecf444440327fb5c995e46901082bffc41482a79b039740e2f862203a58e0acb12f81b1407aad0c399db0dad217f9fa8b16e2398e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    42dd8bd9f1f0791c6bf6246ce7b10799

    SHA1

    e487914e6caeb5c68c0a74eda1ad16bdb8e39c94

    SHA256

    bd6f35b91d6835f6bf9c1085b3110c0150b12c443bba03f8555f00c6134c9da5

    SHA512

    8e40b5384712997d3148535ecf444440327fb5c995e46901082bffc41482a79b039740e2f862203a58e0acb12f81b1407aad0c399db0dad217f9fa8b16e2398e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    d2fd07ec2d22698c78cd6b66d4da474c

    SHA1

    486012e2e81dadcbbb81fb8c9f841921d004128d

    SHA256

    cbeacf29bf0d9ac2fcd9290337038fb658320d87eae1f60993fc6347d011b3b3

    SHA512

    ff23892ab38875b3cba1ea71e321a508d2c9f2167bcac103b11f2b87efaf53378b793b8e9376ba7d69d8f8d9d0c566f16c3397bdb3bd23b72dd96c5a0f024ec8

  • C:\Users\Default\Desktop\athletes.exe

    Filesize

    260KB

    MD5

    b82fac29e28d912654e8b1f92b3cc0c7

    SHA1

    f1a645c26816e114501e25e7e8da2c0b97bb0acc

    SHA256

    150daf72d05fd62f2aecb50e25b7d6e4ffda38a7459bd4b2b22a05377fc46527

    SHA512

    a50986bd34bf4e2e297b74d8d592e5e7cd1ccade0f290478637d5d49b7aec4b50cc2eb8eea355f2f36f0d697b4064bb721a131625b25451bab30a471fc281d2f

  • \Users\Admin\AppData\Local\150daf72d05fd62f2aecb50e25b7d6e4ffda38a7459bd4b2b22a05377fc46527.exe

    Filesize

    260KB

    MD5

    b82fac29e28d912654e8b1f92b3cc0c7

    SHA1

    f1a645c26816e114501e25e7e8da2c0b97bb0acc

    SHA256

    150daf72d05fd62f2aecb50e25b7d6e4ffda38a7459bd4b2b22a05377fc46527

    SHA512

    a50986bd34bf4e2e297b74d8d592e5e7cd1ccade0f290478637d5d49b7aec4b50cc2eb8eea355f2f36f0d697b4064bb721a131625b25451bab30a471fc281d2f

  • memory/1084-107-0x0000000002C30000-0x0000000002D30000-memory.dmp

    Filesize

    1024KB

  • memory/1084-109-0x0000000002C30000-0x0000000002D30000-memory.dmp

    Filesize

    1024KB

  • memory/1084-108-0x0000000010000000-0x0000000010036000-memory.dmp

    Filesize

    216KB

  • memory/1084-114-0x0000000002C30000-0x0000000002D30000-memory.dmp

    Filesize

    1024KB

  • memory/1084-115-0x0000000002C30000-0x0000000002D30000-memory.dmp

    Filesize

    1024KB

  • memory/1328-38-0x0000000073CD0000-0x000000007427B000-memory.dmp

    Filesize

    5.7MB

  • memory/1328-37-0x0000000002600000-0x0000000002640000-memory.dmp

    Filesize

    256KB

  • memory/1328-36-0x0000000002600000-0x0000000002640000-memory.dmp

    Filesize

    256KB

  • memory/1328-35-0x0000000073CD0000-0x000000007427B000-memory.dmp

    Filesize

    5.7MB

  • memory/1328-39-0x0000000002600000-0x0000000002640000-memory.dmp

    Filesize

    256KB

  • memory/1328-34-0x0000000073CD0000-0x000000007427B000-memory.dmp

    Filesize

    5.7MB

  • memory/1672-87-0x0000000073030000-0x00000000735DB000-memory.dmp

    Filesize

    5.7MB

  • memory/1672-88-0x0000000073030000-0x00000000735DB000-memory.dmp

    Filesize

    5.7MB

  • memory/1672-89-0x0000000002820000-0x0000000002860000-memory.dmp

    Filesize

    256KB

  • memory/1672-90-0x0000000002820000-0x0000000002860000-memory.dmp

    Filesize

    256KB

  • memory/1672-91-0x0000000073030000-0x00000000735DB000-memory.dmp

    Filesize

    5.7MB

  • memory/1672-92-0x0000000002820000-0x0000000002860000-memory.dmp

    Filesize

    256KB

  • memory/1672-93-0x0000000002820000-0x0000000002860000-memory.dmp

    Filesize

    256KB

  • memory/1964-62-0x0000000073880000-0x0000000073E2B000-memory.dmp

    Filesize

    5.7MB

  • memory/1964-63-0x0000000002670000-0x00000000026B0000-memory.dmp

    Filesize

    256KB

  • memory/1964-64-0x0000000073880000-0x0000000073E2B000-memory.dmp

    Filesize

    5.7MB

  • memory/1964-65-0x0000000073880000-0x0000000073E2B000-memory.dmp

    Filesize

    5.7MB

  • memory/1964-66-0x0000000002670000-0x00000000026B0000-memory.dmp

    Filesize

    256KB

  • memory/1964-67-0x0000000002670000-0x00000000026B0000-memory.dmp

    Filesize

    256KB

  • memory/2016-103-0x0000000073CC0000-0x000000007426B000-memory.dmp

    Filesize

    5.7MB

  • memory/2016-102-0x0000000073CC0000-0x000000007426B000-memory.dmp

    Filesize

    5.7MB

  • memory/2016-104-0x0000000002770000-0x00000000027B0000-memory.dmp

    Filesize

    256KB

  • memory/2016-101-0x0000000002770000-0x00000000027B0000-memory.dmp

    Filesize

    256KB

  • memory/2016-100-0x0000000073CC0000-0x000000007426B000-memory.dmp

    Filesize

    5.7MB

  • memory/2244-41-0x0000000002C60000-0x0000000002D60000-memory.dmp

    Filesize

    1024KB

  • memory/2244-44-0x0000000010000000-0x0000000010036000-memory.dmp

    Filesize

    216KB

  • memory/2244-43-0x0000000002C60000-0x0000000002D60000-memory.dmp

    Filesize

    1024KB

  • memory/2336-75-0x0000000073CD0000-0x000000007427B000-memory.dmp

    Filesize

    5.7MB

  • memory/2336-77-0x00000000025F0000-0x0000000002630000-memory.dmp

    Filesize

    256KB

  • memory/2336-73-0x0000000073CD0000-0x000000007427B000-memory.dmp

    Filesize

    5.7MB

  • memory/2336-74-0x00000000025F0000-0x0000000002630000-memory.dmp

    Filesize

    256KB

  • memory/2336-76-0x0000000073CD0000-0x000000007427B000-memory.dmp

    Filesize

    5.7MB

  • memory/2532-24-0x0000000002860000-0x00000000028A0000-memory.dmp

    Filesize

    256KB

  • memory/2532-23-0x0000000073880000-0x0000000073E2B000-memory.dmp

    Filesize

    5.7MB

  • memory/2532-27-0x0000000073880000-0x0000000073E2B000-memory.dmp

    Filesize

    5.7MB

  • memory/2532-25-0x0000000002860000-0x00000000028A0000-memory.dmp

    Filesize

    256KB

  • memory/2532-28-0x0000000002860000-0x00000000028A0000-memory.dmp

    Filesize

    256KB

  • memory/2532-26-0x0000000073880000-0x0000000073E2B000-memory.dmp

    Filesize

    5.7MB

  • memory/2772-14-0x0000000073CD0000-0x000000007427B000-memory.dmp

    Filesize

    5.7MB

  • memory/2772-13-0x0000000073CD0000-0x000000007427B000-memory.dmp

    Filesize

    5.7MB

  • memory/2772-15-0x0000000073CD0000-0x000000007427B000-memory.dmp

    Filesize

    5.7MB

  • memory/2772-16-0x0000000073CD0000-0x000000007427B000-memory.dmp

    Filesize

    5.7MB

  • memory/2796-3-0x00000000738A0000-0x0000000073E4B000-memory.dmp

    Filesize

    5.7MB

  • memory/2796-7-0x0000000002590000-0x00000000025D0000-memory.dmp

    Filesize

    256KB

  • memory/2796-6-0x00000000738A0000-0x0000000073E4B000-memory.dmp

    Filesize

    5.7MB

  • memory/2796-4-0x0000000002590000-0x00000000025D0000-memory.dmp

    Filesize

    256KB

  • memory/2796-5-0x0000000002590000-0x00000000025D0000-memory.dmp

    Filesize

    256KB

  • memory/2796-2-0x00000000738A0000-0x0000000073E4B000-memory.dmp

    Filesize

    5.7MB