Analysis

  • max time kernel
    117s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    05-09-2023 18:21

General

  • Target

    JC_a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe

  • Size

    1.6MB

  • MD5

    1bcddbf266ca5ead13f8fda22f798fd6

  • SHA1

    a416fc0d6616d02d9032c63e2f1dea351fc356d9

  • SHA256

    a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1

  • SHA512

    4bee8aa62248c7581349e308bd2861145a9c8a937f0c8a5bfb3c5d0a6952b7227a5d9328600e7349eb8c60f07ae75e695c9c5b0f0b1f56b2bd916417d6abe979

  • SSDEEP

    49152:fjPrzD4vARLDQNZw9vnQ1MSltub4RWfl7RVwO+6N:fDrzD4vA1DQ2gfI4e9VVT

Malware Config

Signatures

  • FatalRat

    FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

  • Fatal Rat payload 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 5 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 58 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JC_a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe
    "C:\Users\Admin\AppData\Local\Temp\JC_a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:3000
    • C:\Program Files (x86)\q1.exe
      "C:\Program Files (x86)\q1.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2788
      • C:\Windows\DNomb\spolsvt.exe
        C:\Windows\DNomb\spolsvt.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2628
        • C:\Users\Public\Documents\t\spolsvt.exe
          C:\Users\Public\Documents\t\spolsvt.exe
          4⤵
          • Executes dropped EXE
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2296
  • C:\Users\Public\Documents\123\PTvrst.exe
    "C:\Users\Public\Documents\123\PTvrst.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\q1.exe

    Filesize

    395KB

    MD5

    32865e3033c398c38c8e1d29482ca61e

    SHA1

    6b6b220cda653101a0adcc1f027016f2262292a6

    SHA256

    b58c30c03b5f0634918ca3e582e5835df073f0c93cde562a1651cd6ea4d4227c

    SHA512

    54795c14d468e31b964156e67156d11a08dd7ad2b2673969bc5044932c00c2dbfb69eb7d08aa72672818e56b7cbd3970ba620ffe8aabafe98e343f2b00e28631

  • C:\Program Files (x86)\q1.exe

    Filesize

    395KB

    MD5

    32865e3033c398c38c8e1d29482ca61e

    SHA1

    6b6b220cda653101a0adcc1f027016f2262292a6

    SHA256

    b58c30c03b5f0634918ca3e582e5835df073f0c93cde562a1651cd6ea4d4227c

    SHA512

    54795c14d468e31b964156e67156d11a08dd7ad2b2673969bc5044932c00c2dbfb69eb7d08aa72672818e56b7cbd3970ba620ffe8aabafe98e343f2b00e28631

  • C:\Users\Public\Documents\123\PTvrst.exe

    Filesize

    1.2MB

    MD5

    d22cfb5bfaeb1503b12b07e53ef0a149

    SHA1

    8ea2c85e363f551a159fabd65377affed4e417a1

    SHA256

    260464fb05210cfb30ef7a12d568f75eb781634b251d958cae8911948f6ca360

    SHA512

    151024cb2960b1ee485ded7ccbb753fe368a93fda5699af72e568667fa54bfb0d1732444e7b60efaab6d372204157cdb6abbf8862d0e89d612dd963342215e45

  • C:\Users\Public\Documents\123\PTvrst.exe

    Filesize

    1.2MB

    MD5

    d22cfb5bfaeb1503b12b07e53ef0a149

    SHA1

    8ea2c85e363f551a159fabd65377affed4e417a1

    SHA256

    260464fb05210cfb30ef7a12d568f75eb781634b251d958cae8911948f6ca360

    SHA512

    151024cb2960b1ee485ded7ccbb753fe368a93fda5699af72e568667fa54bfb0d1732444e7b60efaab6d372204157cdb6abbf8862d0e89d612dd963342215e45

  • C:\Users\Public\Documents\t\spolsvt.exe

    Filesize

    16KB

    MD5

    cdce4713e784ae069d73723034a957ff

    SHA1

    9a393a6bab6568f1a774fb753353223f11367e09

    SHA256

    b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8

    SHA512

    0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

  • C:\Users\Public\Documents\t\spolsvt.exe

    Filesize

    16KB

    MD5

    cdce4713e784ae069d73723034a957ff

    SHA1

    9a393a6bab6568f1a774fb753353223f11367e09

    SHA256

    b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8

    SHA512

    0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

  • C:\Users\Public\Documents\t\spolsvt.exe

    Filesize

    16KB

    MD5

    cdce4713e784ae069d73723034a957ff

    SHA1

    9a393a6bab6568f1a774fb753353223f11367e09

    SHA256

    b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8

    SHA512

    0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

  • C:\Windows\DNomb\spolsvt.exe

    Filesize

    9KB

    MD5

    523d5c39f9d8d2375c3df68251fa2249

    SHA1

    d4ed365c44bec9246fc1a65a32a7791792647a10

    SHA256

    20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

    SHA512

    526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

  • C:\Windows\DNomb\spolsvt.exe

    Filesize

    9KB

    MD5

    523d5c39f9d8d2375c3df68251fa2249

    SHA1

    d4ed365c44bec9246fc1a65a32a7791792647a10

    SHA256

    20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

    SHA512

    526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

  • \Program Files (x86)\q1.exe

    Filesize

    395KB

    MD5

    32865e3033c398c38c8e1d29482ca61e

    SHA1

    6b6b220cda653101a0adcc1f027016f2262292a6

    SHA256

    b58c30c03b5f0634918ca3e582e5835df073f0c93cde562a1651cd6ea4d4227c

    SHA512

    54795c14d468e31b964156e67156d11a08dd7ad2b2673969bc5044932c00c2dbfb69eb7d08aa72672818e56b7cbd3970ba620ffe8aabafe98e343f2b00e28631

  • \Users\Public\Documents\t\spolsvt.exe

    Filesize

    16KB

    MD5

    cdce4713e784ae069d73723034a957ff

    SHA1

    9a393a6bab6568f1a774fb753353223f11367e09

    SHA256

    b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8

    SHA512

    0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

  • \Users\Public\Documents\t\spolsvt.exe

    Filesize

    16KB

    MD5

    cdce4713e784ae069d73723034a957ff

    SHA1

    9a393a6bab6568f1a774fb753353223f11367e09

    SHA256

    b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8

    SHA512

    0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

  • \Windows\DNomb\spolsvt.exe

    Filesize

    9KB

    MD5

    523d5c39f9d8d2375c3df68251fa2249

    SHA1

    d4ed365c44bec9246fc1a65a32a7791792647a10

    SHA256

    20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

    SHA512

    526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

  • \Windows\DNomb\spolsvt.exe

    Filesize

    9KB

    MD5

    523d5c39f9d8d2375c3df68251fa2249

    SHA1

    d4ed365c44bec9246fc1a65a32a7791792647a10

    SHA256

    20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

    SHA512

    526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

  • memory/896-114-0x0000000004380000-0x0000000004381000-memory.dmp

    Filesize

    4KB

  • memory/896-105-0x0000000004200000-0x0000000004201000-memory.dmp

    Filesize

    4KB

  • memory/896-112-0x00000000042C0000-0x00000000042C1000-memory.dmp

    Filesize

    4KB

  • memory/896-111-0x0000000004270000-0x0000000004271000-memory.dmp

    Filesize

    4KB

  • memory/896-115-0x0000000004310000-0x0000000004311000-memory.dmp

    Filesize

    4KB

  • memory/896-103-0x00000000042E0000-0x00000000042E2000-memory.dmp

    Filesize

    8KB

  • memory/896-104-0x0000000004230000-0x0000000004231000-memory.dmp

    Filesize

    4KB

  • memory/896-116-0x0000000004370000-0x0000000004371000-memory.dmp

    Filesize

    4KB

  • memory/896-102-0x0000000004240000-0x0000000004241000-memory.dmp

    Filesize

    4KB

  • memory/896-101-0x00000000042F0000-0x00000000042F1000-memory.dmp

    Filesize

    4KB

  • memory/896-97-0x0000000000400000-0x00000000006A2000-memory.dmp

    Filesize

    2.6MB

  • memory/896-100-0x0000000004260000-0x0000000004262000-memory.dmp

    Filesize

    8KB

  • memory/896-98-0x0000000004210000-0x0000000004211000-memory.dmp

    Filesize

    4KB

  • memory/896-119-0x00000000042B0000-0x00000000042B1000-memory.dmp

    Filesize

    4KB

  • memory/896-99-0x0000000004290000-0x0000000004291000-memory.dmp

    Filesize

    4KB

  • memory/896-96-0x0000000004300000-0x0000000004301000-memory.dmp

    Filesize

    4KB

  • memory/896-118-0x0000000000400000-0x00000000006A2000-memory.dmp

    Filesize

    2.6MB

  • memory/896-110-0x00000000041D0000-0x00000000041D1000-memory.dmp

    Filesize

    4KB

  • memory/896-109-0x0000000004320000-0x0000000004321000-memory.dmp

    Filesize

    4KB

  • memory/896-108-0x00000000042A0000-0x00000000042A1000-memory.dmp

    Filesize

    4KB

  • memory/896-107-0x00000000042D0000-0x00000000042D1000-memory.dmp

    Filesize

    4KB

  • memory/896-117-0x0000000000400000-0x00000000006A2000-memory.dmp

    Filesize

    2.6MB

  • memory/896-120-0x00000000042B0000-0x00000000042B1000-memory.dmp

    Filesize

    4KB

  • memory/896-89-0x0000000000400000-0x00000000006A2000-memory.dmp

    Filesize

    2.6MB

  • memory/896-106-0x0000000004280000-0x0000000004281000-memory.dmp

    Filesize

    4KB

  • memory/896-113-0x0000000004350000-0x0000000004351000-memory.dmp

    Filesize

    4KB

  • memory/896-95-0x0000000077660000-0x0000000077662000-memory.dmp

    Filesize

    8KB

  • memory/2296-74-0x0000000010000000-0x000000001002A000-memory.dmp

    Filesize

    168KB

  • memory/2296-73-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2296-68-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2296-69-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2296-60-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2296-65-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2296-62-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2296-58-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2628-43-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2628-36-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/2628-34-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/2628-35-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/2628-38-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/2628-40-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/2628-42-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/2628-48-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/2788-85-0x0000000001080000-0x00000000011D2000-memory.dmp

    Filesize

    1.3MB

  • memory/2788-86-0x0000000001080000-0x00000000011D2000-memory.dmp

    Filesize

    1.3MB

  • memory/2788-90-0x0000000001080000-0x00000000011D2000-memory.dmp

    Filesize

    1.3MB

  • memory/2788-11-0x0000000001080000-0x00000000011D2000-memory.dmp

    Filesize

    1.3MB

  • memory/3000-0-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/3000-82-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/3000-83-0x0000000002550000-0x00000000026A2000-memory.dmp

    Filesize

    1.3MB

  • memory/3000-94-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/3000-9-0x0000000002550000-0x00000000026A2000-memory.dmp

    Filesize

    1.3MB