Analysis

  • max time kernel
    120s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    08-09-2023 22:11

General

  • Target

    0fc9b32ce3d413281569d019f0d9cd712224ca7d8a8a375bfea881335142093a.exe

  • Size

    252KB

  • MD5

    e7b77f9ccca4b2438c87def415421e55

  • SHA1

    204fd901dbdd3723e54019805edfd18dd277f3c2

  • SHA256

    0fc9b32ce3d413281569d019f0d9cd712224ca7d8a8a375bfea881335142093a

  • SHA512

    c49c4c44dbfec33749d49ef4d4665f197c05a524bd2d69574934c575f83cfc53ce41618908e5efee844e61e62ae0e5840f0cb188dd60feb07597142f3937bdf7

  • SSDEEP

    6144:2euZGKBb+7wacDG+lACeGD4weCPjkafVWcTKGev7Z:vu0Y+7lcC+lMV7CXk0KGeTZ

Malware Config

Signatures

  • FatalRat

    FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

  • Fatal Rat payload 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 7 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 8 IoCs
  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Windows directory 4 IoCs
  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 57 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0fc9b32ce3d413281569d019f0d9cd712224ca7d8a8a375bfea881335142093a.exe
    "C:\Users\Admin\AppData\Local\Temp\0fc9b32ce3d413281569d019f0d9cd712224ca7d8a8a375bfea881335142093a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Windows\DNomb\spolsvt.exe
      C:\Windows\DNomb\spolsvt.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2848
      • C:\Users\Public\Documents\t\spolsvt.exe
        C:\Users\Public\Documents\t\spolsvt.exe
        3⤵
        • Executes dropped EXE
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2280
    • C:\Windows\DNomb\spolsvt.exe
      C:\Windows\DNomb\spolsvt.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2552
      • C:\Users\Public\Documents\t\spolsvt.exe
        C:\Users\Public\Documents\t\spolsvt.exe
        3⤵
        • Executes dropped EXE
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:112
    • C:\Windows\DNomb\spolsvt.exe
      C:\Windows\DNomb\spolsvt.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:584
      • C:\Users\Public\Documents\t\spolsvt.exe
        C:\Users\Public\Documents\t\spolsvt.exe
        3⤵
        • Executes dropped EXE
        • Checks processor information in registry
        • Suspicious use of AdjustPrivilegeToken
        PID:1348
  • C:\Users\Public\Documents\123\PTvrst.exe
    "C:\Users\Public\Documents\123\PTvrst.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetWindowsHookEx
    PID:2328

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Public\Documents\123\PTvrst.exe

    Filesize

    1.2MB

    MD5

    d22cfb5bfaeb1503b12b07e53ef0a149

    SHA1

    8ea2c85e363f551a159fabd65377affed4e417a1

    SHA256

    260464fb05210cfb30ef7a12d568f75eb781634b251d958cae8911948f6ca360

    SHA512

    151024cb2960b1ee485ded7ccbb753fe368a93fda5699af72e568667fa54bfb0d1732444e7b60efaab6d372204157cdb6abbf8862d0e89d612dd963342215e45

  • C:\Users\Public\Documents\123\PTvrst.exe

    Filesize

    1.2MB

    MD5

    d22cfb5bfaeb1503b12b07e53ef0a149

    SHA1

    8ea2c85e363f551a159fabd65377affed4e417a1

    SHA256

    260464fb05210cfb30ef7a12d568f75eb781634b251d958cae8911948f6ca360

    SHA512

    151024cb2960b1ee485ded7ccbb753fe368a93fda5699af72e568667fa54bfb0d1732444e7b60efaab6d372204157cdb6abbf8862d0e89d612dd963342215e45

  • C:\Users\Public\Documents\t\spolsvt.exe

    Filesize

    16KB

    MD5

    cdce4713e784ae069d73723034a957ff

    SHA1

    9a393a6bab6568f1a774fb753353223f11367e09

    SHA256

    b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8

    SHA512

    0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

  • C:\Users\Public\Documents\t\spolsvt.exe

    Filesize

    16KB

    MD5

    cdce4713e784ae069d73723034a957ff

    SHA1

    9a393a6bab6568f1a774fb753353223f11367e09

    SHA256

    b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8

    SHA512

    0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

  • C:\Users\Public\Documents\t\spolsvt.exe

    Filesize

    16KB

    MD5

    cdce4713e784ae069d73723034a957ff

    SHA1

    9a393a6bab6568f1a774fb753353223f11367e09

    SHA256

    b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8

    SHA512

    0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

  • C:\Users\Public\Documents\t\spolsvt.exe

    Filesize

    16KB

    MD5

    cdce4713e784ae069d73723034a957ff

    SHA1

    9a393a6bab6568f1a774fb753353223f11367e09

    SHA256

    b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8

    SHA512

    0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

  • C:\Users\Public\Documents\t\spolsvt.exe

    Filesize

    16KB

    MD5

    cdce4713e784ae069d73723034a957ff

    SHA1

    9a393a6bab6568f1a774fb753353223f11367e09

    SHA256

    b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8

    SHA512

    0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

  • C:\Users\Public\Documents\t\yh.png

    Filesize

    93KB

    MD5

    028ba62daac2bc62ae678c2a3fa7b88d

    SHA1

    97cdc3f57b10d10c1c986defbbd008880e9ee2b3

    SHA256

    ca0a6f830f8b727785a0a303b242cdc89687be3424f29bf2fa49a95d182f6104

    SHA512

    2094813617caf57e0f6ff7379ce6eb2a752d1150d44bcbf6ce224d4dfa53307fab50adb7a3d4d9cea2fd0cca2d55290e890cf498d9fc95dcf39a480dfa3c78f7

  • C:\WINDOWS\DNomb\Mpec.mbt

    Filesize

    297B

    MD5

    26ce1c3bf6c4b4e1a2b9731d07a9057b

    SHA1

    493a39b7b39e151e17cef87a29bdc267f37fad3e

    SHA256

    a62009226fa461552a9c715b7ca7f3c44d85755ab4843b5284f5c9ef25475f1f

    SHA512

    3fe5a4b300b1f149ef559b80585109d87ebc036849eaca3884a81d99a45312c2f7bf21d92f1ed08efb51ec3ca5de32d14433b3a095704420285a95ec2eccb38d

  • C:\Windows\DNomb\spolsvt.exe

    Filesize

    9KB

    MD5

    523d5c39f9d8d2375c3df68251fa2249

    SHA1

    d4ed365c44bec9246fc1a65a32a7791792647a10

    SHA256

    20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

    SHA512

    526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

  • C:\Windows\DNomb\spolsvt.exe

    Filesize

    9KB

    MD5

    523d5c39f9d8d2375c3df68251fa2249

    SHA1

    d4ed365c44bec9246fc1a65a32a7791792647a10

    SHA256

    20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

    SHA512

    526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

  • C:\Windows\DNomb\spolsvt.exe

    Filesize

    9KB

    MD5

    523d5c39f9d8d2375c3df68251fa2249

    SHA1

    d4ed365c44bec9246fc1a65a32a7791792647a10

    SHA256

    20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

    SHA512

    526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

  • C:\Windows\DNomb\spolsvt.exe

    Filesize

    9KB

    MD5

    523d5c39f9d8d2375c3df68251fa2249

    SHA1

    d4ed365c44bec9246fc1a65a32a7791792647a10

    SHA256

    20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

    SHA512

    526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

  • \Users\Public\Documents\t\spolsvt.exe

    Filesize

    16KB

    MD5

    cdce4713e784ae069d73723034a957ff

    SHA1

    9a393a6bab6568f1a774fb753353223f11367e09

    SHA256

    b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8

    SHA512

    0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

  • \Users\Public\Documents\t\spolsvt.exe

    Filesize

    16KB

    MD5

    cdce4713e784ae069d73723034a957ff

    SHA1

    9a393a6bab6568f1a774fb753353223f11367e09

    SHA256

    b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8

    SHA512

    0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

  • \Users\Public\Documents\t\spolsvt.exe

    Filesize

    16KB

    MD5

    cdce4713e784ae069d73723034a957ff

    SHA1

    9a393a6bab6568f1a774fb753353223f11367e09

    SHA256

    b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8

    SHA512

    0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

  • \Users\Public\Documents\t\spolsvt.exe

    Filesize

    16KB

    MD5

    cdce4713e784ae069d73723034a957ff

    SHA1

    9a393a6bab6568f1a774fb753353223f11367e09

    SHA256

    b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8

    SHA512

    0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

  • \Windows\DNomb\spolsvt.exe

    Filesize

    9KB

    MD5

    523d5c39f9d8d2375c3df68251fa2249

    SHA1

    d4ed365c44bec9246fc1a65a32a7791792647a10

    SHA256

    20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

    SHA512

    526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

  • \Windows\DNomb\spolsvt.exe

    Filesize

    9KB

    MD5

    523d5c39f9d8d2375c3df68251fa2249

    SHA1

    d4ed365c44bec9246fc1a65a32a7791792647a10

    SHA256

    20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

    SHA512

    526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

  • \Windows\DNomb\spolsvt.exe

    Filesize

    9KB

    MD5

    523d5c39f9d8d2375c3df68251fa2249

    SHA1

    d4ed365c44bec9246fc1a65a32a7791792647a10

    SHA256

    20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

    SHA512

    526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

  • \Windows\DNomb\spolsvt.exe

    Filesize

    9KB

    MD5

    523d5c39f9d8d2375c3df68251fa2249

    SHA1

    d4ed365c44bec9246fc1a65a32a7791792647a10

    SHA256

    20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

    SHA512

    526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

  • memory/2220-184-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2220-0-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2220-178-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2220-1-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2280-64-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2280-95-0x0000000010000000-0x000000001002A000-memory.dmp

    Filesize

    168KB

  • memory/2280-77-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2280-85-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2280-83-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2280-67-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2280-71-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2280-94-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2328-199-0x0000000004080000-0x0000000004081000-memory.dmp

    Filesize

    4KB

  • memory/2328-201-0x00000000042D0000-0x00000000042D1000-memory.dmp

    Filesize

    4KB

  • memory/2328-211-0x00000000042C0000-0x00000000042C1000-memory.dmp

    Filesize

    4KB

  • memory/2328-213-0x0000000004350000-0x0000000004351000-memory.dmp

    Filesize

    4KB

  • memory/2328-212-0x0000000000400000-0x00000000006A2000-memory.dmp

    Filesize

    2.6MB

  • memory/2328-210-0x0000000000400000-0x00000000006A2000-memory.dmp

    Filesize

    2.6MB

  • memory/2328-208-0x0000000004090000-0x0000000004091000-memory.dmp

    Filesize

    4KB

  • memory/2328-207-0x0000000004390000-0x0000000004391000-memory.dmp

    Filesize

    4KB

  • memory/2328-206-0x00000000042A0000-0x00000000042A1000-memory.dmp

    Filesize

    4KB

  • memory/2328-204-0x00000000042B0000-0x00000000042B1000-memory.dmp

    Filesize

    4KB

  • memory/2328-203-0x0000000000400000-0x00000000006A2000-memory.dmp

    Filesize

    2.6MB

  • memory/2328-202-0x0000000004370000-0x0000000004371000-memory.dmp

    Filesize

    4KB

  • memory/2328-200-0x0000000004270000-0x0000000004271000-memory.dmp

    Filesize

    4KB

  • memory/2328-183-0x0000000000400000-0x00000000006A2000-memory.dmp

    Filesize

    2.6MB

  • memory/2328-189-0x0000000004320000-0x0000000004321000-memory.dmp

    Filesize

    4KB

  • memory/2328-185-0x0000000077A40000-0x0000000077A42000-memory.dmp

    Filesize

    8KB

  • memory/2328-186-0x0000000004330000-0x0000000004331000-memory.dmp

    Filesize

    4KB

  • memory/2328-187-0x0000000004200000-0x0000000004201000-memory.dmp

    Filesize

    4KB

  • memory/2328-188-0x0000000004260000-0x0000000004261000-memory.dmp

    Filesize

    4KB

  • memory/2328-197-0x0000000004340000-0x0000000004341000-memory.dmp

    Filesize

    4KB

  • memory/2328-198-0x0000000004380000-0x0000000004381000-memory.dmp

    Filesize

    4KB

  • memory/2328-196-0x00000000042E0000-0x00000000042E1000-memory.dmp

    Filesize

    4KB

  • memory/2328-195-0x0000000004290000-0x0000000004291000-memory.dmp

    Filesize

    4KB

  • memory/2328-194-0x00000000041F0000-0x00000000041F1000-memory.dmp

    Filesize

    4KB

  • memory/2328-193-0x0000000004220000-0x0000000004221000-memory.dmp

    Filesize

    4KB

  • memory/2328-192-0x0000000004300000-0x0000000004302000-memory.dmp

    Filesize

    8KB

  • memory/2328-191-0x0000000004230000-0x0000000004231000-memory.dmp

    Filesize

    4KB

  • memory/2328-190-0x0000000004310000-0x0000000004311000-memory.dmp

    Filesize

    4KB

  • memory/2552-49-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2552-51-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2552-78-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2552-72-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2552-66-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2552-53-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2552-89-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2848-43-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/2848-37-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/2848-27-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/2848-25-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/2848-38-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2848-35-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/2848-32-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/2848-29-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB