Analysis

  • max time kernel
    124s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230831-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-09-2023 22:11

General

  • Target

    0fc9b32ce3d413281569d019f0d9cd712224ca7d8a8a375bfea881335142093a.exe

  • Size

    252KB

  • MD5

    e7b77f9ccca4b2438c87def415421e55

  • SHA1

    204fd901dbdd3723e54019805edfd18dd277f3c2

  • SHA256

    0fc9b32ce3d413281569d019f0d9cd712224ca7d8a8a375bfea881335142093a

  • SHA512

    c49c4c44dbfec33749d49ef4d4665f197c05a524bd2d69574934c575f83cfc53ce41618908e5efee844e61e62ae0e5840f0cb188dd60feb07597142f3937bdf7

  • SSDEEP

    6144:2euZGKBb+7wacDG+lACeGD4weCPjkafVWcTKGev7Z:vu0Y+7lcC+lMV7CXk0KGeTZ

Malware Config

Signatures

  • FatalRat

    FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

  • Fatal Rat payload 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 7 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0fc9b32ce3d413281569d019f0d9cd712224ca7d8a8a375bfea881335142093a.exe
    "C:\Users\Admin\AppData\Local\Temp\0fc9b32ce3d413281569d019f0d9cd712224ca7d8a8a375bfea881335142093a.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4700
    • C:\Windows\DNomb\spolsvt.exe
      C:\Windows\DNomb\spolsvt.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4744
      • C:\Users\Public\Documents\t\spolsvt.exe
        C:\Users\Public\Documents\t\spolsvt.exe
        3⤵
        • Executes dropped EXE
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5044
    • C:\Windows\DNomb\spolsvt.exe
      C:\Windows\DNomb\spolsvt.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4408
      • C:\Users\Public\Documents\t\spolsvt.exe
        C:\Users\Public\Documents\t\spolsvt.exe
        3⤵
        • Executes dropped EXE
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:560
    • C:\Windows\DNomb\spolsvt.exe
      C:\Windows\DNomb\spolsvt.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2204
      • C:\Users\Public\Documents\t\spolsvt.exe
        C:\Users\Public\Documents\t\spolsvt.exe
        3⤵
        • Executes dropped EXE
        • Checks processor information in registry
        • Suspicious use of AdjustPrivilegeToken
        PID:2808
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:3208
    • C:\Users\Public\Documents\123\PTvrst.exe
      "C:\Users\Public\Documents\123\PTvrst.exe"
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetWindowsHookEx
      PID:4100

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Public\Documents\123\PTvrst.exe

      Filesize

      1.2MB

      MD5

      d22cfb5bfaeb1503b12b07e53ef0a149

      SHA1

      8ea2c85e363f551a159fabd65377affed4e417a1

      SHA256

      260464fb05210cfb30ef7a12d568f75eb781634b251d958cae8911948f6ca360

      SHA512

      151024cb2960b1ee485ded7ccbb753fe368a93fda5699af72e568667fa54bfb0d1732444e7b60efaab6d372204157cdb6abbf8862d0e89d612dd963342215e45

    • C:\Users\Public\Documents\123\PTvrst.exe

      Filesize

      1.2MB

      MD5

      d22cfb5bfaeb1503b12b07e53ef0a149

      SHA1

      8ea2c85e363f551a159fabd65377affed4e417a1

      SHA256

      260464fb05210cfb30ef7a12d568f75eb781634b251d958cae8911948f6ca360

      SHA512

      151024cb2960b1ee485ded7ccbb753fe368a93fda5699af72e568667fa54bfb0d1732444e7b60efaab6d372204157cdb6abbf8862d0e89d612dd963342215e45

    • C:\Users\Public\Documents\t\spolsvt.exe

      Filesize

      16KB

      MD5

      cdce4713e784ae069d73723034a957ff

      SHA1

      9a393a6bab6568f1a774fb753353223f11367e09

      SHA256

      b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8

      SHA512

      0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

    • C:\Users\Public\Documents\t\spolsvt.exe

      Filesize

      16KB

      MD5

      cdce4713e784ae069d73723034a957ff

      SHA1

      9a393a6bab6568f1a774fb753353223f11367e09

      SHA256

      b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8

      SHA512

      0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

    • C:\Users\Public\Documents\t\spolsvt.exe

      Filesize

      16KB

      MD5

      cdce4713e784ae069d73723034a957ff

      SHA1

      9a393a6bab6568f1a774fb753353223f11367e09

      SHA256

      b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8

      SHA512

      0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

    • C:\Users\Public\Documents\t\spolsvt.exe

      Filesize

      16KB

      MD5

      cdce4713e784ae069d73723034a957ff

      SHA1

      9a393a6bab6568f1a774fb753353223f11367e09

      SHA256

      b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8

      SHA512

      0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

    • C:\Users\Public\Documents\t\spolsvt.exe

      Filesize

      16KB

      MD5

      cdce4713e784ae069d73723034a957ff

      SHA1

      9a393a6bab6568f1a774fb753353223f11367e09

      SHA256

      b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8

      SHA512

      0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

    • C:\Users\Public\Documents\t\yh.png

      Filesize

      93KB

      MD5

      d61a243c846531f4fc4b7b7836727d79

      SHA1

      ea474cc015b27411848954c81079945770b3a788

      SHA256

      e310c2534eeee2da2707781fedba50e16473fd4527fd9c7c96ef50912c43e2ea

      SHA512

      046851794024ee055a01c51c19693e07bbc1cf7983c40e084ffe84c7cbe48b3fe92cb86d1da36310d714ae58eb0bd2d24d6fe76cb7e8f3d750b2806597acccdf

    • C:\Users\Public\Documents\t\yh.png

      Filesize

      93KB

      MD5

      7000c805eab8b2dcef78b3fdc4838f38

      SHA1

      b555942b0680c303c7fe9200eb11056f9ee1cede

      SHA256

      03be67f3f3a5d19d834cb7441e823d904893af0397e9eb0bc3b01e5de976f25a

      SHA512

      233757e82399df2f5fc5f21262d21b26c6aeda3485be84b7b92907341d5891cdfe897833b95dcc3f1b03131e99e2bc84a508ffdf7bcf525ed3b3fd89168a0019

    • C:\Users\Public\Documents\t\yh.png

      Filesize

      93KB

      MD5

      028ba62daac2bc62ae678c2a3fa7b88d

      SHA1

      97cdc3f57b10d10c1c986defbbd008880e9ee2b3

      SHA256

      ca0a6f830f8b727785a0a303b242cdc89687be3424f29bf2fa49a95d182f6104

      SHA512

      2094813617caf57e0f6ff7379ce6eb2a752d1150d44bcbf6ce224d4dfa53307fab50adb7a3d4d9cea2fd0cca2d55290e890cf498d9fc95dcf39a480dfa3c78f7

    • C:\WINDOWS\DNomb\Mpec.mbt

      Filesize

      297B

      MD5

      384f8e7beec8670f7f483720422afa46

      SHA1

      90ff02ed84b01a140453a8b09cf1b7ace2acd92a

      SHA256

      cf45dcc35a9c189779cf442196cf98e4ee7a5543c235f3df1cadf427d268f1ee

      SHA512

      c4a3f2de78bb5144e4bf7317877608610d1974a31c7aaeaaf20f12b56b076ee59832e9695e5c1971973671ae257f9fa200e1d86cfd1324d72a21058afb8952df

    • C:\Windows\DNomb\spolsvt.exe

      Filesize

      9KB

      MD5

      523d5c39f9d8d2375c3df68251fa2249

      SHA1

      d4ed365c44bec9246fc1a65a32a7791792647a10

      SHA256

      20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

      SHA512

      526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

    • C:\Windows\DNomb\spolsvt.exe

      Filesize

      9KB

      MD5

      523d5c39f9d8d2375c3df68251fa2249

      SHA1

      d4ed365c44bec9246fc1a65a32a7791792647a10

      SHA256

      20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

      SHA512

      526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

    • C:\Windows\DNomb\spolsvt.exe

      Filesize

      9KB

      MD5

      523d5c39f9d8d2375c3df68251fa2249

      SHA1

      d4ed365c44bec9246fc1a65a32a7791792647a10

      SHA256

      20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

      SHA512

      526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

    • C:\Windows\DNomb\spolsvt.exe

      Filesize

      9KB

      MD5

      523d5c39f9d8d2375c3df68251fa2249

      SHA1

      d4ed365c44bec9246fc1a65a32a7791792647a10

      SHA256

      20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

      SHA512

      526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

    • memory/560-58-0x0000000010000000-0x000000001002A000-memory.dmp

      Filesize

      168KB

    • memory/560-57-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/560-54-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2204-66-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/2204-63-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/2204-70-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/2204-65-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/2204-64-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/2808-82-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2808-78-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4100-96-0x0000000000400000-0x00000000006A2000-memory.dmp

      Filesize

      2.6MB

    • memory/4100-108-0x00000000047C0000-0x00000000047C1000-memory.dmp

      Filesize

      4KB

    • memory/4100-118-0x0000000004830000-0x0000000004831000-memory.dmp

      Filesize

      4KB

    • memory/4100-119-0x0000000000400000-0x00000000006A2000-memory.dmp

      Filesize

      2.6MB

    • memory/4100-117-0x0000000004740000-0x0000000004741000-memory.dmp

      Filesize

      4KB

    • memory/4100-115-0x0000000004880000-0x0000000004881000-memory.dmp

      Filesize

      4KB

    • memory/4100-114-0x0000000004820000-0x0000000004821000-memory.dmp

      Filesize

      4KB

    • memory/4100-113-0x0000000000400000-0x00000000006A2000-memory.dmp

      Filesize

      2.6MB

    • memory/4100-112-0x0000000004840000-0x0000000004841000-memory.dmp

      Filesize

      4KB

    • memory/4100-110-0x0000000004870000-0x0000000004871000-memory.dmp

      Filesize

      4KB

    • memory/4100-111-0x0000000004790000-0x0000000004791000-memory.dmp

      Filesize

      4KB

    • memory/4100-109-0x00000000048F0000-0x00000000048F1000-memory.dmp

      Filesize

      4KB

    • memory/4100-106-0x00000000047A0000-0x00000000047A1000-memory.dmp

      Filesize

      4KB

    • memory/4100-107-0x00000000047D0000-0x00000000047D1000-memory.dmp

      Filesize

      4KB

    • memory/4100-104-0x0000000004760000-0x0000000004761000-memory.dmp

      Filesize

      4KB

    • memory/4100-105-0x0000000004800000-0x0000000004801000-memory.dmp

      Filesize

      4KB

    • memory/4100-103-0x00000000047E0000-0x00000000047E2000-memory.dmp

      Filesize

      8KB

    • memory/4100-101-0x0000000004780000-0x0000000004781000-memory.dmp

      Filesize

      4KB

    • memory/4100-102-0x0000000004770000-0x0000000004771000-memory.dmp

      Filesize

      4KB

    • memory/4100-100-0x00000000047B0000-0x00000000047B1000-memory.dmp

      Filesize

      4KB

    • memory/4100-97-0x0000000077154000-0x0000000077156000-memory.dmp

      Filesize

      8KB

    • memory/4100-98-0x00000000047F0000-0x00000000047F1000-memory.dmp

      Filesize

      4KB

    • memory/4100-99-0x0000000004750000-0x0000000004751000-memory.dmp

      Filesize

      4KB

    • memory/4408-24-0x0000000000400000-0x0000000000445000-memory.dmp

      Filesize

      276KB

    • memory/4408-22-0x0000000000400000-0x0000000000445000-memory.dmp

      Filesize

      276KB

    • memory/4408-25-0x0000000000400000-0x0000000000445000-memory.dmp

      Filesize

      276KB

    • memory/4408-29-0x0000000000400000-0x0000000000445000-memory.dmp

      Filesize

      276KB

    • memory/4408-23-0x0000000000400000-0x0000000000445000-memory.dmp

      Filesize

      276KB

    • memory/4700-95-0x0000000000400000-0x00000000004B2000-memory.dmp

      Filesize

      712KB

    • memory/4700-92-0x0000000000400000-0x00000000004B2000-memory.dmp

      Filesize

      712KB

    • memory/4700-1-0x0000000000400000-0x00000000004B2000-memory.dmp

      Filesize

      712KB

    • memory/4700-0-0x0000000000400000-0x00000000004B2000-memory.dmp

      Filesize

      712KB

    • memory/4744-19-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/4744-14-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/4744-20-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/4744-13-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/4744-12-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/4744-11-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/5044-37-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/5044-43-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/5044-44-0x0000000010000000-0x000000001002A000-memory.dmp

      Filesize

      168KB

    • memory/5044-39-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/5044-38-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB