Analysis

  • max time kernel
    143s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230831-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-09-2023 22:57

General

  • Target

    99789afb9f3e007fd73e1462974d87dbf97d2121e41577d69b56b45db323f19d.exe

  • Size

    2.6MB

  • MD5

    cd3be3a9c4ce1d2a2656f57642fbd1f5

  • SHA1

    4b26f0a6381049e85cebabf15926a5696ce30974

  • SHA256

    99789afb9f3e007fd73e1462974d87dbf97d2121e41577d69b56b45db323f19d

  • SHA512

    a6ae5e34fbec50fbcf334853860a24e5aa56db897f32310f52bb9edaff6c3e3f179eb893a3cf8708f80a56fd87de8235b0088e2269fe0c0c02bd953e109bb5c6

  • SSDEEP

    49152:lCcxwDfvkKPaYvzqlIxZJ58TDPu2mXMotPmBKE++xVHw1WUdlEr:lCVDfvkKPaYvAEp8TDPu2mXMotezd3w6

Malware Config

Signatures

  • FatalRat

    FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

  • Fatal Rat payload 2 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\99789afb9f3e007fd73e1462974d87dbf97d2121e41577d69b56b45db323f19d.exe
    "C:\Users\Admin\AppData\Local\Temp\99789afb9f3e007fd73e1462974d87dbf97d2121e41577d69b56b45db323f19d.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:3180
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
    1⤵
      PID:4032
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k UnistackSvcGroup
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1064

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Comms\UnistoreDB\store.jfm

      Filesize

      16KB

      MD5

      99c370ffd954eee6519a11022d601973

      SHA1

      91d48d0f81219f118e6869441b0aadabd543245c

      SHA256

      a8db430d6f56b40c3e5f37c01bca4ae6c1ab68af0165f8d5c727eab7a81c0142

      SHA512

      6d94aa0f54b0b8b128b8eb7c0483d49fa3c86f278e3efac36e3888dcfcf3221904bba7052c732b52b55db62dcbf421fa5e6824e5de16b10e16037564eb85cf8b

    • memory/1064-49-0x0000024377740000-0x0000024377741000-memory.dmp

      Filesize

      4KB

    • memory/1064-75-0x00000243774A0000-0x00000243774A1000-memory.dmp

      Filesize

      4KB

    • memory/1064-25-0x000002436F140000-0x000002436F150000-memory.dmp

      Filesize

      64KB

    • memory/1064-41-0x0000024377710000-0x0000024377711000-memory.dmp

      Filesize

      4KB

    • memory/1064-42-0x0000024377740000-0x0000024377741000-memory.dmp

      Filesize

      4KB

    • memory/1064-43-0x0000024377740000-0x0000024377741000-memory.dmp

      Filesize

      4KB

    • memory/1064-44-0x0000024377740000-0x0000024377741000-memory.dmp

      Filesize

      4KB

    • memory/1064-45-0x0000024377740000-0x0000024377741000-memory.dmp

      Filesize

      4KB

    • memory/1064-46-0x0000024377740000-0x0000024377741000-memory.dmp

      Filesize

      4KB

    • memory/1064-47-0x0000024377740000-0x0000024377741000-memory.dmp

      Filesize

      4KB

    • memory/1064-77-0x00000243775B0000-0x00000243775B1000-memory.dmp

      Filesize

      4KB

    • memory/1064-9-0x000002436F040000-0x000002436F050000-memory.dmp

      Filesize

      64KB

    • memory/1064-52-0x0000024377360000-0x0000024377361000-memory.dmp

      Filesize

      4KB

    • memory/1064-51-0x0000024377740000-0x0000024377741000-memory.dmp

      Filesize

      4KB

    • memory/1064-50-0x0000024377740000-0x0000024377741000-memory.dmp

      Filesize

      4KB

    • memory/1064-53-0x0000024377350000-0x0000024377351000-memory.dmp

      Filesize

      4KB

    • memory/1064-55-0x0000024377360000-0x0000024377361000-memory.dmp

      Filesize

      4KB

    • memory/1064-58-0x0000024377350000-0x0000024377351000-memory.dmp

      Filesize

      4KB

    • memory/1064-61-0x0000024377290000-0x0000024377291000-memory.dmp

      Filesize

      4KB

    • memory/1064-48-0x0000024377740000-0x0000024377741000-memory.dmp

      Filesize

      4KB

    • memory/1064-73-0x0000024377490000-0x0000024377491000-memory.dmp

      Filesize

      4KB

    • memory/1064-76-0x00000243774A0000-0x00000243774A1000-memory.dmp

      Filesize

      4KB

    • memory/3180-4-0x0000000003A90000-0x0000000003AAF000-memory.dmp

      Filesize

      124KB

    • memory/3180-5-0x0000000010000000-0x0000000010020000-memory.dmp

      Filesize

      128KB