Analysis

  • max time kernel
    120s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-09-2023 11:36

General

  • Target

    b2b8edb831047a486ad58488be7497f74c262ced7a35e0b1b2e063495bffd6c4.exe

  • Size

    93KB

  • MD5

    074a292b0a1405cf35e5a9d6067f15ca

  • SHA1

    5bcc1e4784d67b3ba0dd7147514cd883b246a80a

  • SHA256

    b2b8edb831047a486ad58488be7497f74c262ced7a35e0b1b2e063495bffd6c4

  • SHA512

    b6ebc5b826e44b5e9c75d167ddefe98cd1aac3d2ea1dc3a96efceba3179f6a49b76239e6aa8504524d3ce02244a96d5f24642b267119fa11d919bd7b5283868f

  • SSDEEP

    1536:1NeXBiSPip4rS8m+mRiSG8rnv2LAczc9Cv6RHSXZnsW/cd5UpmgCQ9pdeFi:1JSzrS8IG8rnv2LAczclIXm5UYgC6veg

Malware Config

Signatures

  • FatalRat

    FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

  • Fatal Rat payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 51 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b2b8edb831047a486ad58488be7497f74c262ced7a35e0b1b2e063495bffd6c4.exe
    "C:\Users\Admin\AppData\Local\Temp\b2b8edb831047a486ad58488be7497f74c262ced7a35e0b1b2e063495bffd6c4.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3040
    • C:\Users\Admin\AppData\Local\b2b8edb831047a486ad58488be7497f74c262ced7a35e0b1b2e063495bffd6c4.exe
      "C:\Users\Admin\AppData\Local\b2b8edb831047a486ad58488be7497f74c262ced7a35e0b1b2e063495bffd6c4.exe"
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\088D78689371D39E2B183BEA37F7313E

    Filesize

    503B

    MD5

    f0a84e34684536aa28353865eeb1b8eb

    SHA1

    1537e73198ddec46589eff66494481468b4bb8a6

    SHA256

    9c91595df518bba03ad5ab78f794b234d53b5affb088023aad76812375bf9b01

    SHA512

    f14cc3d2c6bf382cabce521a42947ec4fbe600a1a7e718c553a94a9e0381d5eceeb78400a31efc0626ea62935da5aaee132b991ca78e69af9ba2a989a3cf9df1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

    Filesize

    717B

    MD5

    60fe01df86be2e5331b0cdbe86165686

    SHA1

    2a79f9713c3f192862ff80508062e64e8e0b29bd

    SHA256

    c08ccbc876cd5a7cdfa9670f9637da57f6a1282198a9bc71fc7d7247a6e5b7a8

    SHA512

    ef9f9a4dedcbfe339f4f3d07fb614645596c6f2b15608bdccdad492578b735f7cb075bdaa07178c764582ee345857ec4665f90342694e6a60786bb3d9b3a3d23

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\088D78689371D39E2B183BEA37F7313E

    Filesize

    552B

    MD5

    835eda08ed9fa72e5aaf35f2560e8b1f

    SHA1

    92938db96156cf6ecb7f0ca396df4cc2f16cbe86

    SHA256

    e184b2757f5be3cb61c9e8f01549e789ab6cfbbe16ca59b3136e28f85d95ab9c

    SHA512

    78e62f6335705af9263bea463e7990f4bc4832961e23c7e43a3344d96f3d07b6b5e66e93c19617a29b3d64a0800cc51b7330d95ae6bf388e74ff637432b9348c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

    Filesize

    192B

    MD5

    7f7b6e627c420dc066f923153f3aebc9

    SHA1

    494db108f11a8a964da9cb13c5e3e163626941fd

    SHA256

    86b3a07564492e56b6076e6eec95a7a146a660709025d10009291be6bde7f6f9

    SHA512

    6c7aa8a6642a414bd52b5b9b9d4feafa37b736b4d44057f9649c3084530a01f7b946067f7bb7c7f9b82e41ca90e574e87f14b3f7b431bd9d889eca97f211297d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5977aee56cdf54943366ff1fe5a169dd

    SHA1

    e3a891859c771752c5b4e2d350f13ee60570b391

    SHA256

    3e4d7036b66d7a4f9dca645ed0675e799fbab7f647c23f3041d6cbbf7e911152

    SHA512

    e9a6e615385ee59d33d95ca5d502a9757e6c906770f4689e3b57a63ceda5d27722cf8aabea992dfd58884a011fc5202c1ec69a2349de58bb086c8c73de923352

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    842fae2dcafd878cebe3a7aed378c30f

    SHA1

    2d39e09f01c9007f02854b9fca293b4b70970d66

    SHA256

    7026d4e6f8b30a4821c1f9cd2c48a04e5c61136b9659e296a9d9293f49a5d053

    SHA512

    ad46716d2a949eeedb1a8a1dad0ed853c7622f20b072f7538b3a87842c315252f59225b12d1d64614dc78bf001a128ec4d94c310b77c72320082a880d4ecec66

  • C:\Users\Admin\AppData\Local\Temp\Cab3D60.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar3ECA.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • C:\Users\Admin\AppData\Local\b2b8edb831047a486ad58488be7497f74c262ced7a35e0b1b2e063495bffd6c4.exe

    Filesize

    93KB

    MD5

    074a292b0a1405cf35e5a9d6067f15ca

    SHA1

    5bcc1e4784d67b3ba0dd7147514cd883b246a80a

    SHA256

    b2b8edb831047a486ad58488be7497f74c262ced7a35e0b1b2e063495bffd6c4

    SHA512

    b6ebc5b826e44b5e9c75d167ddefe98cd1aac3d2ea1dc3a96efceba3179f6a49b76239e6aa8504524d3ce02244a96d5f24642b267119fa11d919bd7b5283868f

  • C:\Users\Admin\AppData\Local\b2b8edb831047a486ad58488be7497f74c262ced7a35e0b1b2e063495bffd6c4.exe

    Filesize

    93KB

    MD5

    074a292b0a1405cf35e5a9d6067f15ca

    SHA1

    5bcc1e4784d67b3ba0dd7147514cd883b246a80a

    SHA256

    b2b8edb831047a486ad58488be7497f74c262ced7a35e0b1b2e063495bffd6c4

    SHA512

    b6ebc5b826e44b5e9c75d167ddefe98cd1aac3d2ea1dc3a96efceba3179f6a49b76239e6aa8504524d3ce02244a96d5f24642b267119fa11d919bd7b5283868f

  • C:\Users\Admin\AppData\Local\b2b8edb831047a486ad58488be7497f74c262ced7a35e0b1b2e063495bffd6c4.exe

    Filesize

    93KB

    MD5

    074a292b0a1405cf35e5a9d6067f15ca

    SHA1

    5bcc1e4784d67b3ba0dd7147514cd883b246a80a

    SHA256

    b2b8edb831047a486ad58488be7497f74c262ced7a35e0b1b2e063495bffd6c4

    SHA512

    b6ebc5b826e44b5e9c75d167ddefe98cd1aac3d2ea1dc3a96efceba3179f6a49b76239e6aa8504524d3ce02244a96d5f24642b267119fa11d919bd7b5283868f

  • \Users\Admin\AppData\Local\b2b8edb831047a486ad58488be7497f74c262ced7a35e0b1b2e063495bffd6c4.exe

    Filesize

    93KB

    MD5

    074a292b0a1405cf35e5a9d6067f15ca

    SHA1

    5bcc1e4784d67b3ba0dd7147514cd883b246a80a

    SHA256

    b2b8edb831047a486ad58488be7497f74c262ced7a35e0b1b2e063495bffd6c4

    SHA512

    b6ebc5b826e44b5e9c75d167ddefe98cd1aac3d2ea1dc3a96efceba3179f6a49b76239e6aa8504524d3ce02244a96d5f24642b267119fa11d919bd7b5283868f

  • memory/2876-135-0x0000000000550000-0x000000000057A000-memory.dmp

    Filesize

    168KB

  • memory/3040-85-0x0000000000700000-0x000000000072A000-memory.dmp

    Filesize

    168KB

  • memory/3040-80-0x0000000010000000-0x0000000010031000-memory.dmp

    Filesize

    196KB

  • memory/3040-81-0x00000000006C0000-0x00000000006F2000-memory.dmp

    Filesize

    200KB