Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2023 22:33
Behavioral task
behavioral1
Sample
b280f57cc64f24e3feefaecc3746058d393c4d16ca9ab3cdfac1ebfdb3111136.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
b280f57cc64f24e3feefaecc3746058d393c4d16ca9ab3cdfac1ebfdb3111136.exe
Resource
win10v2004-20230915-en
General
-
Target
b280f57cc64f24e3feefaecc3746058d393c4d16ca9ab3cdfac1ebfdb3111136.exe
-
Size
376KB
-
MD5
b8f957e23aa6a2e9bbd44d26618ff1fd
-
SHA1
4cc450bbba0caa9a78e880446500354d1ce7bb01
-
SHA256
b280f57cc64f24e3feefaecc3746058d393c4d16ca9ab3cdfac1ebfdb3111136
-
SHA512
6572d396affa2a3440cf5bb4967368fce743493871a174b3d7be4db48fd0181d61009748b01021be01132d622f245fe08ff0269465675277e4e23c313c1115d7
-
SSDEEP
6144:AORLKn/ocYlNMeBasmrfc2RrYZWC9sQNwhstAOWf4rE0G/saJ:A6+ANlNMeMx0MrG9fGwAOWf4rt8X
Malware Config
Signatures
-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Fatal Rat payload 5 IoCs
resource yara_rule behavioral2/memory/4316-1-0x0000000010000000-0x000000001002A000-memory.dmp fatalrat behavioral2/memory/4064-9-0x0000000010000000-0x000000001002A000-memory.dmp fatalrat behavioral2/memory/4316-21-0x0000000000400000-0x0000000000517000-memory.dmp fatalrat behavioral2/memory/4064-22-0x0000000000400000-0x0000000000517000-memory.dmp fatalrat behavioral2/memory/816-24-0x0000000000400000-0x0000000000517000-memory.dmp fatalrat -
Executes dropped EXE 2 IoCs
pid Process 4064 Svwxya.exe 816 Svwxya.exe -
resource yara_rule behavioral2/memory/4316-0-0x0000000000400000-0x0000000000517000-memory.dmp upx behavioral2/files/0x000900000002318c-7.dat upx behavioral2/files/0x000900000002318c-8.dat upx behavioral2/memory/4064-10-0x0000000000400000-0x0000000000517000-memory.dmp upx behavioral2/files/0x000900000002318c-15.dat upx behavioral2/memory/4316-21-0x0000000000400000-0x0000000000517000-memory.dmp upx behavioral2/memory/4064-22-0x0000000000400000-0x0000000000517000-memory.dmp upx behavioral2/memory/816-24-0x0000000000400000-0x0000000000517000-memory.dmp upx -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Svwxya.exe b280f57cc64f24e3feefaecc3746058d393c4d16ca9ab3cdfac1ebfdb3111136.exe File opened for modification C:\Program Files (x86)\Svwxya.exe Svwxya.exe File created C:\Program Files (x86)\Svwxya.exe Svwxya.exe File created C:\Program Files (x86)\Svwxya.exe b280f57cc64f24e3feefaecc3746058d393c4d16ca9ab3cdfac1ebfdb3111136.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Svwxya.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Svwxya.exe -
Modifies data under HKEY_USERS 12 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet Svwxya.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Services Svwxya.exe Set value (str) \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Services\Stuvwx Abcdefgh\InstallTime = "2023-09-15 22:33" Svwxya.exe Key created \REGISTRY\USER\.DEFAULT\Software Svwxya.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft Svwxya.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Services\Stuvwx Abcdefgh Svwxya.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM Svwxya.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Services\Stuvwx Abcdefgh Svwxya.exe Set value (str) \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Services\Stuvwx Abcdefgh\Group = "Fatal" Svwxya.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum Svwxya.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie Svwxya.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum\Version = "7" Svwxya.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe 816 Svwxya.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4316 b280f57cc64f24e3feefaecc3746058d393c4d16ca9ab3cdfac1ebfdb3111136.exe Token: SeDebugPrivilege 4064 Svwxya.exe Token: SeDebugPrivilege 816 Svwxya.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4064 wrote to memory of 816 4064 Svwxya.exe 84 PID 4064 wrote to memory of 816 4064 Svwxya.exe 84 PID 4064 wrote to memory of 816 4064 Svwxya.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\b280f57cc64f24e3feefaecc3746058d393c4d16ca9ab3cdfac1ebfdb3111136.exe"C:\Users\Admin\AppData\Local\Temp\b280f57cc64f24e3feefaecc3746058d393c4d16ca9ab3cdfac1ebfdb3111136.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:4316
-
C:\Program Files (x86)\Svwxya.exe"C:\Program Files (x86)\Svwxya.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Program Files (x86)\Svwxya.exe"C:\Program Files (x86)\Svwxya.exe" Win72⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
376KB
MD5b8f957e23aa6a2e9bbd44d26618ff1fd
SHA14cc450bbba0caa9a78e880446500354d1ce7bb01
SHA256b280f57cc64f24e3feefaecc3746058d393c4d16ca9ab3cdfac1ebfdb3111136
SHA5126572d396affa2a3440cf5bb4967368fce743493871a174b3d7be4db48fd0181d61009748b01021be01132d622f245fe08ff0269465675277e4e23c313c1115d7
-
Filesize
376KB
MD5b8f957e23aa6a2e9bbd44d26618ff1fd
SHA14cc450bbba0caa9a78e880446500354d1ce7bb01
SHA256b280f57cc64f24e3feefaecc3746058d393c4d16ca9ab3cdfac1ebfdb3111136
SHA5126572d396affa2a3440cf5bb4967368fce743493871a174b3d7be4db48fd0181d61009748b01021be01132d622f245fe08ff0269465675277e4e23c313c1115d7
-
Filesize
376KB
MD5b8f957e23aa6a2e9bbd44d26618ff1fd
SHA14cc450bbba0caa9a78e880446500354d1ce7bb01
SHA256b280f57cc64f24e3feefaecc3746058d393c4d16ca9ab3cdfac1ebfdb3111136
SHA5126572d396affa2a3440cf5bb4967368fce743493871a174b3d7be4db48fd0181d61009748b01021be01132d622f245fe08ff0269465675277e4e23c313c1115d7