Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
19-09-2023 00:27
Behavioral task
behavioral1
Sample
71db5b15a28d1b0c6b76ef22f1572187.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
71db5b15a28d1b0c6b76ef22f1572187.exe
Resource
win10v2004-20230915-en
General
-
Target
71db5b15a28d1b0c6b76ef22f1572187.exe
-
Size
105KB
-
MD5
71db5b15a28d1b0c6b76ef22f1572187
-
SHA1
c10adc5a88a5d301ecc4f13b3e6724352bc164b7
-
SHA256
6566329004ceb172a383a4af8b339fd72f34bc9ae275f735fef47af2750cef18
-
SHA512
4d9dfe99d433ccada521189baba38b38650b1005294143f20772615b87c94bfd14bf415e0a3068001ea65ba6d830f95487928aa4f086c91182f9abcb149e6fe0
-
SSDEEP
3072:+SOGkNtcle03EBPavATccthXJi9+YKSVG0Q0z:CftcoP0AQc72ESID
Malware Config
Signatures
-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Fatal Rat payload 4 IoCs
resource yara_rule behavioral1/memory/2088-1-0x0000000010000000-0x000000001002A000-memory.dmp fatalrat behavioral1/memory/2088-7-0x0000000000400000-0x0000000000433000-memory.dmp fatalrat behavioral1/memory/2656-19-0x0000000000400000-0x0000000000433000-memory.dmp fatalrat behavioral1/memory/2656-18-0x0000000010000000-0x000000001002A000-memory.dmp fatalrat -
Executes dropped EXE 1 IoCs
pid Process 2656 71db5b15a28d1b0c6b76ef22f1572187.exe -
Loads dropped DLL 2 IoCs
pid Process 2088 71db5b15a28d1b0c6b76ef22f1572187.exe 2088 71db5b15a28d1b0c6b76ef22f1572187.exe -
resource yara_rule behavioral1/memory/2088-0-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/2088-7-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/files/0x0009000000012020-11.dat upx behavioral1/files/0x0009000000012020-13.dat upx behavioral1/files/0x0009000000012020-17.dat upx behavioral1/files/0x0009000000012020-14.dat upx behavioral1/memory/2656-19-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/files/0x0009000000012020-47.dat upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Windows\CurrentVersion\Run\SVP7 = "C:\\Users\\Admin\\AppData\\Local\\71db5b15a28d1b0c6b76ef22f1572187.exe" 71db5b15a28d1b0c6b76ef22f1572187.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 71db5b15a28d1b0c6b76ef22f1572187.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 71db5b15a28d1b0c6b76ef22f1572187.exe -
Suspicious behavior: EnumeratesProcesses 54 IoCs
pid Process 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 2656 71db5b15a28d1b0c6b76ef22f1572187.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2088 71db5b15a28d1b0c6b76ef22f1572187.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2088 71db5b15a28d1b0c6b76ef22f1572187.exe Token: SeDebugPrivilege 2656 71db5b15a28d1b0c6b76ef22f1572187.exe Token: SeDebugPrivilege 2656 71db5b15a28d1b0c6b76ef22f1572187.exe Token: SeDebugPrivilege 2656 71db5b15a28d1b0c6b76ef22f1572187.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2656 2088 71db5b15a28d1b0c6b76ef22f1572187.exe 28 PID 2088 wrote to memory of 2656 2088 71db5b15a28d1b0c6b76ef22f1572187.exe 28 PID 2088 wrote to memory of 2656 2088 71db5b15a28d1b0c6b76ef22f1572187.exe 28 PID 2088 wrote to memory of 2656 2088 71db5b15a28d1b0c6b76ef22f1572187.exe 28 PID 2656 wrote to memory of 1368 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 29 PID 2656 wrote to memory of 1368 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 29 PID 2656 wrote to memory of 1368 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 29 PID 2656 wrote to memory of 1368 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 29 PID 2656 wrote to memory of 1368 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 29 PID 2656 wrote to memory of 1368 2656 71db5b15a28d1b0c6b76ef22f1572187.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\71db5b15a28d1b0c6b76ef22f1572187.exe"C:\Users\Admin\AppData\Local\Temp\71db5b15a28d1b0c6b76ef22f1572187.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\71db5b15a28d1b0c6b76ef22f1572187.exe"C:\Users\Admin\AppData\Local\71db5b15a28d1b0c6b76ef22f1572187.exe"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵PID:1368
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD571db5b15a28d1b0c6b76ef22f1572187
SHA1c10adc5a88a5d301ecc4f13b3e6724352bc164b7
SHA2566566329004ceb172a383a4af8b339fd72f34bc9ae275f735fef47af2750cef18
SHA5124d9dfe99d433ccada521189baba38b38650b1005294143f20772615b87c94bfd14bf415e0a3068001ea65ba6d830f95487928aa4f086c91182f9abcb149e6fe0
-
Filesize
105KB
MD571db5b15a28d1b0c6b76ef22f1572187
SHA1c10adc5a88a5d301ecc4f13b3e6724352bc164b7
SHA2566566329004ceb172a383a4af8b339fd72f34bc9ae275f735fef47af2750cef18
SHA5124d9dfe99d433ccada521189baba38b38650b1005294143f20772615b87c94bfd14bf415e0a3068001ea65ba6d830f95487928aa4f086c91182f9abcb149e6fe0
-
Filesize
105KB
MD571db5b15a28d1b0c6b76ef22f1572187
SHA1c10adc5a88a5d301ecc4f13b3e6724352bc164b7
SHA2566566329004ceb172a383a4af8b339fd72f34bc9ae275f735fef47af2750cef18
SHA5124d9dfe99d433ccada521189baba38b38650b1005294143f20772615b87c94bfd14bf415e0a3068001ea65ba6d830f95487928aa4f086c91182f9abcb149e6fe0
-
Filesize
105KB
MD571db5b15a28d1b0c6b76ef22f1572187
SHA1c10adc5a88a5d301ecc4f13b3e6724352bc164b7
SHA2566566329004ceb172a383a4af8b339fd72f34bc9ae275f735fef47af2750cef18
SHA5124d9dfe99d433ccada521189baba38b38650b1005294143f20772615b87c94bfd14bf415e0a3068001ea65ba6d830f95487928aa4f086c91182f9abcb149e6fe0
-
Filesize
105KB
MD571db5b15a28d1b0c6b76ef22f1572187
SHA1c10adc5a88a5d301ecc4f13b3e6724352bc164b7
SHA2566566329004ceb172a383a4af8b339fd72f34bc9ae275f735fef47af2750cef18
SHA5124d9dfe99d433ccada521189baba38b38650b1005294143f20772615b87c94bfd14bf415e0a3068001ea65ba6d830f95487928aa4f086c91182f9abcb149e6fe0