Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2023 00:27
Behavioral task
behavioral1
Sample
71db5b15a28d1b0c6b76ef22f1572187.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
71db5b15a28d1b0c6b76ef22f1572187.exe
Resource
win10v2004-20230915-en
General
-
Target
71db5b15a28d1b0c6b76ef22f1572187.exe
-
Size
105KB
-
MD5
71db5b15a28d1b0c6b76ef22f1572187
-
SHA1
c10adc5a88a5d301ecc4f13b3e6724352bc164b7
-
SHA256
6566329004ceb172a383a4af8b339fd72f34bc9ae275f735fef47af2750cef18
-
SHA512
4d9dfe99d433ccada521189baba38b38650b1005294143f20772615b87c94bfd14bf415e0a3068001ea65ba6d830f95487928aa4f086c91182f9abcb149e6fe0
-
SSDEEP
3072:+SOGkNtcle03EBPavATccthXJi9+YKSVG0Q0z:CftcoP0AQc72ESID
Malware Config
Signatures
-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Fatal Rat payload 3 IoCs
resource yara_rule behavioral2/memory/4620-1-0x0000000010000000-0x000000001002A000-memory.dmp fatalrat behavioral2/memory/4620-7-0x0000000000400000-0x0000000000433000-memory.dmp fatalrat behavioral2/memory/3936-32-0x0000000000400000-0x0000000000433000-memory.dmp fatalrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation 71db5b15a28d1b0c6b76ef22f1572187.exe -
Executes dropped EXE 1 IoCs
pid Process 3936 71db5b15a28d1b0c6b76ef22f1572187.exe -
resource yara_rule behavioral2/memory/4620-0-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/4620-7-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/files/0x00080000000231ba-12.dat upx behavioral2/files/0x00080000000231ba-15.dat upx behavioral2/files/0x00080000000231ba-16.dat upx behavioral2/memory/3936-32-0x0000000000400000-0x0000000000433000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SVP7 = "C:\\Users\\Admin\\AppData\\Local\\71db5b15a28d1b0c6b76ef22f1572187.exe" 71db5b15a28d1b0c6b76ef22f1572187.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 71db5b15a28d1b0c6b76ef22f1572187.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 71db5b15a28d1b0c6b76ef22f1572187.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 3936 71db5b15a28d1b0c6b76ef22f1572187.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4620 71db5b15a28d1b0c6b76ef22f1572187.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4620 71db5b15a28d1b0c6b76ef22f1572187.exe Token: SeDebugPrivilege 3936 71db5b15a28d1b0c6b76ef22f1572187.exe Token: SeDebugPrivilege 3936 71db5b15a28d1b0c6b76ef22f1572187.exe Token: SeDebugPrivilege 3936 71db5b15a28d1b0c6b76ef22f1572187.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4620 wrote to memory of 3936 4620 71db5b15a28d1b0c6b76ef22f1572187.exe 92 PID 4620 wrote to memory of 3936 4620 71db5b15a28d1b0c6b76ef22f1572187.exe 92 PID 4620 wrote to memory of 3936 4620 71db5b15a28d1b0c6b76ef22f1572187.exe 92 PID 3936 wrote to memory of 3244 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 93 PID 3936 wrote to memory of 3244 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 93 PID 3936 wrote to memory of 3244 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 93 PID 3936 wrote to memory of 3244 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 93 PID 3936 wrote to memory of 3244 3936 71db5b15a28d1b0c6b76ef22f1572187.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\71db5b15a28d1b0c6b76ef22f1572187.exe"C:\Users\Admin\AppData\Local\Temp\71db5b15a28d1b0c6b76ef22f1572187.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\AppData\Local\71db5b15a28d1b0c6b76ef22f1572187.exe"C:\Users\Admin\AppData\Local\71db5b15a28d1b0c6b76ef22f1572187.exe"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵PID:3244
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD571db5b15a28d1b0c6b76ef22f1572187
SHA1c10adc5a88a5d301ecc4f13b3e6724352bc164b7
SHA2566566329004ceb172a383a4af8b339fd72f34bc9ae275f735fef47af2750cef18
SHA5124d9dfe99d433ccada521189baba38b38650b1005294143f20772615b87c94bfd14bf415e0a3068001ea65ba6d830f95487928aa4f086c91182f9abcb149e6fe0
-
Filesize
105KB
MD571db5b15a28d1b0c6b76ef22f1572187
SHA1c10adc5a88a5d301ecc4f13b3e6724352bc164b7
SHA2566566329004ceb172a383a4af8b339fd72f34bc9ae275f735fef47af2750cef18
SHA5124d9dfe99d433ccada521189baba38b38650b1005294143f20772615b87c94bfd14bf415e0a3068001ea65ba6d830f95487928aa4f086c91182f9abcb149e6fe0
-
Filesize
105KB
MD571db5b15a28d1b0c6b76ef22f1572187
SHA1c10adc5a88a5d301ecc4f13b3e6724352bc164b7
SHA2566566329004ceb172a383a4af8b339fd72f34bc9ae275f735fef47af2750cef18
SHA5124d9dfe99d433ccada521189baba38b38650b1005294143f20772615b87c94bfd14bf415e0a3068001ea65ba6d830f95487928aa4f086c91182f9abcb149e6fe0