Analysis

  • max time kernel
    122s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    22-09-2023 16:47

General

  • Target

    c6aac0b9688ba5c0870da940586fc490c162beaa73f43d9fee6d4b4655bcf860.exe

  • Size

    528KB

  • MD5

    becd95aa413ca13ab1d16ca2a2624265

  • SHA1

    b952bed06d54f210d7e4efa38ec41845f4565af5

  • SHA256

    c6aac0b9688ba5c0870da940586fc490c162beaa73f43d9fee6d4b4655bcf860

  • SHA512

    450b7ce0561295aaef07b724c78ad9da80995d7c59323a18d92d4f5a185c581527713787bcee61f169cd78b0977284fece2bb16794c4f3d78d874dd82c22b6c5

  • SSDEEP

    12288:F8vZ88x97XB5snEX2JkFx3qwBSA8wWApEvOPJGdRxbdHo31:FSZ9nbsEUkr3FBIwWApEvOPJGdRxbdHu

Malware Config

Signatures

  • FatalRat

    FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

  • Gh0st RAT payload 2 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Fatal Rat payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 59 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c6aac0b9688ba5c0870da940586fc490c162beaa73f43d9fee6d4b4655bcf860.exe
    "C:\Users\Admin\AppData\Local\Temp\c6aac0b9688ba5c0870da940586fc490c162beaa73f43d9fee6d4b4655bcf860.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2920
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2060
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command -
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3060
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2780
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command -
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1608
    • C:\Users\Admin\AppData\Local\c6aac0b9688ba5c0870da940586fc490c162beaa73f43d9fee6d4b4655bcf860.exe
      "C:\Users\Admin\AppData\Local\c6aac0b9688ba5c0870da940586fc490c162beaa73f43d9fee6d4b4655bcf860.exe"
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:268
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1444
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command -
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1324
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1128
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command -
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3008

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\c6aac0b9688ba5c0870da940586fc490c162beaa73f43d9fee6d4b4655bcf860.exe

    Filesize

    528KB

    MD5

    becd95aa413ca13ab1d16ca2a2624265

    SHA1

    b952bed06d54f210d7e4efa38ec41845f4565af5

    SHA256

    c6aac0b9688ba5c0870da940586fc490c162beaa73f43d9fee6d4b4655bcf860

    SHA512

    450b7ce0561295aaef07b724c78ad9da80995d7c59323a18d92d4f5a185c581527713787bcee61f169cd78b0977284fece2bb16794c4f3d78d874dd82c22b6c5

  • C:\Users\Admin\AppData\Local\c6aac0b9688ba5c0870da940586fc490c162beaa73f43d9fee6d4b4655bcf860.exe

    Filesize

    528KB

    MD5

    becd95aa413ca13ab1d16ca2a2624265

    SHA1

    b952bed06d54f210d7e4efa38ec41845f4565af5

    SHA256

    c6aac0b9688ba5c0870da940586fc490c162beaa73f43d9fee6d4b4655bcf860

    SHA512

    450b7ce0561295aaef07b724c78ad9da80995d7c59323a18d92d4f5a185c581527713787bcee61f169cd78b0977284fece2bb16794c4f3d78d874dd82c22b6c5

  • C:\Users\Admin\AppData\Local\c6aac0b9688ba5c0870da940586fc490c162beaa73f43d9fee6d4b4655bcf860.exe

    Filesize

    528KB

    MD5

    becd95aa413ca13ab1d16ca2a2624265

    SHA1

    b952bed06d54f210d7e4efa38ec41845f4565af5

    SHA256

    c6aac0b9688ba5c0870da940586fc490c162beaa73f43d9fee6d4b4655bcf860

    SHA512

    450b7ce0561295aaef07b724c78ad9da80995d7c59323a18d92d4f5a185c581527713787bcee61f169cd78b0977284fece2bb16794c4f3d78d874dd82c22b6c5

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\EQREIOK0M5T58E4P8SQC.temp

    Filesize

    7KB

    MD5

    2498d9b903599cfb4d1b7e5205581bb5

    SHA1

    048979491d7c2237279c9f661566ac14c6d109cc

    SHA256

    16bce12faf39ebc086a96de45f150f992abb3d9411c96ebe6a2bfb810c0c5321

    SHA512

    bb1f418f28731e29276a900f35f24dabea38f6b2b81540bcff9a0b66920ce82f3e00232ecd7d13616cbde70e4ca7c300fa10dbefc4f45ad8508a9e1c56b4ea3e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    2498d9b903599cfb4d1b7e5205581bb5

    SHA1

    048979491d7c2237279c9f661566ac14c6d109cc

    SHA256

    16bce12faf39ebc086a96de45f150f992abb3d9411c96ebe6a2bfb810c0c5321

    SHA512

    bb1f418f28731e29276a900f35f24dabea38f6b2b81540bcff9a0b66920ce82f3e00232ecd7d13616cbde70e4ca7c300fa10dbefc4f45ad8508a9e1c56b4ea3e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    2498d9b903599cfb4d1b7e5205581bb5

    SHA1

    048979491d7c2237279c9f661566ac14c6d109cc

    SHA256

    16bce12faf39ebc086a96de45f150f992abb3d9411c96ebe6a2bfb810c0c5321

    SHA512

    bb1f418f28731e29276a900f35f24dabea38f6b2b81540bcff9a0b66920ce82f3e00232ecd7d13616cbde70e4ca7c300fa10dbefc4f45ad8508a9e1c56b4ea3e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    2498d9b903599cfb4d1b7e5205581bb5

    SHA1

    048979491d7c2237279c9f661566ac14c6d109cc

    SHA256

    16bce12faf39ebc086a96de45f150f992abb3d9411c96ebe6a2bfb810c0c5321

    SHA512

    bb1f418f28731e29276a900f35f24dabea38f6b2b81540bcff9a0b66920ce82f3e00232ecd7d13616cbde70e4ca7c300fa10dbefc4f45ad8508a9e1c56b4ea3e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    f93d20cae6fc315d91c5d7f7562fc7d2

    SHA1

    c2510ca07ae2ecee31ec2c109776844450529b76

    SHA256

    3ee0ccdc5b071efd7d8adf23615ba3dd187c10da8f2f7624dc31be68aeac261f

    SHA512

    0e8f93fbdf8af5198e23dff8b30e18789e048fe07ddb42876123432388ff72ce7186d136bc5d181c66a61a48e42be165416fe035449e831689134c08d78c385b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    2498d9b903599cfb4d1b7e5205581bb5

    SHA1

    048979491d7c2237279c9f661566ac14c6d109cc

    SHA256

    16bce12faf39ebc086a96de45f150f992abb3d9411c96ebe6a2bfb810c0c5321

    SHA512

    bb1f418f28731e29276a900f35f24dabea38f6b2b81540bcff9a0b66920ce82f3e00232ecd7d13616cbde70e4ca7c300fa10dbefc4f45ad8508a9e1c56b4ea3e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    f93d20cae6fc315d91c5d7f7562fc7d2

    SHA1

    c2510ca07ae2ecee31ec2c109776844450529b76

    SHA256

    3ee0ccdc5b071efd7d8adf23615ba3dd187c10da8f2f7624dc31be68aeac261f

    SHA512

    0e8f93fbdf8af5198e23dff8b30e18789e048fe07ddb42876123432388ff72ce7186d136bc5d181c66a61a48e42be165416fe035449e831689134c08d78c385b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    f93d20cae6fc315d91c5d7f7562fc7d2

    SHA1

    c2510ca07ae2ecee31ec2c109776844450529b76

    SHA256

    3ee0ccdc5b071efd7d8adf23615ba3dd187c10da8f2f7624dc31be68aeac261f

    SHA512

    0e8f93fbdf8af5198e23dff8b30e18789e048fe07ddb42876123432388ff72ce7186d136bc5d181c66a61a48e42be165416fe035449e831689134c08d78c385b

  • C:\Users\Default\Desktop\athletes.exe

    Filesize

    528KB

    MD5

    becd95aa413ca13ab1d16ca2a2624265

    SHA1

    b952bed06d54f210d7e4efa38ec41845f4565af5

    SHA256

    c6aac0b9688ba5c0870da940586fc490c162beaa73f43d9fee6d4b4655bcf860

    SHA512

    450b7ce0561295aaef07b724c78ad9da80995d7c59323a18d92d4f5a185c581527713787bcee61f169cd78b0977284fece2bb16794c4f3d78d874dd82c22b6c5

  • \Users\Admin\AppData\Local\c6aac0b9688ba5c0870da940586fc490c162beaa73f43d9fee6d4b4655bcf860.exe

    Filesize

    528KB

    MD5

    becd95aa413ca13ab1d16ca2a2624265

    SHA1

    b952bed06d54f210d7e4efa38ec41845f4565af5

    SHA256

    c6aac0b9688ba5c0870da940586fc490c162beaa73f43d9fee6d4b4655bcf860

    SHA512

    450b7ce0561295aaef07b724c78ad9da80995d7c59323a18d92d4f5a185c581527713787bcee61f169cd78b0977284fece2bb16794c4f3d78d874dd82c22b6c5

  • memory/268-116-0x0000000000FC0000-0x00000000010C0000-memory.dmp

    Filesize

    1024KB

  • memory/268-118-0x0000000000FC0000-0x00000000010C0000-memory.dmp

    Filesize

    1024KB

  • memory/268-119-0x0000000000FC0000-0x00000000010C0000-memory.dmp

    Filesize

    1024KB

  • memory/268-120-0x0000000010000000-0x0000000010042000-memory.dmp

    Filesize

    264KB

  • memory/268-126-0x0000000000FC0000-0x00000000010C0000-memory.dmp

    Filesize

    1024KB

  • memory/1128-96-0x0000000074160000-0x000000007470B000-memory.dmp

    Filesize

    5.7MB

  • memory/1128-97-0x0000000002680000-0x00000000026C0000-memory.dmp

    Filesize

    256KB

  • memory/1128-104-0x0000000002680000-0x00000000026C0000-memory.dmp

    Filesize

    256KB

  • memory/1128-103-0x0000000002680000-0x00000000026C0000-memory.dmp

    Filesize

    256KB

  • memory/1128-102-0x0000000002680000-0x00000000026C0000-memory.dmp

    Filesize

    256KB

  • memory/1128-101-0x0000000074160000-0x000000007470B000-memory.dmp

    Filesize

    5.7MB

  • memory/1128-100-0x0000000002680000-0x00000000026C0000-memory.dmp

    Filesize

    256KB

  • memory/1128-99-0x0000000002680000-0x00000000026C0000-memory.dmp

    Filesize

    256KB

  • memory/1128-98-0x0000000074160000-0x000000007470B000-memory.dmp

    Filesize

    5.7MB

  • memory/1324-81-0x0000000074160000-0x000000007470B000-memory.dmp

    Filesize

    5.7MB

  • memory/1324-80-0x0000000074160000-0x000000007470B000-memory.dmp

    Filesize

    5.7MB

  • memory/1324-86-0x00000000028A0000-0x00000000028E0000-memory.dmp

    Filesize

    256KB

  • memory/1324-85-0x00000000028A0000-0x00000000028E0000-memory.dmp

    Filesize

    256KB

  • memory/1324-84-0x0000000074160000-0x000000007470B000-memory.dmp

    Filesize

    5.7MB

  • memory/1324-83-0x00000000028A0000-0x00000000028E0000-memory.dmp

    Filesize

    256KB

  • memory/1324-82-0x00000000028A0000-0x00000000028E0000-memory.dmp

    Filesize

    256KB

  • memory/1444-71-0x0000000073D30000-0x00000000742DB000-memory.dmp

    Filesize

    5.7MB

  • memory/1444-70-0x0000000073D30000-0x00000000742DB000-memory.dmp

    Filesize

    5.7MB

  • memory/1444-74-0x0000000002280000-0x00000000022C0000-memory.dmp

    Filesize

    256KB

  • memory/1444-73-0x0000000002280000-0x00000000022C0000-memory.dmp

    Filesize

    256KB

  • memory/1444-72-0x0000000073D30000-0x00000000742DB000-memory.dmp

    Filesize

    5.7MB

  • memory/1608-48-0x0000000002360000-0x00000000023A0000-memory.dmp

    Filesize

    256KB

  • memory/1608-42-0x0000000002360000-0x00000000023A0000-memory.dmp

    Filesize

    256KB

  • memory/1608-45-0x0000000074170000-0x000000007471B000-memory.dmp

    Filesize

    5.7MB

  • memory/1608-41-0x0000000002360000-0x00000000023A0000-memory.dmp

    Filesize

    256KB

  • memory/1608-44-0x0000000074170000-0x000000007471B000-memory.dmp

    Filesize

    5.7MB

  • memory/1608-47-0x0000000002360000-0x00000000023A0000-memory.dmp

    Filesize

    256KB

  • memory/1608-46-0x0000000002360000-0x00000000023A0000-memory.dmp

    Filesize

    256KB

  • memory/1608-43-0x0000000002360000-0x00000000023A0000-memory.dmp

    Filesize

    256KB

  • memory/1608-40-0x0000000074170000-0x000000007471B000-memory.dmp

    Filesize

    5.7MB

  • memory/2060-4-0x00000000024C0000-0x0000000002500000-memory.dmp

    Filesize

    256KB

  • memory/2060-8-0x00000000024C0000-0x0000000002500000-memory.dmp

    Filesize

    256KB

  • memory/2060-2-0x0000000073D60000-0x000000007430B000-memory.dmp

    Filesize

    5.7MB

  • memory/2060-7-0x00000000024C0000-0x0000000002500000-memory.dmp

    Filesize

    256KB

  • memory/2060-3-0x0000000073D60000-0x000000007430B000-memory.dmp

    Filesize

    5.7MB

  • memory/2060-6-0x0000000073D60000-0x000000007430B000-memory.dmp

    Filesize

    5.7MB

  • memory/2060-5-0x00000000024C0000-0x0000000002500000-memory.dmp

    Filesize

    256KB

  • memory/2780-32-0x0000000001BC0000-0x0000000001C00000-memory.dmp

    Filesize

    256KB

  • memory/2780-26-0x0000000074180000-0x000000007472B000-memory.dmp

    Filesize

    5.7MB

  • memory/2780-30-0x0000000074180000-0x000000007472B000-memory.dmp

    Filesize

    5.7MB

  • memory/2780-29-0x0000000001BC0000-0x0000000001C00000-memory.dmp

    Filesize

    256KB

  • memory/2780-28-0x0000000001BC0000-0x0000000001C00000-memory.dmp

    Filesize

    256KB

  • memory/2780-33-0x0000000001BC0000-0x0000000001C00000-memory.dmp

    Filesize

    256KB

  • memory/2780-31-0x0000000074180000-0x000000007472B000-memory.dmp

    Filesize

    5.7MB

  • memory/2780-34-0x0000000001BC0000-0x0000000001C00000-memory.dmp

    Filesize

    256KB

  • memory/2780-27-0x0000000001BC0000-0x0000000001C00000-memory.dmp

    Filesize

    256KB

  • memory/2920-49-0x0000000002500000-0x0000000002600000-memory.dmp

    Filesize

    1024KB

  • memory/2920-50-0x0000000002500000-0x0000000002600000-memory.dmp

    Filesize

    1024KB

  • memory/2920-52-0x0000000010000000-0x0000000010042000-memory.dmp

    Filesize

    264KB

  • memory/2920-51-0x0000000002500000-0x0000000002600000-memory.dmp

    Filesize

    1024KB

  • memory/3008-114-0x0000000074150000-0x00000000746FB000-memory.dmp

    Filesize

    5.7MB

  • memory/3008-112-0x0000000002790000-0x00000000027D0000-memory.dmp

    Filesize

    256KB

  • memory/3008-113-0x0000000074150000-0x00000000746FB000-memory.dmp

    Filesize

    5.7MB

  • memory/3008-115-0x0000000002790000-0x00000000027D0000-memory.dmp

    Filesize

    256KB

  • memory/3008-111-0x0000000074150000-0x00000000746FB000-memory.dmp

    Filesize

    5.7MB

  • memory/3060-15-0x0000000002550000-0x0000000002590000-memory.dmp

    Filesize

    256KB

  • memory/3060-14-0x0000000074160000-0x000000007470B000-memory.dmp

    Filesize

    5.7MB

  • memory/3060-18-0x0000000002550000-0x0000000002590000-memory.dmp

    Filesize

    256KB

  • memory/3060-17-0x0000000074160000-0x000000007470B000-memory.dmp

    Filesize

    5.7MB

  • memory/3060-16-0x0000000074160000-0x000000007470B000-memory.dmp

    Filesize

    5.7MB