Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
24-09-2023 02:01
Static task
static1
Behavioral task
behavioral1
Sample
47b4387dccee5ac46b429a7f0561186d863c427e608a34f7a14ffcb26998d631.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
47b4387dccee5ac46b429a7f0561186d863c427e608a34f7a14ffcb26998d631.exe
Resource
win10v2004-20230915-en
General
-
Target
47b4387dccee5ac46b429a7f0561186d863c427e608a34f7a14ffcb26998d631.exe
-
Size
2.1MB
-
MD5
5fcbabd5a95705ff761a2b41b5971e67
-
SHA1
1ab7f5a42be348c9d3bc96f5d6805e70ac9888c0
-
SHA256
47b4387dccee5ac46b429a7f0561186d863c427e608a34f7a14ffcb26998d631
-
SHA512
23ec990521e8b4ceea5306735c309dd7d88663990883fcf364c0870aca110c62e594a36ed9cd8fcaf9da9006f99e190ee04ae2185c6a64638e3e93d657c2b708
-
SSDEEP
49152:JbEpdIgOGOaSOFl4KK5+pq1UvM0iTnDJJZk425V/zaBM3Sbawwtl/:JsjOTOI5U4UvMba4aBN3SbA/
Malware Config
Signatures
-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Fatal Rat payload 20 IoCs
resource yara_rule behavioral1/memory/1656-26-0x00000000008A0000-0x00000000008D6000-memory.dmp fatalrat behavioral1/memory/1656-35-0x0000000010000000-0x0000000010202000-memory.dmp fatalrat behavioral1/memory/1656-36-0x0000000010000000-0x0000000010202000-memory.dmp fatalrat behavioral1/memory/1656-37-0x0000000010000000-0x0000000010202000-memory.dmp fatalrat behavioral1/memory/1656-38-0x0000000010000000-0x0000000010202000-memory.dmp fatalrat behavioral1/memory/1656-39-0x0000000010000000-0x0000000010202000-memory.dmp fatalrat behavioral1/memory/1656-40-0x0000000010000000-0x0000000010202000-memory.dmp fatalrat behavioral1/memory/1656-41-0x0000000010000000-0x0000000010202000-memory.dmp fatalrat behavioral1/memory/1656-42-0x0000000010000000-0x0000000010202000-memory.dmp fatalrat behavioral1/memory/1656-43-0x0000000010000000-0x0000000010202000-memory.dmp fatalrat behavioral1/memory/1656-44-0x0000000010000000-0x0000000010202000-memory.dmp fatalrat behavioral1/memory/1656-50-0x0000000010000000-0x0000000010202000-memory.dmp fatalrat behavioral1/memory/2856-54-0x0000000000830000-0x0000000000866000-memory.dmp fatalrat behavioral1/memory/2856-65-0x0000000010000000-0x0000000010202000-memory.dmp fatalrat behavioral1/memory/2856-66-0x0000000010000000-0x0000000010202000-memory.dmp fatalrat behavioral1/memory/2856-67-0x0000000010000000-0x0000000010202000-memory.dmp fatalrat behavioral1/memory/2856-68-0x0000000010000000-0x0000000010202000-memory.dmp fatalrat behavioral1/memory/2856-69-0x0000000010000000-0x0000000010202000-memory.dmp fatalrat behavioral1/memory/2856-70-0x0000000010000000-0x0000000010202000-memory.dmp fatalrat behavioral1/memory/2856-71-0x0000000010000000-0x0000000010202000-memory.dmp fatalrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Powermonster.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Powermonster.exe -
Executes dropped EXE 2 IoCs
pid Process 1656 Powermonster.exe 2856 Powermonster.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Wine Powermonster.exe Key opened \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Wine Powermonster.exe -
Loads dropped DLL 7 IoCs
pid Process 880 47b4387dccee5ac46b429a7f0561186d863c427e608a34f7a14ffcb26998d631.exe 880 47b4387dccee5ac46b429a7f0561186d863c427e608a34f7a14ffcb26998d631.exe 880 47b4387dccee5ac46b429a7f0561186d863c427e608a34f7a14ffcb26998d631.exe 880 47b4387dccee5ac46b429a7f0561186d863c427e608a34f7a14ffcb26998d631.exe 1656 Powermonster.exe 1656 Powermonster.exe 2856 Powermonster.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Windows\CurrentVersion\Run\yxfile = "C:\\Users\\Admin\\AppData\\Local\\Powermonster.exe" Powermonster.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1656 Powermonster.exe 2856 Powermonster.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Powermonster.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Powermonster.exe -
Suspicious behavior: EnumeratesProcesses 53 IoCs
pid Process 1656 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe 2856 Powermonster.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1656 Powermonster.exe Token: SeDebugPrivilege 2856 Powermonster.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 880 wrote to memory of 1656 880 47b4387dccee5ac46b429a7f0561186d863c427e608a34f7a14ffcb26998d631.exe 28 PID 880 wrote to memory of 1656 880 47b4387dccee5ac46b429a7f0561186d863c427e608a34f7a14ffcb26998d631.exe 28 PID 880 wrote to memory of 1656 880 47b4387dccee5ac46b429a7f0561186d863c427e608a34f7a14ffcb26998d631.exe 28 PID 880 wrote to memory of 1656 880 47b4387dccee5ac46b429a7f0561186d863c427e608a34f7a14ffcb26998d631.exe 28 PID 1656 wrote to memory of 2856 1656 Powermonster.exe 31 PID 1656 wrote to memory of 2856 1656 Powermonster.exe 31 PID 1656 wrote to memory of 2856 1656 Powermonster.exe 31 PID 1656 wrote to memory of 2856 1656 Powermonster.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\47b4387dccee5ac46b429a7f0561186d863c427e608a34f7a14ffcb26998d631.exe"C:\Users\Admin\AppData\Local\Temp\47b4387dccee5ac46b429a7f0561186d863c427e608a34f7a14ffcb26998d631.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Users\Public\Pictures\Powermonster.exe"C:\Users\Public\Pictures\Powermonster.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Powermonster.exe"C:\Users\Admin\AppData\Local\Powermonster.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2856
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5842af33f5702fa99efd8f7b235f28fcc
SHA1b841b71a4e39432f3a940ad841e74ea1686da6c9
SHA25682ab7bbe88c0371e2122e7ad2faa452fdedc4063c2fda36d00c011bdd3948209
SHA512ba78f32b344842b36ec3e5da0ca1cd80f67c18ab0537ea0d8dd970b823be9e1e48bdc0c28d5ec1666d6da22fc6b5682e99b5844ccd513a836d37158ddb0d8a82
-
Filesize
2.5MB
MD5842af33f5702fa99efd8f7b235f28fcc
SHA1b841b71a4e39432f3a940ad841e74ea1686da6c9
SHA25682ab7bbe88c0371e2122e7ad2faa452fdedc4063c2fda36d00c011bdd3948209
SHA512ba78f32b344842b36ec3e5da0ca1cd80f67c18ab0537ea0d8dd970b823be9e1e48bdc0c28d5ec1666d6da22fc6b5682e99b5844ccd513a836d37158ddb0d8a82
-
Filesize
898KB
MD5ed68b13846fa29395ac2957be995824d
SHA10ba78675aee81f5da503a23a1e7dfcd225771392
SHA256b743061735e66db8e38c7af2f53580df5901c611f215b63223eac213d467e1e1
SHA512d4384e6396adb18699c073c7090bd1948bb4c9d45437313c7607b9676182299edd74dba91486d806c413dec4c9f0a83441a460b47fc17190bd9e0c3040ffc3d8
-
Filesize
2.5MB
MD5842af33f5702fa99efd8f7b235f28fcc
SHA1b841b71a4e39432f3a940ad841e74ea1686da6c9
SHA25682ab7bbe88c0371e2122e7ad2faa452fdedc4063c2fda36d00c011bdd3948209
SHA512ba78f32b344842b36ec3e5da0ca1cd80f67c18ab0537ea0d8dd970b823be9e1e48bdc0c28d5ec1666d6da22fc6b5682e99b5844ccd513a836d37158ddb0d8a82
-
Filesize
2.5MB
MD5842af33f5702fa99efd8f7b235f28fcc
SHA1b841b71a4e39432f3a940ad841e74ea1686da6c9
SHA25682ab7bbe88c0371e2122e7ad2faa452fdedc4063c2fda36d00c011bdd3948209
SHA512ba78f32b344842b36ec3e5da0ca1cd80f67c18ab0537ea0d8dd970b823be9e1e48bdc0c28d5ec1666d6da22fc6b5682e99b5844ccd513a836d37158ddb0d8a82
-
Filesize
2.5MB
MD5842af33f5702fa99efd8f7b235f28fcc
SHA1b841b71a4e39432f3a940ad841e74ea1686da6c9
SHA25682ab7bbe88c0371e2122e7ad2faa452fdedc4063c2fda36d00c011bdd3948209
SHA512ba78f32b344842b36ec3e5da0ca1cd80f67c18ab0537ea0d8dd970b823be9e1e48bdc0c28d5ec1666d6da22fc6b5682e99b5844ccd513a836d37158ddb0d8a82
-
Filesize
898KB
MD5ed68b13846fa29395ac2957be995824d
SHA10ba78675aee81f5da503a23a1e7dfcd225771392
SHA256b743061735e66db8e38c7af2f53580df5901c611f215b63223eac213d467e1e1
SHA512d4384e6396adb18699c073c7090bd1948bb4c9d45437313c7607b9676182299edd74dba91486d806c413dec4c9f0a83441a460b47fc17190bd9e0c3040ffc3d8
-
Filesize
2.5MB
MD5842af33f5702fa99efd8f7b235f28fcc
SHA1b841b71a4e39432f3a940ad841e74ea1686da6c9
SHA25682ab7bbe88c0371e2122e7ad2faa452fdedc4063c2fda36d00c011bdd3948209
SHA512ba78f32b344842b36ec3e5da0ca1cd80f67c18ab0537ea0d8dd970b823be9e1e48bdc0c28d5ec1666d6da22fc6b5682e99b5844ccd513a836d37158ddb0d8a82
-
Filesize
898KB
MD5ed68b13846fa29395ac2957be995824d
SHA10ba78675aee81f5da503a23a1e7dfcd225771392
SHA256b743061735e66db8e38c7af2f53580df5901c611f215b63223eac213d467e1e1
SHA512d4384e6396adb18699c073c7090bd1948bb4c9d45437313c7607b9676182299edd74dba91486d806c413dec4c9f0a83441a460b47fc17190bd9e0c3040ffc3d8
-
Filesize
2.5MB
MD5842af33f5702fa99efd8f7b235f28fcc
SHA1b841b71a4e39432f3a940ad841e74ea1686da6c9
SHA25682ab7bbe88c0371e2122e7ad2faa452fdedc4063c2fda36d00c011bdd3948209
SHA512ba78f32b344842b36ec3e5da0ca1cd80f67c18ab0537ea0d8dd970b823be9e1e48bdc0c28d5ec1666d6da22fc6b5682e99b5844ccd513a836d37158ddb0d8a82
-
Filesize
2.5MB
MD5842af33f5702fa99efd8f7b235f28fcc
SHA1b841b71a4e39432f3a940ad841e74ea1686da6c9
SHA25682ab7bbe88c0371e2122e7ad2faa452fdedc4063c2fda36d00c011bdd3948209
SHA512ba78f32b344842b36ec3e5da0ca1cd80f67c18ab0537ea0d8dd970b823be9e1e48bdc0c28d5ec1666d6da22fc6b5682e99b5844ccd513a836d37158ddb0d8a82
-
Filesize
2.5MB
MD5842af33f5702fa99efd8f7b235f28fcc
SHA1b841b71a4e39432f3a940ad841e74ea1686da6c9
SHA25682ab7bbe88c0371e2122e7ad2faa452fdedc4063c2fda36d00c011bdd3948209
SHA512ba78f32b344842b36ec3e5da0ca1cd80f67c18ab0537ea0d8dd970b823be9e1e48bdc0c28d5ec1666d6da22fc6b5682e99b5844ccd513a836d37158ddb0d8a82
-
Filesize
2.5MB
MD5842af33f5702fa99efd8f7b235f28fcc
SHA1b841b71a4e39432f3a940ad841e74ea1686da6c9
SHA25682ab7bbe88c0371e2122e7ad2faa452fdedc4063c2fda36d00c011bdd3948209
SHA512ba78f32b344842b36ec3e5da0ca1cd80f67c18ab0537ea0d8dd970b823be9e1e48bdc0c28d5ec1666d6da22fc6b5682e99b5844ccd513a836d37158ddb0d8a82
-
Filesize
898KB
MD5ed68b13846fa29395ac2957be995824d
SHA10ba78675aee81f5da503a23a1e7dfcd225771392
SHA256b743061735e66db8e38c7af2f53580df5901c611f215b63223eac213d467e1e1
SHA512d4384e6396adb18699c073c7090bd1948bb4c9d45437313c7607b9676182299edd74dba91486d806c413dec4c9f0a83441a460b47fc17190bd9e0c3040ffc3d8