Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
26-09-2023 04:42
Static task
static1
Behavioral task
behavioral1
Sample
5726447d808719aaad889259c482641ae4583e8ac7e16de1688c00425f9935b9.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
5726447d808719aaad889259c482641ae4583e8ac7e16de1688c00425f9935b9.exe
Resource
win10v2004-20230915-en
General
-
Target
5726447d808719aaad889259c482641ae4583e8ac7e16de1688c00425f9935b9.exe
-
Size
4.6MB
-
MD5
bf7e11ba2252db0e6be3c31b137b12dc
-
SHA1
2ff198c59fe7be2c807816fa243e9c874f85b388
-
SHA256
5726447d808719aaad889259c482641ae4583e8ac7e16de1688c00425f9935b9
-
SHA512
aa0493ba6ff5ebd4cfede6fa3fcb29cf00721b44acbd4eb5a65ef11a5e3930ea90aa8726790189f7866bbe4ed67ade81154a37a38063966f663d5d81050fc1ad
-
SSDEEP
49152:TbEp2+CVgtJO94vM0iTnDJJZk425V/zaBM3SbawwtlY6sKpETPub0J0lTuRjlH6H:TJnVivMba4aBN3SbAYbKpEq0WMRh
Malware Config
Signatures
-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Fatal Rat payload 20 IoCs
resource yara_rule behavioral1/memory/2276-26-0x0000000002150000-0x0000000002186000-memory.dmp fatalrat behavioral1/memory/2276-35-0x0000000010000000-0x000000001020A000-memory.dmp fatalrat behavioral1/memory/2276-36-0x0000000010000000-0x000000001020A000-memory.dmp fatalrat behavioral1/memory/2276-37-0x0000000010000000-0x000000001020A000-memory.dmp fatalrat behavioral1/memory/2276-38-0x0000000010000000-0x000000001020A000-memory.dmp fatalrat behavioral1/memory/2276-39-0x0000000010000000-0x000000001020A000-memory.dmp fatalrat behavioral1/memory/2276-40-0x0000000010000000-0x000000001020A000-memory.dmp fatalrat behavioral1/memory/2276-41-0x0000000010000000-0x000000001020A000-memory.dmp fatalrat behavioral1/memory/2276-42-0x0000000010000000-0x000000001020A000-memory.dmp fatalrat behavioral1/memory/2276-43-0x0000000010000000-0x000000001020A000-memory.dmp fatalrat behavioral1/memory/2276-44-0x0000000010000000-0x000000001020A000-memory.dmp fatalrat behavioral1/memory/2276-50-0x0000000010000000-0x000000001020A000-memory.dmp fatalrat behavioral1/memory/2880-55-0x0000000000D10000-0x0000000000D46000-memory.dmp fatalrat behavioral1/memory/2880-65-0x0000000010000000-0x000000001020A000-memory.dmp fatalrat behavioral1/memory/2880-66-0x0000000010000000-0x000000001020A000-memory.dmp fatalrat behavioral1/memory/2880-67-0x0000000010000000-0x000000001020A000-memory.dmp fatalrat behavioral1/memory/2880-68-0x0000000010000000-0x000000001020A000-memory.dmp fatalrat behavioral1/memory/2880-69-0x0000000010000000-0x000000001020A000-memory.dmp fatalrat behavioral1/memory/2880-70-0x0000000010000000-0x000000001020A000-memory.dmp fatalrat behavioral1/memory/2880-71-0x0000000010000000-0x000000001020A000-memory.dmp fatalrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Powermonster.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Powermonster.exe -
Executes dropped EXE 2 IoCs
pid Process 2276 Powermonster.exe 2880 Powermonster.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Wine Powermonster.exe Key opened \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Wine Powermonster.exe -
Loads dropped DLL 7 IoCs
pid Process 808 5726447d808719aaad889259c482641ae4583e8ac7e16de1688c00425f9935b9.exe 808 5726447d808719aaad889259c482641ae4583e8ac7e16de1688c00425f9935b9.exe 808 5726447d808719aaad889259c482641ae4583e8ac7e16de1688c00425f9935b9.exe 808 5726447d808719aaad889259c482641ae4583e8ac7e16de1688c00425f9935b9.exe 2276 Powermonster.exe 2276 Powermonster.exe 2880 Powermonster.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Windows\CurrentVersion\Run\yxfile = "C:\\Users\\Admin\\AppData\\Local\\Powermonster.exe" Powermonster.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2276 Powermonster.exe 2880 Powermonster.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Powermonster.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Powermonster.exe -
Suspicious behavior: EnumeratesProcesses 55 IoCs
pid Process 2276 Powermonster.exe 2276 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe 2880 Powermonster.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2276 Powermonster.exe Token: SeDebugPrivilege 2880 Powermonster.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 808 wrote to memory of 2276 808 5726447d808719aaad889259c482641ae4583e8ac7e16de1688c00425f9935b9.exe 28 PID 808 wrote to memory of 2276 808 5726447d808719aaad889259c482641ae4583e8ac7e16de1688c00425f9935b9.exe 28 PID 808 wrote to memory of 2276 808 5726447d808719aaad889259c482641ae4583e8ac7e16de1688c00425f9935b9.exe 28 PID 808 wrote to memory of 2276 808 5726447d808719aaad889259c482641ae4583e8ac7e16de1688c00425f9935b9.exe 28 PID 2276 wrote to memory of 2880 2276 Powermonster.exe 31 PID 2276 wrote to memory of 2880 2276 Powermonster.exe 31 PID 2276 wrote to memory of 2880 2276 Powermonster.exe 31 PID 2276 wrote to memory of 2880 2276 Powermonster.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\5726447d808719aaad889259c482641ae4583e8ac7e16de1688c00425f9935b9.exe"C:\Users\Admin\AppData\Local\Temp\5726447d808719aaad889259c482641ae4583e8ac7e16de1688c00425f9935b9.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Public\Pictures\Powermonster.exe"C:\Users\Public\Pictures\Powermonster.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Powermonster.exe"C:\Users\Admin\AppData\Local\Powermonster.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2880
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5842af33f5702fa99efd8f7b235f28fcc
SHA1b841b71a4e39432f3a940ad841e74ea1686da6c9
SHA25682ab7bbe88c0371e2122e7ad2faa452fdedc4063c2fda36d00c011bdd3948209
SHA512ba78f32b344842b36ec3e5da0ca1cd80f67c18ab0537ea0d8dd970b823be9e1e48bdc0c28d5ec1666d6da22fc6b5682e99b5844ccd513a836d37158ddb0d8a82
-
Filesize
2.5MB
MD5842af33f5702fa99efd8f7b235f28fcc
SHA1b841b71a4e39432f3a940ad841e74ea1686da6c9
SHA25682ab7bbe88c0371e2122e7ad2faa452fdedc4063c2fda36d00c011bdd3948209
SHA512ba78f32b344842b36ec3e5da0ca1cd80f67c18ab0537ea0d8dd970b823be9e1e48bdc0c28d5ec1666d6da22fc6b5682e99b5844ccd513a836d37158ddb0d8a82
-
Filesize
921KB
MD5a004a9f3f3c13edd2b8461037c517426
SHA1fbabddc6146174aaae84178e7cba580dbb4e7725
SHA2568022c162b5766dd747300ccfb8efbf7421be57ff32be214438de3b9e818704b6
SHA5124bb014deea3cf6b20638415255d91cfa03fa944113352d7ebd67d75807d892839c61adbf956d4e47f5777b4b1a327262d6cd870109ad7c8770700735e8e0f598
-
Filesize
2.5MB
MD5842af33f5702fa99efd8f7b235f28fcc
SHA1b841b71a4e39432f3a940ad841e74ea1686da6c9
SHA25682ab7bbe88c0371e2122e7ad2faa452fdedc4063c2fda36d00c011bdd3948209
SHA512ba78f32b344842b36ec3e5da0ca1cd80f67c18ab0537ea0d8dd970b823be9e1e48bdc0c28d5ec1666d6da22fc6b5682e99b5844ccd513a836d37158ddb0d8a82
-
Filesize
2.5MB
MD5842af33f5702fa99efd8f7b235f28fcc
SHA1b841b71a4e39432f3a940ad841e74ea1686da6c9
SHA25682ab7bbe88c0371e2122e7ad2faa452fdedc4063c2fda36d00c011bdd3948209
SHA512ba78f32b344842b36ec3e5da0ca1cd80f67c18ab0537ea0d8dd970b823be9e1e48bdc0c28d5ec1666d6da22fc6b5682e99b5844ccd513a836d37158ddb0d8a82
-
Filesize
2.5MB
MD5842af33f5702fa99efd8f7b235f28fcc
SHA1b841b71a4e39432f3a940ad841e74ea1686da6c9
SHA25682ab7bbe88c0371e2122e7ad2faa452fdedc4063c2fda36d00c011bdd3948209
SHA512ba78f32b344842b36ec3e5da0ca1cd80f67c18ab0537ea0d8dd970b823be9e1e48bdc0c28d5ec1666d6da22fc6b5682e99b5844ccd513a836d37158ddb0d8a82
-
Filesize
921KB
MD5a004a9f3f3c13edd2b8461037c517426
SHA1fbabddc6146174aaae84178e7cba580dbb4e7725
SHA2568022c162b5766dd747300ccfb8efbf7421be57ff32be214438de3b9e818704b6
SHA5124bb014deea3cf6b20638415255d91cfa03fa944113352d7ebd67d75807d892839c61adbf956d4e47f5777b4b1a327262d6cd870109ad7c8770700735e8e0f598
-
Filesize
2.5MB
MD5842af33f5702fa99efd8f7b235f28fcc
SHA1b841b71a4e39432f3a940ad841e74ea1686da6c9
SHA25682ab7bbe88c0371e2122e7ad2faa452fdedc4063c2fda36d00c011bdd3948209
SHA512ba78f32b344842b36ec3e5da0ca1cd80f67c18ab0537ea0d8dd970b823be9e1e48bdc0c28d5ec1666d6da22fc6b5682e99b5844ccd513a836d37158ddb0d8a82
-
Filesize
921KB
MD5a004a9f3f3c13edd2b8461037c517426
SHA1fbabddc6146174aaae84178e7cba580dbb4e7725
SHA2568022c162b5766dd747300ccfb8efbf7421be57ff32be214438de3b9e818704b6
SHA5124bb014deea3cf6b20638415255d91cfa03fa944113352d7ebd67d75807d892839c61adbf956d4e47f5777b4b1a327262d6cd870109ad7c8770700735e8e0f598
-
Filesize
2.5MB
MD5842af33f5702fa99efd8f7b235f28fcc
SHA1b841b71a4e39432f3a940ad841e74ea1686da6c9
SHA25682ab7bbe88c0371e2122e7ad2faa452fdedc4063c2fda36d00c011bdd3948209
SHA512ba78f32b344842b36ec3e5da0ca1cd80f67c18ab0537ea0d8dd970b823be9e1e48bdc0c28d5ec1666d6da22fc6b5682e99b5844ccd513a836d37158ddb0d8a82
-
Filesize
2.5MB
MD5842af33f5702fa99efd8f7b235f28fcc
SHA1b841b71a4e39432f3a940ad841e74ea1686da6c9
SHA25682ab7bbe88c0371e2122e7ad2faa452fdedc4063c2fda36d00c011bdd3948209
SHA512ba78f32b344842b36ec3e5da0ca1cd80f67c18ab0537ea0d8dd970b823be9e1e48bdc0c28d5ec1666d6da22fc6b5682e99b5844ccd513a836d37158ddb0d8a82
-
Filesize
2.5MB
MD5842af33f5702fa99efd8f7b235f28fcc
SHA1b841b71a4e39432f3a940ad841e74ea1686da6c9
SHA25682ab7bbe88c0371e2122e7ad2faa452fdedc4063c2fda36d00c011bdd3948209
SHA512ba78f32b344842b36ec3e5da0ca1cd80f67c18ab0537ea0d8dd970b823be9e1e48bdc0c28d5ec1666d6da22fc6b5682e99b5844ccd513a836d37158ddb0d8a82
-
Filesize
2.5MB
MD5842af33f5702fa99efd8f7b235f28fcc
SHA1b841b71a4e39432f3a940ad841e74ea1686da6c9
SHA25682ab7bbe88c0371e2122e7ad2faa452fdedc4063c2fda36d00c011bdd3948209
SHA512ba78f32b344842b36ec3e5da0ca1cd80f67c18ab0537ea0d8dd970b823be9e1e48bdc0c28d5ec1666d6da22fc6b5682e99b5844ccd513a836d37158ddb0d8a82
-
Filesize
921KB
MD5a004a9f3f3c13edd2b8461037c517426
SHA1fbabddc6146174aaae84178e7cba580dbb4e7725
SHA2568022c162b5766dd747300ccfb8efbf7421be57ff32be214438de3b9e818704b6
SHA5124bb014deea3cf6b20638415255d91cfa03fa944113352d7ebd67d75807d892839c61adbf956d4e47f5777b4b1a327262d6cd870109ad7c8770700735e8e0f598