Analysis

  • max time kernel
    143s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    26-09-2023 16:35

General

  • Target

    3c5d9efe6b934da50258500f6e4b4b36fda16c6ace49f1b00925549ea9b14e68.exe

  • Size

    206KB

  • MD5

    5617586de7d9fcaed18cc5f76c550525

  • SHA1

    a7fd1ce9e7cb900f26d1cc602fe5249b558acd16

  • SHA256

    3c5d9efe6b934da50258500f6e4b4b36fda16c6ace49f1b00925549ea9b14e68

  • SHA512

    80d980a61b3a2af3e530e0fd54be0c4f066c1f3e72e417574142d35cbbbf81b294aceca1db11b8377044e622cf193e3b93c9e29a5a70373cfa445753a3fbe57f

  • SSDEEP

    3072:0j3Q0K/aJBIZ4h4a0vDoPmTzBu9B63TL89XdirgMVJK3Z1PS2qEZdUxLKV+BC/Kd:70K/a4M4aBgTLEXhMVgh9k4/KM4h1

Malware Config

Signatures

  • FatalRat

    FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

  • Gh0st RAT payload 2 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Fatal Rat payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 21 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 59 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c5d9efe6b934da50258500f6e4b4b36fda16c6ace49f1b00925549ea9b14e68.exe
    "C:\Users\Admin\AppData\Local\Temp\3c5d9efe6b934da50258500f6e4b4b36fda16c6ace49f1b00925549ea9b14e68.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1376
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2136
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command -
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2508
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2568
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command -
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2872
    • C:\Users\Admin\AppData\Local\3c5d9efe6b934da50258500f6e4b4b36fda16c6ace49f1b00925549ea9b14e68.exe
      "C:\Users\Admin\AppData\Local\3c5d9efe6b934da50258500f6e4b4b36fda16c6ace49f1b00925549ea9b14e68.exe"
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2856
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2600
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command -
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1368
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2268
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command -
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2336

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\3c5d9efe6b934da50258500f6e4b4b36fda16c6ace49f1b00925549ea9b14e68.exe

    Filesize

    206KB

    MD5

    5617586de7d9fcaed18cc5f76c550525

    SHA1

    a7fd1ce9e7cb900f26d1cc602fe5249b558acd16

    SHA256

    3c5d9efe6b934da50258500f6e4b4b36fda16c6ace49f1b00925549ea9b14e68

    SHA512

    80d980a61b3a2af3e530e0fd54be0c4f066c1f3e72e417574142d35cbbbf81b294aceca1db11b8377044e622cf193e3b93c9e29a5a70373cfa445753a3fbe57f

  • C:\Users\Admin\AppData\Local\3c5d9efe6b934da50258500f6e4b4b36fda16c6ace49f1b00925549ea9b14e68.exe

    Filesize

    206KB

    MD5

    5617586de7d9fcaed18cc5f76c550525

    SHA1

    a7fd1ce9e7cb900f26d1cc602fe5249b558acd16

    SHA256

    3c5d9efe6b934da50258500f6e4b4b36fda16c6ace49f1b00925549ea9b14e68

    SHA512

    80d980a61b3a2af3e530e0fd54be0c4f066c1f3e72e417574142d35cbbbf81b294aceca1db11b8377044e622cf193e3b93c9e29a5a70373cfa445753a3fbe57f

  • C:\Users\Admin\AppData\Local\3c5d9efe6b934da50258500f6e4b4b36fda16c6ace49f1b00925549ea9b14e68.exe

    Filesize

    206KB

    MD5

    5617586de7d9fcaed18cc5f76c550525

    SHA1

    a7fd1ce9e7cb900f26d1cc602fe5249b558acd16

    SHA256

    3c5d9efe6b934da50258500f6e4b4b36fda16c6ace49f1b00925549ea9b14e68

    SHA512

    80d980a61b3a2af3e530e0fd54be0c4f066c1f3e72e417574142d35cbbbf81b294aceca1db11b8377044e622cf193e3b93c9e29a5a70373cfa445753a3fbe57f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\4LK422HUGD6S66G80F4U.temp

    Filesize

    7KB

    MD5

    282b0c88a08b756aee836dc4d071027e

    SHA1

    21781b88af75b0366198f1e66e238e98a2f7d6b4

    SHA256

    5057391a690455dbdad3ae4a7b7a3fb9ce7395817417e4597c179546e48adb23

    SHA512

    25b5fef78da10c342a3fb9f515d214bc0b6ac4a30bfbfecdbb44d4431968882d7e66d7f536fa8f10dc15b84530fe2a55271653777f0abcc0d5974ca1f3b86a10

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    208dd3265eebe87c74118607f7cdfce8

    SHA1

    330073159309b53a1715a75d1328fd4c4c5e0f6a

    SHA256

    2ffcc602047c5e28931c80049fc967f5d97e70a132298063efca7cf4c74bb7bf

    SHA512

    2143da2c08a359e8d0745f6af05bd43e46c774506819b76593f5a7f0eebc1b351908fa04b8087dd74916d0ffa36bcf5c4622574ad42ed6cf525652c504307391

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    208dd3265eebe87c74118607f7cdfce8

    SHA1

    330073159309b53a1715a75d1328fd4c4c5e0f6a

    SHA256

    2ffcc602047c5e28931c80049fc967f5d97e70a132298063efca7cf4c74bb7bf

    SHA512

    2143da2c08a359e8d0745f6af05bd43e46c774506819b76593f5a7f0eebc1b351908fa04b8087dd74916d0ffa36bcf5c4622574ad42ed6cf525652c504307391

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    282b0c88a08b756aee836dc4d071027e

    SHA1

    21781b88af75b0366198f1e66e238e98a2f7d6b4

    SHA256

    5057391a690455dbdad3ae4a7b7a3fb9ce7395817417e4597c179546e48adb23

    SHA512

    25b5fef78da10c342a3fb9f515d214bc0b6ac4a30bfbfecdbb44d4431968882d7e66d7f536fa8f10dc15b84530fe2a55271653777f0abcc0d5974ca1f3b86a10

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    282b0c88a08b756aee836dc4d071027e

    SHA1

    21781b88af75b0366198f1e66e238e98a2f7d6b4

    SHA256

    5057391a690455dbdad3ae4a7b7a3fb9ce7395817417e4597c179546e48adb23

    SHA512

    25b5fef78da10c342a3fb9f515d214bc0b6ac4a30bfbfecdbb44d4431968882d7e66d7f536fa8f10dc15b84530fe2a55271653777f0abcc0d5974ca1f3b86a10

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    282b0c88a08b756aee836dc4d071027e

    SHA1

    21781b88af75b0366198f1e66e238e98a2f7d6b4

    SHA256

    5057391a690455dbdad3ae4a7b7a3fb9ce7395817417e4597c179546e48adb23

    SHA512

    25b5fef78da10c342a3fb9f515d214bc0b6ac4a30bfbfecdbb44d4431968882d7e66d7f536fa8f10dc15b84530fe2a55271653777f0abcc0d5974ca1f3b86a10

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    282b0c88a08b756aee836dc4d071027e

    SHA1

    21781b88af75b0366198f1e66e238e98a2f7d6b4

    SHA256

    5057391a690455dbdad3ae4a7b7a3fb9ce7395817417e4597c179546e48adb23

    SHA512

    25b5fef78da10c342a3fb9f515d214bc0b6ac4a30bfbfecdbb44d4431968882d7e66d7f536fa8f10dc15b84530fe2a55271653777f0abcc0d5974ca1f3b86a10

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    208dd3265eebe87c74118607f7cdfce8

    SHA1

    330073159309b53a1715a75d1328fd4c4c5e0f6a

    SHA256

    2ffcc602047c5e28931c80049fc967f5d97e70a132298063efca7cf4c74bb7bf

    SHA512

    2143da2c08a359e8d0745f6af05bd43e46c774506819b76593f5a7f0eebc1b351908fa04b8087dd74916d0ffa36bcf5c4622574ad42ed6cf525652c504307391

  • C:\Users\Default\Desktop\athletes.exe

    Filesize

    206KB

    MD5

    5617586de7d9fcaed18cc5f76c550525

    SHA1

    a7fd1ce9e7cb900f26d1cc602fe5249b558acd16

    SHA256

    3c5d9efe6b934da50258500f6e4b4b36fda16c6ace49f1b00925549ea9b14e68

    SHA512

    80d980a61b3a2af3e530e0fd54be0c4f066c1f3e72e417574142d35cbbbf81b294aceca1db11b8377044e622cf193e3b93c9e29a5a70373cfa445753a3fbe57f

  • \Users\Admin\AppData\Local\3c5d9efe6b934da50258500f6e4b4b36fda16c6ace49f1b00925549ea9b14e68.exe

    Filesize

    206KB

    MD5

    5617586de7d9fcaed18cc5f76c550525

    SHA1

    a7fd1ce9e7cb900f26d1cc602fe5249b558acd16

    SHA256

    3c5d9efe6b934da50258500f6e4b4b36fda16c6ace49f1b00925549ea9b14e68

    SHA512

    80d980a61b3a2af3e530e0fd54be0c4f066c1f3e72e417574142d35cbbbf81b294aceca1db11b8377044e622cf193e3b93c9e29a5a70373cfa445753a3fbe57f

  • memory/1368-99-0x0000000002840000-0x0000000002880000-memory.dmp

    Filesize

    256KB

  • memory/1368-91-0x0000000073CE0000-0x000000007428B000-memory.dmp

    Filesize

    5.7MB

  • memory/1368-92-0x0000000073CE0000-0x000000007428B000-memory.dmp

    Filesize

    5.7MB

  • memory/1368-93-0x0000000002840000-0x0000000002880000-memory.dmp

    Filesize

    256KB

  • memory/1368-94-0x0000000002840000-0x0000000002880000-memory.dmp

    Filesize

    256KB

  • memory/1368-96-0x0000000073CE0000-0x000000007428B000-memory.dmp

    Filesize

    5.7MB

  • memory/1368-97-0x0000000002840000-0x0000000002880000-memory.dmp

    Filesize

    256KB

  • memory/1368-98-0x0000000002840000-0x0000000002880000-memory.dmp

    Filesize

    256KB

  • memory/1376-0-0x00000000000A0000-0x0000000000131000-memory.dmp

    Filesize

    580KB

  • memory/1376-69-0x0000000002B30000-0x0000000002C30000-memory.dmp

    Filesize

    1024KB

  • memory/1376-65-0x00000000000A0000-0x0000000000131000-memory.dmp

    Filesize

    580KB

  • memory/1376-8-0x00000000000A0000-0x0000000000131000-memory.dmp

    Filesize

    580KB

  • memory/1376-35-0x00000000000A0000-0x0000000000131000-memory.dmp

    Filesize

    580KB

  • memory/1376-66-0x00000000034F0000-0x0000000003581000-memory.dmp

    Filesize

    580KB

  • memory/1376-53-0x0000000010000000-0x0000000010042000-memory.dmp

    Filesize

    264KB

  • memory/1376-52-0x0000000002B30000-0x0000000002C30000-memory.dmp

    Filesize

    1024KB

  • memory/1376-46-0x00000000000A0000-0x0000000000131000-memory.dmp

    Filesize

    580KB

  • memory/1376-21-0x00000000000A0000-0x0000000000131000-memory.dmp

    Filesize

    580KB

  • memory/1376-48-0x00000000000A0000-0x0000000000131000-memory.dmp

    Filesize

    580KB

  • memory/1376-50-0x0000000002B30000-0x0000000002C30000-memory.dmp

    Filesize

    1024KB

  • memory/2136-10-0x00000000738B0000-0x0000000073E5B000-memory.dmp

    Filesize

    5.7MB

  • memory/2136-7-0x00000000023F0000-0x0000000002430000-memory.dmp

    Filesize

    256KB

  • memory/2136-11-0x00000000023F0000-0x0000000002430000-memory.dmp

    Filesize

    256KB

  • memory/2136-4-0x00000000738B0000-0x0000000073E5B000-memory.dmp

    Filesize

    5.7MB

  • memory/2136-5-0x00000000023F0000-0x0000000002430000-memory.dmp

    Filesize

    256KB

  • memory/2136-3-0x00000000738B0000-0x0000000073E5B000-memory.dmp

    Filesize

    5.7MB

  • memory/2136-6-0x00000000023F0000-0x0000000002430000-memory.dmp

    Filesize

    256KB

  • memory/2268-110-0x0000000073020000-0x00000000735CB000-memory.dmp

    Filesize

    5.7MB

  • memory/2268-109-0x0000000073020000-0x00000000735CB000-memory.dmp

    Filesize

    5.7MB

  • memory/2268-112-0x0000000073020000-0x00000000735CB000-memory.dmp

    Filesize

    5.7MB

  • memory/2268-113-0x0000000002880000-0x00000000028C0000-memory.dmp

    Filesize

    256KB

  • memory/2336-120-0x0000000073CD0000-0x000000007427B000-memory.dmp

    Filesize

    5.7MB

  • memory/2336-122-0x0000000002380000-0x00000000023C0000-memory.dmp

    Filesize

    256KB

  • memory/2336-119-0x0000000073CD0000-0x000000007427B000-memory.dmp

    Filesize

    5.7MB

  • memory/2336-121-0x0000000002380000-0x00000000023C0000-memory.dmp

    Filesize

    256KB

  • memory/2336-125-0x0000000002380000-0x00000000023C0000-memory.dmp

    Filesize

    256KB

  • memory/2336-124-0x0000000073CD0000-0x000000007427B000-memory.dmp

    Filesize

    5.7MB

  • memory/2508-19-0x0000000002430000-0x0000000002470000-memory.dmp

    Filesize

    256KB

  • memory/2508-23-0x0000000002430000-0x0000000002470000-memory.dmp

    Filesize

    256KB

  • memory/2508-24-0x0000000002430000-0x0000000002470000-memory.dmp

    Filesize

    256KB

  • memory/2508-25-0x0000000002430000-0x0000000002470000-memory.dmp

    Filesize

    256KB

  • memory/2508-20-0x0000000073CE0000-0x000000007428B000-memory.dmp

    Filesize

    5.7MB

  • memory/2508-18-0x0000000002430000-0x0000000002470000-memory.dmp

    Filesize

    256KB

  • memory/2508-22-0x0000000073CE0000-0x000000007428B000-memory.dmp

    Filesize

    5.7MB

  • memory/2508-17-0x0000000073CE0000-0x000000007428B000-memory.dmp

    Filesize

    5.7MB

  • memory/2568-32-0x0000000073890000-0x0000000073E3B000-memory.dmp

    Filesize

    5.7MB

  • memory/2568-38-0x0000000002650000-0x0000000002690000-memory.dmp

    Filesize

    256KB

  • memory/2568-37-0x0000000002650000-0x0000000002690000-memory.dmp

    Filesize

    256KB

  • memory/2568-36-0x0000000073890000-0x0000000073E3B000-memory.dmp

    Filesize

    5.7MB

  • memory/2568-34-0x0000000073890000-0x0000000073E3B000-memory.dmp

    Filesize

    5.7MB

  • memory/2568-33-0x0000000002650000-0x0000000002690000-memory.dmp

    Filesize

    256KB

  • memory/2600-79-0x0000000002620000-0x0000000002660000-memory.dmp

    Filesize

    256KB

  • memory/2600-80-0x0000000073890000-0x0000000073E3B000-memory.dmp

    Filesize

    5.7MB

  • memory/2600-78-0x0000000002620000-0x0000000002660000-memory.dmp

    Filesize

    256KB

  • memory/2600-76-0x0000000073890000-0x0000000073E3B000-memory.dmp

    Filesize

    5.7MB

  • memory/2600-83-0x0000000073890000-0x0000000073E3B000-memory.dmp

    Filesize

    5.7MB

  • memory/2600-77-0x0000000002620000-0x0000000002660000-memory.dmp

    Filesize

    256KB

  • memory/2600-84-0x0000000002620000-0x0000000002660000-memory.dmp

    Filesize

    256KB

  • memory/2600-85-0x0000000002620000-0x0000000002660000-memory.dmp

    Filesize

    256KB

  • memory/2856-126-0x00000000002C0000-0x0000000000351000-memory.dmp

    Filesize

    580KB

  • memory/2856-137-0x0000000002C00000-0x0000000002D00000-memory.dmp

    Filesize

    1024KB

  • memory/2856-139-0x0000000002C00000-0x0000000002D00000-memory.dmp

    Filesize

    1024KB

  • memory/2856-111-0x00000000002C0000-0x0000000000351000-memory.dmp

    Filesize

    580KB

  • memory/2856-68-0x00000000002C0000-0x0000000000351000-memory.dmp

    Filesize

    580KB

  • memory/2856-123-0x00000000002C0000-0x0000000000351000-memory.dmp

    Filesize

    580KB

  • memory/2856-81-0x00000000002C0000-0x0000000000351000-memory.dmp

    Filesize

    580KB

  • memory/2856-138-0x00000000002C0000-0x0000000000351000-memory.dmp

    Filesize

    580KB

  • memory/2856-95-0x00000000002C0000-0x0000000000351000-memory.dmp

    Filesize

    580KB

  • memory/2856-129-0x0000000002C00000-0x0000000002D00000-memory.dmp

    Filesize

    1024KB

  • memory/2856-130-0x0000000002C00000-0x0000000002D00000-memory.dmp

    Filesize

    1024KB

  • memory/2856-131-0x0000000010000000-0x0000000010042000-memory.dmp

    Filesize

    264KB

  • memory/2872-45-0x0000000073CE0000-0x000000007428B000-memory.dmp

    Filesize

    5.7MB

  • memory/2872-44-0x0000000073CE0000-0x000000007428B000-memory.dmp

    Filesize

    5.7MB

  • memory/2872-47-0x0000000073CE0000-0x000000007428B000-memory.dmp

    Filesize

    5.7MB