Analysis

  • max time kernel
    145s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    01-10-2023 21:26

General

  • Target

    2023-08-26_f5bde7dc4c139488d3dd8434e92a5cc4_mafia_JC.exe

  • Size

    96KB

  • MD5

    f5bde7dc4c139488d3dd8434e92a5cc4

  • SHA1

    7b682d6607e2a11a88d34e4ad141e4135bdde589

  • SHA256

    0373e6b54ee6a2016973e3764af817b19b3aa9cb97e77845c86227eb215b4e72

  • SHA512

    de8e99335e1459374838baff9d0af4ed3b7a425813de9e4649d613b4165f96d374ebd5db340a3dcadab3bd8a197806146aee26527dc16030534a2c0f4da8dfa0

  • SSDEEP

    1536:J0FfM5+DncE24ujIds67Ef+TTd014UQcqYs3sbTP:WFfM4D1/2+W14UQcqYs

Malware Config

Signatures

  • FatalRat

    FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

  • Fatal Rat payload 1 IoCs
  • Downloads MZ/PE file
  • ACProtect 1.3x - 1.4x DLL software 3 IoCs

    Detects file using ACProtect software.

  • ASPack v2.12-2.42 3 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 52 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2023-08-26_f5bde7dc4c139488d3dd8434e92a5cc4_mafia_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\2023-08-26_f5bde7dc4c139488d3dd8434e92a5cc4_mafia_JC.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2392
    • C:\Users\Public\Documents\Admin558\Adam.exe
      C:\Users\Public\Documents\Admin558\Adam.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2544
    • C:\Users\Public\Documents\Admin558\Thun.exe
      C:\Users\Public\Documents\Admin558\Thun.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1104f089bfa66094b8fb2c48cb8fa6d0

    SHA1

    083a21381af7239db1db2aad2cee5f2cd8c4386a

    SHA256

    5d5f0e791f6e288066e8bc557c0ded4a2e57c01030d5a1fba4128319c8b88d56

    SHA512

    d39b3e0052302bab29a942a01cad655bccbc89827bf21ef615f4dae6a594c96ed92a943f8c80504b13f85a81409d9494683dcd170acf78f45d533e0057fd134d

  • C:\Users\Admin\AppData\Local\Temp\Cab75FD.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar76BB.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • C:\Users\Public\Documents\Admin558\Adam.exe

    Filesize

    169KB

    MD5

    928969d2a2dbb58479ae2236ac328d22

    SHA1

    e4d9631a343d73b1ee0d7e4db55978ce59dee1d6

    SHA256

    709776daeb0a8aac58b530e9fa0ff61afd4ffad1677c3b46ac7b375ccb1f2c4a

    SHA512

    62a25aa6ac3383142ab3fdc3462c296ec60f8255173b21443a83b87151c2ce931cf0dd2fb6868f783f13fba8ad3c283d53250e61ebc172f80a0ef47bdcbaae9c

  • C:\Users\Public\Documents\Admin558\Adam.exe

    Filesize

    169KB

    MD5

    928969d2a2dbb58479ae2236ac328d22

    SHA1

    e4d9631a343d73b1ee0d7e4db55978ce59dee1d6

    SHA256

    709776daeb0a8aac58b530e9fa0ff61afd4ffad1677c3b46ac7b375ccb1f2c4a

    SHA512

    62a25aa6ac3383142ab3fdc3462c296ec60f8255173b21443a83b87151c2ce931cf0dd2fb6868f783f13fba8ad3c283d53250e61ebc172f80a0ef47bdcbaae9c

  • C:\Users\Public\Documents\Admin558\Thun.exe

    Filesize

    1.1MB

    MD5

    7c4bfda1e4dfa3a7c59aaeb7fee08c80

    SHA1

    7ac76bcf4a74ab57aeb62aa59531f8aad14c6c77

    SHA256

    781609c3f08ad116aa2c342e277c4899ae760e08e6c1593f95b6aa3cf6f5b109

    SHA512

    bd189c981a1a25c782f4c12dc00a9009a4819a33ee9eacb6c1ba30b1d656965c86099bd0beb66f1ea8cfc0bf5e7a5ddfc370b1a0fd0f69381f216e05d437d68a

  • C:\Users\Public\Documents\Admin558\Thun.exe

    Filesize

    1.1MB

    MD5

    7c4bfda1e4dfa3a7c59aaeb7fee08c80

    SHA1

    7ac76bcf4a74ab57aeb62aa59531f8aad14c6c77

    SHA256

    781609c3f08ad116aa2c342e277c4899ae760e08e6c1593f95b6aa3cf6f5b109

    SHA512

    bd189c981a1a25c782f4c12dc00a9009a4819a33ee9eacb6c1ba30b1d656965c86099bd0beb66f1ea8cfc0bf5e7a5ddfc370b1a0fd0f69381f216e05d437d68a

  • C:\Users\Public\Documents\Admin558\Thun.exe

    Filesize

    1.1MB

    MD5

    7c4bfda1e4dfa3a7c59aaeb7fee08c80

    SHA1

    7ac76bcf4a74ab57aeb62aa59531f8aad14c6c77

    SHA256

    781609c3f08ad116aa2c342e277c4899ae760e08e6c1593f95b6aa3cf6f5b109

    SHA512

    bd189c981a1a25c782f4c12dc00a9009a4819a33ee9eacb6c1ba30b1d656965c86099bd0beb66f1ea8cfc0bf5e7a5ddfc370b1a0fd0f69381f216e05d437d68a

  • C:\Users\Public\Documents\Admin558\Thunder.exe

    Filesize

    1.1MB

    MD5

    61967681c21ab3403d35469c1639d2ca

    SHA1

    5c5f5090e2033e03346a50ad0cc2f72670667bbf

    SHA256

    1e4855f383a002839707711cd77b9700074ad3f71037443eb574ffac8af472a2

    SHA512

    1f70aa3bdf398b05f396d748f8dd1e99212e5bfa779753756e4c4f9dfd0547bc24d2606b6a3e9007b12e044946a7468f79cb4599990140b1bfa4d4f045a0d444

  • C:\Users\Public\Documents\Admin558\libcef.dll

    Filesize

    74KB

    MD5

    745f4b12f1eaa9e8e31628ba57a8b024

    SHA1

    0da99c3df50aa2f4f89a7a53b985791101a589aa

    SHA256

    c9bd8c6693239dbed5f1aa5f54b1f08f031ce9538a5839c4aa1b0ad28fb695d8

    SHA512

    4297053a57914dfe03bf827039b5c7f88e858717ac4d3a739a45af36d68370ccaba46577e53e35a32ff3550babc4d5ec919661643da5dba82191dc2bbcd5a69c

  • C:\Users\Public\Documents\Admin558\libcef.dll

    Filesize

    74KB

    MD5

    745f4b12f1eaa9e8e31628ba57a8b024

    SHA1

    0da99c3df50aa2f4f89a7a53b985791101a589aa

    SHA256

    c9bd8c6693239dbed5f1aa5f54b1f08f031ce9538a5839c4aa1b0ad28fb695d8

    SHA512

    4297053a57914dfe03bf827039b5c7f88e858717ac4d3a739a45af36d68370ccaba46577e53e35a32ff3550babc4d5ec919661643da5dba82191dc2bbcd5a69c

  • \Users\Public\Documents\Admin558\Adam.exe

    Filesize

    169KB

    MD5

    928969d2a2dbb58479ae2236ac328d22

    SHA1

    e4d9631a343d73b1ee0d7e4db55978ce59dee1d6

    SHA256

    709776daeb0a8aac58b530e9fa0ff61afd4ffad1677c3b46ac7b375ccb1f2c4a

    SHA512

    62a25aa6ac3383142ab3fdc3462c296ec60f8255173b21443a83b87151c2ce931cf0dd2fb6868f783f13fba8ad3c283d53250e61ebc172f80a0ef47bdcbaae9c

  • \Users\Public\Documents\Admin558\Thun.exe

    Filesize

    1.1MB

    MD5

    7c4bfda1e4dfa3a7c59aaeb7fee08c80

    SHA1

    7ac76bcf4a74ab57aeb62aa59531f8aad14c6c77

    SHA256

    781609c3f08ad116aa2c342e277c4899ae760e08e6c1593f95b6aa3cf6f5b109

    SHA512

    bd189c981a1a25c782f4c12dc00a9009a4819a33ee9eacb6c1ba30b1d656965c86099bd0beb66f1ea8cfc0bf5e7a5ddfc370b1a0fd0f69381f216e05d437d68a

  • \Users\Public\Documents\Admin558\libcef.dll

    Filesize

    74KB

    MD5

    745f4b12f1eaa9e8e31628ba57a8b024

    SHA1

    0da99c3df50aa2f4f89a7a53b985791101a589aa

    SHA256

    c9bd8c6693239dbed5f1aa5f54b1f08f031ce9538a5839c4aa1b0ad28fb695d8

    SHA512

    4297053a57914dfe03bf827039b5c7f88e858717ac4d3a739a45af36d68370ccaba46577e53e35a32ff3550babc4d5ec919661643da5dba82191dc2bbcd5a69c

  • memory/2392-99-0x0000000000D30000-0x0000000000D88000-memory.dmp

    Filesize

    352KB

  • memory/2544-104-0x00000000009D0000-0x0000000000A28000-memory.dmp

    Filesize

    352KB

  • memory/2544-103-0x00000000009D0000-0x0000000000A28000-memory.dmp

    Filesize

    352KB

  • memory/2544-102-0x00000000009D0000-0x0000000000A28000-memory.dmp

    Filesize

    352KB

  • memory/2796-114-0x0000000010000000-0x0000000010031000-memory.dmp

    Filesize

    196KB

  • memory/2796-113-0x00000000000D0000-0x00000000000D1000-memory.dmp

    Filesize

    4KB

  • memory/2796-115-0x0000000001FD0000-0x0000000002008000-memory.dmp

    Filesize

    224KB

  • memory/2796-112-0x0000000000340000-0x0000000000375000-memory.dmp

    Filesize

    212KB

  • memory/2796-118-0x0000000000380000-0x00000000003AA000-memory.dmp

    Filesize

    168KB

  • memory/2796-111-0x00000000747B0000-0x00000000747CF000-memory.dmp

    Filesize

    124KB

  • memory/2796-124-0x00000000747B0000-0x00000000747CF000-memory.dmp

    Filesize

    124KB

  • memory/2796-125-0x0000000000340000-0x0000000000375000-memory.dmp

    Filesize

    212KB

  • memory/2796-129-0x00000000747B0000-0x00000000747CF000-memory.dmp

    Filesize

    124KB

  • memory/2796-135-0x00000000747B0000-0x00000000747CF000-memory.dmp

    Filesize

    124KB