Analysis
-
max time kernel
163s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 15:33
Static task
static1
Behavioral task
behavioral1
Sample
5726447d808719aaad889259c482641ae4583e8ac7e16de1688c00425f9935b9.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
5726447d808719aaad889259c482641ae4583e8ac7e16de1688c00425f9935b9.exe
Resource
win10v2004-20230915-en
General
-
Target
5726447d808719aaad889259c482641ae4583e8ac7e16de1688c00425f9935b9.exe
-
Size
4.6MB
-
MD5
bf7e11ba2252db0e6be3c31b137b12dc
-
SHA1
2ff198c59fe7be2c807816fa243e9c874f85b388
-
SHA256
5726447d808719aaad889259c482641ae4583e8ac7e16de1688c00425f9935b9
-
SHA512
aa0493ba6ff5ebd4cfede6fa3fcb29cf00721b44acbd4eb5a65ef11a5e3930ea90aa8726790189f7866bbe4ed67ade81154a37a38063966f663d5d81050fc1ad
-
SSDEEP
49152:TbEp2+CVgtJO94vM0iTnDJJZk425V/zaBM3SbawwtlY6sKpETPub0J0lTuRjlH6H:TJnVivMba4aBN3SbAYbKpEq0WMRh
Malware Config
Signatures
-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Fatal Rat payload 11 IoCs
resource yara_rule behavioral2/memory/1200-24-0x0000000005520000-0x0000000005556000-memory.dmp fatalrat behavioral2/memory/1200-32-0x0000000010000000-0x000000001020A000-memory.dmp fatalrat behavioral2/memory/1200-33-0x0000000010000000-0x000000001020A000-memory.dmp fatalrat behavioral2/memory/1200-34-0x0000000010000000-0x000000001020A000-memory.dmp fatalrat behavioral2/memory/1200-35-0x0000000010000000-0x000000001020A000-memory.dmp fatalrat behavioral2/memory/1200-36-0x0000000010000000-0x000000001020A000-memory.dmp fatalrat behavioral2/memory/1200-37-0x0000000010000000-0x000000001020A000-memory.dmp fatalrat behavioral2/memory/1200-38-0x0000000010000000-0x000000001020A000-memory.dmp fatalrat behavioral2/memory/1200-39-0x0000000010000000-0x000000001020A000-memory.dmp fatalrat behavioral2/memory/1200-40-0x0000000010000000-0x000000001020A000-memory.dmp fatalrat behavioral2/memory/1200-41-0x0000000010000000-0x000000001020A000-memory.dmp fatalrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Powermonster.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation 5726447d808719aaad889259c482641ae4583e8ac7e16de1688c00425f9935b9.exe -
Executes dropped EXE 1 IoCs
pid Process 1200 Powermonster.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Software\Wine Powermonster.exe -
Loads dropped DLL 1 IoCs
pid Process 1200 Powermonster.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yxfile = "C:\\Users\\Admin\\AppData\\Local\\Powermonster.exe" Powermonster.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1200 Powermonster.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1200 Powermonster.exe 1200 Powermonster.exe 1200 Powermonster.exe 1200 Powermonster.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1200 Powermonster.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 8 wrote to memory of 1200 8 5726447d808719aaad889259c482641ae4583e8ac7e16de1688c00425f9935b9.exe 92 PID 8 wrote to memory of 1200 8 5726447d808719aaad889259c482641ae4583e8ac7e16de1688c00425f9935b9.exe 92 PID 8 wrote to memory of 1200 8 5726447d808719aaad889259c482641ae4583e8ac7e16de1688c00425f9935b9.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\5726447d808719aaad889259c482641ae4583e8ac7e16de1688c00425f9935b9.exe"C:\Users\Admin\AppData\Local\Temp\5726447d808719aaad889259c482641ae4583e8ac7e16de1688c00425f9935b9.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Users\Public\Pictures\Powermonster.exe"C:\Users\Public\Pictures\Powermonster.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1200
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5842af33f5702fa99efd8f7b235f28fcc
SHA1b841b71a4e39432f3a940ad841e74ea1686da6c9
SHA25682ab7bbe88c0371e2122e7ad2faa452fdedc4063c2fda36d00c011bdd3948209
SHA512ba78f32b344842b36ec3e5da0ca1cd80f67c18ab0537ea0d8dd970b823be9e1e48bdc0c28d5ec1666d6da22fc6b5682e99b5844ccd513a836d37158ddb0d8a82
-
Filesize
2.5MB
MD5842af33f5702fa99efd8f7b235f28fcc
SHA1b841b71a4e39432f3a940ad841e74ea1686da6c9
SHA25682ab7bbe88c0371e2122e7ad2faa452fdedc4063c2fda36d00c011bdd3948209
SHA512ba78f32b344842b36ec3e5da0ca1cd80f67c18ab0537ea0d8dd970b823be9e1e48bdc0c28d5ec1666d6da22fc6b5682e99b5844ccd513a836d37158ddb0d8a82
-
Filesize
2.5MB
MD5842af33f5702fa99efd8f7b235f28fcc
SHA1b841b71a4e39432f3a940ad841e74ea1686da6c9
SHA25682ab7bbe88c0371e2122e7ad2faa452fdedc4063c2fda36d00c011bdd3948209
SHA512ba78f32b344842b36ec3e5da0ca1cd80f67c18ab0537ea0d8dd970b823be9e1e48bdc0c28d5ec1666d6da22fc6b5682e99b5844ccd513a836d37158ddb0d8a82
-
Filesize
921KB
MD5a004a9f3f3c13edd2b8461037c517426
SHA1fbabddc6146174aaae84178e7cba580dbb4e7725
SHA2568022c162b5766dd747300ccfb8efbf7421be57ff32be214438de3b9e818704b6
SHA5124bb014deea3cf6b20638415255d91cfa03fa944113352d7ebd67d75807d892839c61adbf956d4e47f5777b4b1a327262d6cd870109ad7c8770700735e8e0f598
-
Filesize
921KB
MD5a004a9f3f3c13edd2b8461037c517426
SHA1fbabddc6146174aaae84178e7cba580dbb4e7725
SHA2568022c162b5766dd747300ccfb8efbf7421be57ff32be214438de3b9e818704b6
SHA5124bb014deea3cf6b20638415255d91cfa03fa944113352d7ebd67d75807d892839c61adbf956d4e47f5777b4b1a327262d6cd870109ad7c8770700735e8e0f598