Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
125s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 08:09
Static task
static1
Behavioral task
behavioral1
Sample
72ab1fdb6c8bb30e32ba8d3d27a1cea2690ad59ab4ff28bfd0ebfb3788555391.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
72ab1fdb6c8bb30e32ba8d3d27a1cea2690ad59ab4ff28bfd0ebfb3788555391.dll
Resource
win10v2004-20230915-en
General
-
Target
72ab1fdb6c8bb30e32ba8d3d27a1cea2690ad59ab4ff28bfd0ebfb3788555391.dll
-
Size
74KB
-
MD5
60e8527b26fb0d5458664ec5c674338a
-
SHA1
034724e0211c1c988f4a48a51d5f2b433e73c455
-
SHA256
72ab1fdb6c8bb30e32ba8d3d27a1cea2690ad59ab4ff28bfd0ebfb3788555391
-
SHA512
cf0af30b547eb51b394a2096190652f8e82efd67813be1c553c630a5197c516a0f2ffa2a067a5817e7f18490cd781581edcf3376d73baa80f1a30314efc747b6
-
SSDEEP
1536:+pi13988ZAcYPxykieJBkugszIkRkAkkkp7kkkkZkiJ++9gL45+ZVYHvzf9fhsiC:+pi1398qAcYPxykieJBkugszIkRkAkk/
Malware Config
Signatures
-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Fatal Rat payload 1 IoCs
resource yara_rule behavioral2/memory/4388-6-0x00000000012F0000-0x000000000131A000-memory.dmp fatalrat -
Blocklisted process makes network request 2 IoCs
flow pid Process 17 4388 rundll32.exe 30 4388 rundll32.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe 4388 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4388 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1552 wrote to memory of 4388 1552 rundll32.exe 82 PID 1552 wrote to memory of 4388 1552 rundll32.exe 82 PID 1552 wrote to memory of 4388 1552 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\72ab1fdb6c8bb30e32ba8d3d27a1cea2690ad59ab4ff28bfd0ebfb3788555391.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\72ab1fdb6c8bb30e32ba8d3d27a1cea2690ad59ab4ff28bfd0ebfb3788555391.dll,#12⤵
- Blocklisted process makes network request
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4388
-