Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-10-2023 15:32

General

  • Target

    Wps.exe

  • Size

    8.3MB

  • MD5

    fa05a54376d3377967e52ba78dee8ba6

  • SHA1

    3349e0236e886f2c1e69c02eb99b6fbc242f930f

  • SHA256

    c9cbb955c9c7c0f5b5cb4bce2b7b87b211c2ddd5eb123da663ace4bd6beb3017

  • SHA512

    ba63752a5900d3ad1e1dcf9c00e99c6295ef9b06e2842ad2384860ace8c61458a483954e13700ff2402db58c6e3c2a759f73b5f5c69967b56fd37ded81f12953

  • SSDEEP

    196608:6guPOGfSizC2F/LVk6jO521HC3YW4Xxqrlnbt84bYQ8RK:6gKO63zRFqKO2EwXox8E9

Malware Config

Signatures

  • FatalRat

    FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

  • Fatal Rat payload 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • VMProtect packed file 7 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Wps.exe
    "C:\Users\Admin\AppData\Local\Temp\Wps.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:3164
    • C:\Program Files (x86)\a5.exe
      "C:\Program Files (x86)\a5.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:952
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:1524
    • C:\Users\Public\Documents\123\PTvrst.exe
      "C:\Users\Public\Documents\123\PTvrst.exe"
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1688
      • C:\WINDOWS\DNomb\spolsvt.exe
        C:\WINDOWS\DNomb\spolsvt.exe
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3168
        • C:\Users\Public\Documents\t\spolsvt.exe
          C:\Users\Public\Documents\t\spolsvt.exe
          3⤵
          • Executes dropped EXE
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4616

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\a5.exe

      Filesize

      5.6MB

      MD5

      48b171f32947aa7fe8752fdbf134c667

      SHA1

      a1ad1fa92b5828965021ad7d0d0a13bba0e51105

      SHA256

      69bd0a71b2a3fcf609ecb92a11a1eb07d2e58f3eb46505309701c5b1655a4ba6

      SHA512

      18d6a054953943ef96748ef6e473f77ac203f17cb81cb4456207f6baf65a5461c7c934eee3d47776b70f489dee6963ed5c1d0aeaec75a517ecbd3d7307abaee1

    • C:\Program Files (x86)\a5.exe

      Filesize

      5.6MB

      MD5

      48b171f32947aa7fe8752fdbf134c667

      SHA1

      a1ad1fa92b5828965021ad7d0d0a13bba0e51105

      SHA256

      69bd0a71b2a3fcf609ecb92a11a1eb07d2e58f3eb46505309701c5b1655a4ba6

      SHA512

      18d6a054953943ef96748ef6e473f77ac203f17cb81cb4456207f6baf65a5461c7c934eee3d47776b70f489dee6963ed5c1d0aeaec75a517ecbd3d7307abaee1

    • C:\Program Files (x86)\a5.exe

      Filesize

      5.6MB

      MD5

      48b171f32947aa7fe8752fdbf134c667

      SHA1

      a1ad1fa92b5828965021ad7d0d0a13bba0e51105

      SHA256

      69bd0a71b2a3fcf609ecb92a11a1eb07d2e58f3eb46505309701c5b1655a4ba6

      SHA512

      18d6a054953943ef96748ef6e473f77ac203f17cb81cb4456207f6baf65a5461c7c934eee3d47776b70f489dee6963ed5c1d0aeaec75a517ecbd3d7307abaee1

    • C:\Users\Public\Documents\123\PTvrst.exe

      Filesize

      1.2MB

      MD5

      d22cfb5bfaeb1503b12b07e53ef0a149

      SHA1

      8ea2c85e363f551a159fabd65377affed4e417a1

      SHA256

      260464fb05210cfb30ef7a12d568f75eb781634b251d958cae8911948f6ca360

      SHA512

      151024cb2960b1ee485ded7ccbb753fe368a93fda5699af72e568667fa54bfb0d1732444e7b60efaab6d372204157cdb6abbf8862d0e89d612dd963342215e45

    • C:\Users\Public\Documents\123\PTvrst.exe

      Filesize

      1.2MB

      MD5

      d22cfb5bfaeb1503b12b07e53ef0a149

      SHA1

      8ea2c85e363f551a159fabd65377affed4e417a1

      SHA256

      260464fb05210cfb30ef7a12d568f75eb781634b251d958cae8911948f6ca360

      SHA512

      151024cb2960b1ee485ded7ccbb753fe368a93fda5699af72e568667fa54bfb0d1732444e7b60efaab6d372204157cdb6abbf8862d0e89d612dd963342215e45

    • C:\Users\Public\Documents\t\spolsvt.exe

      Filesize

      16KB

      MD5

      cdce4713e784ae069d73723034a957ff

      SHA1

      9a393a6bab6568f1a774fb753353223f11367e09

      SHA256

      b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8

      SHA512

      0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

    • C:\Users\Public\Documents\t\spolsvt.exe

      Filesize

      16KB

      MD5

      cdce4713e784ae069d73723034a957ff

      SHA1

      9a393a6bab6568f1a774fb753353223f11367e09

      SHA256

      b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8

      SHA512

      0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

    • C:\WINDOWS\DNomb\Mpec.mbt

      Filesize

      488KB

      MD5

      1a829ab10a43c43f1c19b37626cc937a

      SHA1

      690d228cf505c4ef655789fef97ff7634e62ad02

      SHA256

      0e7f8fbe4da4c2dcf93ceabb5271bd753c0ddb0156f303d1bc11cc97ad35fd6f

      SHA512

      34ce05f48584ff3938622f685cf6607d3cc1f8452fbda7a24314187a0694baaac720e46987956451bff14cf675bd68eaa761b750297eba2d5f602e1e3e3f15d0

    • C:\WINDOWS\DNomb\spolsvt.exe

      Filesize

      9KB

      MD5

      523d5c39f9d8d2375c3df68251fa2249

      SHA1

      d4ed365c44bec9246fc1a65a32a7791792647a10

      SHA256

      20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

      SHA512

      526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

    • C:\Windows\DNomb\spolsvt.exe

      Filesize

      9KB

      MD5

      523d5c39f9d8d2375c3df68251fa2249

      SHA1

      d4ed365c44bec9246fc1a65a32a7791792647a10

      SHA256

      20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

      SHA512

      526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

    • memory/952-21-0x0000000002CF0000-0x0000000002CF1000-memory.dmp

      Filesize

      4KB

    • memory/952-22-0x0000000002D00000-0x0000000002D01000-memory.dmp

      Filesize

      4KB

    • memory/952-29-0x0000000000400000-0x0000000000DFB000-memory.dmp

      Filesize

      10.0MB

    • memory/952-20-0x0000000002CE0000-0x0000000002CE1000-memory.dmp

      Filesize

      4KB

    • memory/952-19-0x0000000002CD0000-0x0000000002CD1000-memory.dmp

      Filesize

      4KB

    • memory/952-84-0x0000000000400000-0x0000000000DFB000-memory.dmp

      Filesize

      10.0MB

    • memory/952-17-0x0000000001570000-0x0000000001571000-memory.dmp

      Filesize

      4KB

    • memory/952-18-0x0000000000400000-0x0000000000DFB000-memory.dmp

      Filesize

      10.0MB

    • memory/952-14-0x0000000000E10000-0x0000000000E11000-memory.dmp

      Filesize

      4KB

    • memory/952-16-0x0000000000F50000-0x0000000000F51000-memory.dmp

      Filesize

      4KB

    • memory/952-15-0x0000000000400000-0x0000000000DFB000-memory.dmp

      Filesize

      10.0MB

    • memory/1688-45-0x00000000047D0000-0x00000000047D1000-memory.dmp

      Filesize

      4KB

    • memory/1688-50-0x0000000004740000-0x0000000004741000-memory.dmp

      Filesize

      4KB

    • memory/1688-42-0x0000000004760000-0x0000000004761000-memory.dmp

      Filesize

      4KB

    • memory/1688-43-0x0000000004800000-0x0000000004801000-memory.dmp

      Filesize

      4KB

    • memory/1688-44-0x00000000047A0000-0x00000000047A1000-memory.dmp

      Filesize

      4KB

    • memory/1688-40-0x00000000047E0000-0x00000000047E2000-memory.dmp

      Filesize

      8KB

    • memory/1688-46-0x00000000047C0000-0x00000000047C1000-memory.dmp

      Filesize

      4KB

    • memory/1688-47-0x0000000004820000-0x0000000004821000-memory.dmp

      Filesize

      4KB

    • memory/1688-48-0x0000000004870000-0x0000000004871000-memory.dmp

      Filesize

      4KB

    • memory/1688-49-0x0000000004910000-0x0000000004911000-memory.dmp

      Filesize

      4KB

    • memory/1688-51-0x0000000004790000-0x0000000004791000-memory.dmp

      Filesize

      4KB

    • memory/1688-36-0x00000000047F0000-0x00000000047F1000-memory.dmp

      Filesize

      4KB

    • memory/1688-52-0x0000000004850000-0x0000000004851000-memory.dmp

      Filesize

      4KB

    • memory/1688-54-0x00000000048E0000-0x00000000048E2000-memory.dmp

      Filesize

      8KB

    • memory/1688-53-0x0000000000400000-0x00000000006A2000-memory.dmp

      Filesize

      2.6MB

    • memory/1688-55-0x0000000004880000-0x0000000004881000-memory.dmp

      Filesize

      4KB

    • memory/1688-39-0x0000000004780000-0x0000000004781000-memory.dmp

      Filesize

      4KB

    • memory/1688-41-0x0000000004770000-0x0000000004771000-memory.dmp

      Filesize

      4KB

    • memory/1688-33-0x0000000000400000-0x00000000006A2000-memory.dmp

      Filesize

      2.6MB

    • memory/1688-83-0x0000000000400000-0x00000000006A2000-memory.dmp

      Filesize

      2.6MB

    • memory/1688-35-0x0000000077CC4000-0x0000000077CC6000-memory.dmp

      Filesize

      8KB

    • memory/1688-38-0x00000000047B0000-0x00000000047B1000-memory.dmp

      Filesize

      4KB

    • memory/1688-37-0x0000000004750000-0x0000000004751000-memory.dmp

      Filesize

      4KB

    • memory/3168-58-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/3168-66-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/3168-65-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/3168-61-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/3168-59-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/3168-60-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/4616-73-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4616-77-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4616-78-0x0000000010000000-0x000000001002A000-memory.dmp

      Filesize

      168KB

    • memory/4616-72-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4616-71-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB