Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    153s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/10/2023, 08:25

General

  • Target

    a7c4285218581fc609232793a82c091b1855f120ea4484536140533907fa7a48.exe

  • Size

    1.3MB

  • MD5

    9c39f93c41464571c61a9e6ad689b91a

  • SHA1

    fb2ee625d3b88af6bf5519281250c09da171d438

  • SHA256

    a7c4285218581fc609232793a82c091b1855f120ea4484536140533907fa7a48

  • SHA512

    8611e1f076240b18b70a417acba548c7e5111cd20a1390a596eb30b49faa29d40e12f51acf03fe5e9602fd635ba2feb946574664a3945e0199e2cc91690ff59f

  • SSDEEP

    24576:yP3oWsSQq42nyvUPZ8lvIEK4GyiqRs1wc1EHSLgQyqa5M8VN2W2OI4:cYNqyM1wGy2f1mQ7aiJOP

Malware Config

Signatures

  • FatalRat

    FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

  • Fatal Rat payload 5 IoCs
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 13 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 58 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 30 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a7c4285218581fc609232793a82c091b1855f120ea4484536140533907fa7a48.exe
    "C:\Users\Admin\AppData\Local\Temp\a7c4285218581fc609232793a82c091b1855f120ea4484536140533907fa7a48.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4532
  • C:\Program Files (x86)\Svwxya.exe
    "C:\Program Files (x86)\Svwxya.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2872
    • C:\Program Files (x86)\Svwxya.exe
      "C:\Program Files (x86)\Svwxya.exe" Win7
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Program Files directory
      • Checks processor information in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Svwxya.exe

    Filesize

    1.3MB

    MD5

    9c39f93c41464571c61a9e6ad689b91a

    SHA1

    fb2ee625d3b88af6bf5519281250c09da171d438

    SHA256

    a7c4285218581fc609232793a82c091b1855f120ea4484536140533907fa7a48

    SHA512

    8611e1f076240b18b70a417acba548c7e5111cd20a1390a596eb30b49faa29d40e12f51acf03fe5e9602fd635ba2feb946574664a3945e0199e2cc91690ff59f

  • C:\Program Files (x86)\Svwxya.exe

    Filesize

    1.3MB

    MD5

    9c39f93c41464571c61a9e6ad689b91a

    SHA1

    fb2ee625d3b88af6bf5519281250c09da171d438

    SHA256

    a7c4285218581fc609232793a82c091b1855f120ea4484536140533907fa7a48

    SHA512

    8611e1f076240b18b70a417acba548c7e5111cd20a1390a596eb30b49faa29d40e12f51acf03fe5e9602fd635ba2feb946574664a3945e0199e2cc91690ff59f

  • C:\Program Files (x86)\Svwxya.exe

    Filesize

    1.3MB

    MD5

    9c39f93c41464571c61a9e6ad689b91a

    SHA1

    fb2ee625d3b88af6bf5519281250c09da171d438

    SHA256

    a7c4285218581fc609232793a82c091b1855f120ea4484536140533907fa7a48

    SHA512

    8611e1f076240b18b70a417acba548c7e5111cd20a1390a596eb30b49faa29d40e12f51acf03fe5e9602fd635ba2feb946574664a3945e0199e2cc91690ff59f

  • memory/2712-39242-0x0000000000400000-0x00000000005A5000-memory.dmp

    Filesize

    1.6MB

  • memory/2712-39245-0x0000000000400000-0x00000000005A5000-memory.dmp

    Filesize

    1.6MB

  • memory/2712-39243-0x0000000000400000-0x00000000005A5000-memory.dmp

    Filesize

    1.6MB

  • memory/2712-39246-0x0000000000400000-0x00000000005A5000-memory.dmp

    Filesize

    1.6MB

  • memory/2712-39241-0x0000000000400000-0x00000000005A5000-memory.dmp

    Filesize

    1.6MB

  • memory/2712-39240-0x0000000000400000-0x00000000005A5000-memory.dmp

    Filesize

    1.6MB

  • memory/2712-32054-0x0000000076C60000-0x0000000076CDA000-memory.dmp

    Filesize

    488KB

  • memory/2712-30044-0x0000000075E60000-0x0000000076000000-memory.dmp

    Filesize

    1.6MB

  • memory/2712-39247-0x0000000000400000-0x00000000005A5000-memory.dmp

    Filesize

    1.6MB

  • memory/2712-39265-0x0000000000400000-0x00000000005A5000-memory.dmp

    Filesize

    1.6MB

  • memory/2712-26170-0x0000000076160000-0x0000000076375000-memory.dmp

    Filesize

    2.1MB

  • memory/2872-31872-0x0000000000400000-0x00000000005A5000-memory.dmp

    Filesize

    1.6MB

  • memory/2872-13085-0x0000000076160000-0x0000000076375000-memory.dmp

    Filesize

    2.1MB

  • memory/2872-18969-0x0000000076C60000-0x0000000076CDA000-memory.dmp

    Filesize

    488KB

  • memory/2872-26155-0x0000000000400000-0x00000000005A5000-memory.dmp

    Filesize

    1.6MB

  • memory/2872-26156-0x0000000000400000-0x00000000005A5000-memory.dmp

    Filesize

    1.6MB

  • memory/2872-26157-0x0000000000400000-0x00000000005A5000-memory.dmp

    Filesize

    1.6MB

  • memory/2872-26158-0x0000000000400000-0x00000000005A5000-memory.dmp

    Filesize

    1.6MB

  • memory/2872-26160-0x0000000000400000-0x00000000005A5000-memory.dmp

    Filesize

    1.6MB

  • memory/2872-26161-0x0000000000400000-0x00000000005A5000-memory.dmp

    Filesize

    1.6MB

  • memory/2872-16960-0x0000000075E60000-0x0000000076000000-memory.dmp

    Filesize

    1.6MB

  • memory/4532-13072-0x0000000000400000-0x00000000005A5000-memory.dmp

    Filesize

    1.6MB

  • memory/4532-16959-0x0000000000400000-0x00000000005A5000-memory.dmp

    Filesize

    1.6MB

  • memory/4532-13076-0x0000000010000000-0x000000001002A000-memory.dmp

    Filesize

    168KB

  • memory/4532-0-0x0000000000400000-0x00000000005A5000-memory.dmp

    Filesize

    1.6MB

  • memory/4532-13075-0x0000000000400000-0x00000000005A5000-memory.dmp

    Filesize

    1.6MB

  • memory/4532-13074-0x0000000000400000-0x00000000005A5000-memory.dmp

    Filesize

    1.6MB

  • memory/4532-26169-0x0000000000400000-0x00000000005A5000-memory.dmp

    Filesize

    1.6MB

  • memory/4532-13071-0x0000000000400000-0x00000000005A5000-memory.dmp

    Filesize

    1.6MB

  • memory/4532-13070-0x0000000000400000-0x00000000005A5000-memory.dmp

    Filesize

    1.6MB

  • memory/4532-13069-0x0000000000400000-0x00000000005A5000-memory.dmp

    Filesize

    1.6MB

  • memory/4532-5884-0x0000000076C60000-0x0000000076CDA000-memory.dmp

    Filesize

    488KB

  • memory/4532-3875-0x0000000075E60000-0x0000000076000000-memory.dmp

    Filesize

    1.6MB

  • memory/4532-1-0x0000000076160000-0x0000000076375000-memory.dmp

    Filesize

    2.1MB