Analysis

  • max time kernel
    155s
  • max time network
    176s
  • platform
    windows10-1703_x64
  • resource
    win10-20230915-en
  • resource tags

    arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system
  • submitted
    20/10/2023, 10:33

General

  • Target

    美洽6.9.7.exe

  • Size

    76.8MB

  • MD5

    f906902a7970d66ec823444808fb8610

  • SHA1

    e352be78393bc978041d8923f72d74b9e53c0a1d

  • SHA256

    e2da625d78cd27f539bd21dbfcbf1f12c3dab7320342bc5168c8d25cf665033c

  • SHA512

    992b6c0dcc8911e5f12b3b42a9c439654cc7ff5a795398da25c56419d34a1ec4361e54c8e637552e2c98c109c6379ce2f1b95994ce7c4ceebd7db45efe9af02b

  • SSDEEP

    1572864:yIC/ls2gHnOvm83ucVTyy9G6nqsDuXgsj2DarbpDNny3AGtoV8:A+vWf3tVTy9ApsCerbFRywNV8

Malware Config

Signatures

  • FatalRat

    FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

  • Gh0st RAT payload 3 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Fatal Rat payload 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\美洽6.9.7.exe
    "C:\Users\Admin\AppData\Local\Temp\美洽6.9.7.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1288
    • C:\Program Files (x86)\a3.exe
      "C:\Program Files (x86)\a3.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4180
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4216
    • C:\Users\Public\Documents\123\PTvrst.exe
      "C:\Users\Public\Documents\123\PTvrst.exe"
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:5052
      • C:\WINDOWS\DNomb\spolsvt.exe
        C:\WINDOWS\DNomb\spolsvt.exe
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4232
        • C:\Users\Public\Documents\t\spolsvt.exe
          C:\Users\Public\Documents\t\spolsvt.exe
          3⤵
          • Executes dropped EXE
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3792

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\a3.exe

      Filesize

      4.5MB

      MD5

      aa08859dc29edbf17138f7eb5088bd35

      SHA1

      99e2c0373a288b90d1528e37f43436e6746a5e62

      SHA256

      10aa0c53566887d4fb60734102b02cd546d7b46769b2a1217ebc59572b55538b

      SHA512

      23cd2d6c540bf916d0afca9a53d10d90c714e095e67faa6688110f9207dd243857f36a299210c4bf0ba16491fbd48627d6783339f576ee2124c5f4edb0b865d1

    • C:\Program Files (x86)\a3.exe

      Filesize

      4.5MB

      MD5

      aa08859dc29edbf17138f7eb5088bd35

      SHA1

      99e2c0373a288b90d1528e37f43436e6746a5e62

      SHA256

      10aa0c53566887d4fb60734102b02cd546d7b46769b2a1217ebc59572b55538b

      SHA512

      23cd2d6c540bf916d0afca9a53d10d90c714e095e67faa6688110f9207dd243857f36a299210c4bf0ba16491fbd48627d6783339f576ee2124c5f4edb0b865d1

    • C:\Users\Public\Documents\123\PTvrst.exe

      Filesize

      1.2MB

      MD5

      d22cfb5bfaeb1503b12b07e53ef0a149

      SHA1

      8ea2c85e363f551a159fabd65377affed4e417a1

      SHA256

      260464fb05210cfb30ef7a12d568f75eb781634b251d958cae8911948f6ca360

      SHA512

      151024cb2960b1ee485ded7ccbb753fe368a93fda5699af72e568667fa54bfb0d1732444e7b60efaab6d372204157cdb6abbf8862d0e89d612dd963342215e45

    • C:\Users\Public\Documents\123\PTvrst.exe

      Filesize

      1.2MB

      MD5

      d22cfb5bfaeb1503b12b07e53ef0a149

      SHA1

      8ea2c85e363f551a159fabd65377affed4e417a1

      SHA256

      260464fb05210cfb30ef7a12d568f75eb781634b251d958cae8911948f6ca360

      SHA512

      151024cb2960b1ee485ded7ccbb753fe368a93fda5699af72e568667fa54bfb0d1732444e7b60efaab6d372204157cdb6abbf8862d0e89d612dd963342215e45

    • C:\Users\Public\Documents\t\spolsvt.exe

      Filesize

      16KB

      MD5

      cdce4713e784ae069d73723034a957ff

      SHA1

      9a393a6bab6568f1a774fb753353223f11367e09

      SHA256

      b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8

      SHA512

      0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

    • C:\Users\Public\Documents\t\spolsvt.exe

      Filesize

      16KB

      MD5

      cdce4713e784ae069d73723034a957ff

      SHA1

      9a393a6bab6568f1a774fb753353223f11367e09

      SHA256

      b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8

      SHA512

      0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

    • C:\WINDOWS\DNomb\Mpec.mbt

      Filesize

      488KB

      MD5

      b080a7a33830f264ce71c2d4fc6cbed5

      SHA1

      3e2ac32e40441a059f24cb1bec27c1ef533641ae

      SHA256

      490acedca10ec4e45ca5cc26fcaf49f40358ae3edd413597cecccaab801ff982

      SHA512

      2d424f0901af4d787aaa2f8319de174ef3b386848bca3e72279f567d329afc570007680f54b551f5072c996a7323062ba1aaa3a04a54786dc6791660587f9c6b

    • C:\WINDOWS\DNomb\spolsvt.exe

      Filesize

      9KB

      MD5

      523d5c39f9d8d2375c3df68251fa2249

      SHA1

      d4ed365c44bec9246fc1a65a32a7791792647a10

      SHA256

      20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

      SHA512

      526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

    • C:\Windows\DNomb\spolsvt.exe

      Filesize

      9KB

      MD5

      523d5c39f9d8d2375c3df68251fa2249

      SHA1

      d4ed365c44bec9246fc1a65a32a7791792647a10

      SHA256

      20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

      SHA512

      526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

    • memory/1288-85-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1288-86-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1288-0-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1288-22-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/3792-75-0x0000000010000000-0x000000001002A000-memory.dmp

      Filesize

      168KB

    • memory/3792-69-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3792-68-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3792-70-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3792-92-0x0000000003070000-0x00000000031BD000-memory.dmp

      Filesize

      1.3MB

    • memory/3792-90-0x0000000003070000-0x00000000031BD000-memory.dmp

      Filesize

      1.3MB

    • memory/3792-91-0x0000000003070000-0x00000000031BD000-memory.dmp

      Filesize

      1.3MB

    • memory/3792-87-0x0000000003070000-0x00000000031BD000-memory.dmp

      Filesize

      1.3MB

    • memory/3792-74-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4180-15-0x0000000002AC0000-0x0000000002AC1000-memory.dmp

      Filesize

      4KB

    • memory/4180-81-0x0000000000400000-0x0000000000C01000-memory.dmp

      Filesize

      8.0MB

    • memory/4180-14-0x0000000001390000-0x0000000001391000-memory.dmp

      Filesize

      4KB

    • memory/4180-16-0x0000000002AD0000-0x0000000002AD1000-memory.dmp

      Filesize

      4KB

    • memory/4180-12-0x0000000001370000-0x0000000001371000-memory.dmp

      Filesize

      4KB

    • memory/4180-13-0x0000000001380000-0x0000000001381000-memory.dmp

      Filesize

      4KB

    • memory/4180-17-0x0000000002AE0000-0x0000000002AE1000-memory.dmp

      Filesize

      4KB

    • memory/4180-25-0x0000000000400000-0x0000000000C01000-memory.dmp

      Filesize

      8.0MB

    • memory/4180-18-0x0000000000400000-0x0000000000C01000-memory.dmp

      Filesize

      8.0MB

    • memory/4180-11-0x00000000001F0000-0x00000000001F1000-memory.dmp

      Filesize

      4KB

    • memory/4180-10-0x0000000000400000-0x0000000000C01000-memory.dmp

      Filesize

      8.0MB

    • memory/4180-9-0x0000000000400000-0x0000000000C01000-memory.dmp

      Filesize

      8.0MB

    • memory/4232-62-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/4232-55-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/4232-63-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/4232-58-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/4232-56-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/4232-57-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/5052-43-0x00000000048F0000-0x00000000048F1000-memory.dmp

      Filesize

      4KB

    • memory/5052-40-0x0000000004780000-0x0000000004781000-memory.dmp

      Filesize

      4KB

    • memory/5052-52-0x0000000004880000-0x0000000004882000-memory.dmp

      Filesize

      8KB

    • memory/5052-51-0x0000000000400000-0x00000000006A2000-memory.dmp

      Filesize

      2.6MB

    • memory/5052-49-0x0000000004840000-0x0000000004842000-memory.dmp

      Filesize

      8KB

    • memory/5052-45-0x0000000004920000-0x0000000004921000-memory.dmp

      Filesize

      4KB

    • memory/5052-46-0x0000000004930000-0x0000000004931000-memory.dmp

      Filesize

      4KB

    • memory/5052-44-0x0000000004890000-0x0000000004891000-memory.dmp

      Filesize

      4KB

    • memory/5052-50-0x0000000004910000-0x0000000004911000-memory.dmp

      Filesize

      4KB

    • memory/5052-48-0x0000000004A70000-0x0000000004A72000-memory.dmp

      Filesize

      8KB

    • memory/5052-42-0x00000000047F0000-0x00000000047F1000-memory.dmp

      Filesize

      4KB

    • memory/5052-47-0x0000000004770000-0x0000000004771000-memory.dmp

      Filesize

      4KB

    • memory/5052-41-0x00000000047A0000-0x00000000047A1000-memory.dmp

      Filesize

      4KB

    • memory/5052-37-0x00000000047B0000-0x00000000047B1000-memory.dmp

      Filesize

      4KB

    • memory/5052-39-0x0000000004720000-0x0000000004721000-memory.dmp

      Filesize

      4KB

    • memory/5052-38-0x00000000047D0000-0x00000000047D1000-memory.dmp

      Filesize

      4KB

    • memory/5052-80-0x0000000000400000-0x00000000006A2000-memory.dmp

      Filesize

      2.6MB

    • memory/5052-34-0x0000000004790000-0x0000000004791000-memory.dmp

      Filesize

      4KB

    • memory/5052-35-0x0000000004760000-0x0000000004761000-memory.dmp

      Filesize

      4KB

    • memory/5052-36-0x0000000004740000-0x0000000004741000-memory.dmp

      Filesize

      4KB

    • memory/5052-33-0x0000000004730000-0x0000000004731000-memory.dmp

      Filesize

      4KB

    • memory/5052-32-0x00000000047C0000-0x00000000047C1000-memory.dmp

      Filesize

      4KB

    • memory/5052-31-0x00000000770B4000-0x00000000770B5000-memory.dmp

      Filesize

      4KB

    • memory/5052-29-0x0000000000400000-0x00000000006A2000-memory.dmp

      Filesize

      2.6MB