Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-10-2023 11:43

General

  • Target

    7225a15c6afbbaf5476f3289f6b161fc543c4b981d72997ca182ae830bbde318.exe

  • Size

    2.1MB

  • MD5

    724c2a51739b5aba9cffb7e1358b5af3

  • SHA1

    b9e86b7126279b617d0ce6bd84772033b953ef5f

  • SHA256

    7225a15c6afbbaf5476f3289f6b161fc543c4b981d72997ca182ae830bbde318

  • SHA512

    f289f2a6b8b72d2a8f2ae03d00793f489b17254dcc9dbb11a59971991f188bcb87467b6b996e56a18f697ae46f326fe953125b42a53176c2581f2b0d453f890d

  • SSDEEP

    49152:tVef8NffIPbIQ09ufo9m8QCFwyL5FfJel7x1g82T9NlJbGP/m:tVQUIjo9FWIZJerl2+P/m

Malware Config

Signatures

  • FatalRat

    FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

  • Fatal Rat payload 5 IoCs
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 13 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 30 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7225a15c6afbbaf5476f3289f6b161fc543c4b981d72997ca182ae830bbde318.exe
    "C:\Users\Admin\AppData\Local\Temp\7225a15c6afbbaf5476f3289f6b161fc543c4b981d72997ca182ae830bbde318.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Program Files directory
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    PID:3240
  • C:\Program Files (x86)\BitBrowser.exe
    "C:\Program Files (x86)\BitBrowser.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4756
    • C:\Program Files (x86)\BitBrowser.exe
      "C:\Program Files (x86)\BitBrowser.exe" Win7
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Program Files directory
      • Checks processor information in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2212

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\BitBrowser.exe

    Filesize

    2.1MB

    MD5

    724c2a51739b5aba9cffb7e1358b5af3

    SHA1

    b9e86b7126279b617d0ce6bd84772033b953ef5f

    SHA256

    7225a15c6afbbaf5476f3289f6b161fc543c4b981d72997ca182ae830bbde318

    SHA512

    f289f2a6b8b72d2a8f2ae03d00793f489b17254dcc9dbb11a59971991f188bcb87467b6b996e56a18f697ae46f326fe953125b42a53176c2581f2b0d453f890d

  • C:\Program Files (x86)\BitBrowser.exe

    Filesize

    2.1MB

    MD5

    724c2a51739b5aba9cffb7e1358b5af3

    SHA1

    b9e86b7126279b617d0ce6bd84772033b953ef5f

    SHA256

    7225a15c6afbbaf5476f3289f6b161fc543c4b981d72997ca182ae830bbde318

    SHA512

    f289f2a6b8b72d2a8f2ae03d00793f489b17254dcc9dbb11a59971991f188bcb87467b6b996e56a18f697ae46f326fe953125b42a53176c2581f2b0d453f890d

  • C:\Program Files (x86)\BitBrowser.exe

    Filesize

    2.1MB

    MD5

    724c2a51739b5aba9cffb7e1358b5af3

    SHA1

    b9e86b7126279b617d0ce6bd84772033b953ef5f

    SHA256

    7225a15c6afbbaf5476f3289f6b161fc543c4b981d72997ca182ae830bbde318

    SHA512

    f289f2a6b8b72d2a8f2ae03d00793f489b17254dcc9dbb11a59971991f188bcb87467b6b996e56a18f697ae46f326fe953125b42a53176c2581f2b0d453f890d

  • memory/2212-39238-0x0000000000400000-0x000000000081F000-memory.dmp

    Filesize

    4.1MB

  • memory/2212-39240-0x0000000000400000-0x000000000081F000-memory.dmp

    Filesize

    4.1MB

  • memory/2212-39239-0x0000000000400000-0x000000000081F000-memory.dmp

    Filesize

    4.1MB

  • memory/2212-39242-0x0000000000400000-0x000000000081F000-memory.dmp

    Filesize

    4.1MB

  • memory/2212-39237-0x0000000000400000-0x000000000081F000-memory.dmp

    Filesize

    4.1MB

  • memory/2212-32051-0x0000000076AC0000-0x0000000076B3A000-memory.dmp

    Filesize

    488KB

  • memory/2212-30042-0x0000000076D80000-0x0000000076F20000-memory.dmp

    Filesize

    1.6MB

  • memory/2212-26168-0x00000000768A0000-0x0000000076AB5000-memory.dmp

    Filesize

    2.1MB

  • memory/2212-39243-0x0000000000400000-0x000000000081F000-memory.dmp

    Filesize

    4.1MB

  • memory/2212-39260-0x0000000000400000-0x000000000081F000-memory.dmp

    Filesize

    4.1MB

  • memory/2212-26167-0x0000000000400000-0x000000000081F000-memory.dmp

    Filesize

    4.1MB

  • memory/3240-13075-0x0000000000400000-0x000000000081F000-memory.dmp

    Filesize

    4.1MB

  • memory/3240-13071-0x0000000000400000-0x000000000081F000-memory.dmp

    Filesize

    4.1MB

  • memory/3240-39266-0x0000000000400000-0x000000000081F000-memory.dmp

    Filesize

    4.1MB

  • memory/3240-1-0x00000000768A0000-0x0000000076AB5000-memory.dmp

    Filesize

    2.1MB

  • memory/3240-3875-0x0000000076D80000-0x0000000076F20000-memory.dmp

    Filesize

    1.6MB

  • memory/3240-5884-0x0000000076AC0000-0x0000000076B3A000-memory.dmp

    Filesize

    488KB

  • memory/3240-13069-0x0000000000400000-0x000000000081F000-memory.dmp

    Filesize

    4.1MB

  • memory/3240-13070-0x0000000000400000-0x000000000081F000-memory.dmp

    Filesize

    4.1MB

  • memory/3240-13072-0x0000000000400000-0x000000000081F000-memory.dmp

    Filesize

    4.1MB

  • memory/3240-14791-0x0000000000400000-0x000000000081F000-memory.dmp

    Filesize

    4.1MB

  • memory/3240-13074-0x0000000000400000-0x000000000081F000-memory.dmp

    Filesize

    4.1MB

  • memory/3240-13076-0x0000000010000000-0x000000001002A000-memory.dmp

    Filesize

    168KB

  • memory/3240-0-0x0000000000400000-0x000000000081F000-memory.dmp

    Filesize

    4.1MB

  • memory/4756-13084-0x00000000768A0000-0x0000000076AB5000-memory.dmp

    Filesize

    2.1MB

  • memory/4756-32255-0x0000000000400000-0x000000000081F000-memory.dmp

    Filesize

    4.1MB

  • memory/4756-26160-0x0000000000400000-0x000000000081F000-memory.dmp

    Filesize

    4.1MB

  • memory/4756-16959-0x0000000076D80000-0x0000000076F20000-memory.dmp

    Filesize

    1.6MB

  • memory/4756-26159-0x0000000000400000-0x000000000081F000-memory.dmp

    Filesize

    4.1MB

  • memory/4756-26156-0x0000000000400000-0x000000000081F000-memory.dmp

    Filesize

    4.1MB

  • memory/4756-26155-0x0000000000400000-0x000000000081F000-memory.dmp

    Filesize

    4.1MB

  • memory/4756-26154-0x0000000000400000-0x000000000081F000-memory.dmp

    Filesize

    4.1MB

  • memory/4756-26153-0x0000000000400000-0x000000000081F000-memory.dmp

    Filesize

    4.1MB

  • memory/4756-18968-0x0000000076AC0000-0x0000000076B3A000-memory.dmp

    Filesize

    488KB