Analysis

  • max time kernel
    121s
  • max time network
    162s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    07-11-2023 15:01

General

  • Target

    7f39379d5a00823230db97e51a97994ba7eb7e653f70d5db7fdea809640bfbc0.exe

  • Size

    532KB

  • MD5

    19f228f2b03012748f224bb8bb7b4982

  • SHA1

    410bb016e57d520928c90ebea855569ea3f2bd9d

  • SHA256

    7f39379d5a00823230db97e51a97994ba7eb7e653f70d5db7fdea809640bfbc0

  • SHA512

    8319cae9045714e508928391f331597a8e7531dd11874478fd5c1d7da68849f94695f84e9322f350b9d3ce936e4432f59e4abc195fddc16b12014a24dc6cc9b0

  • SSDEEP

    12288:9ZrM7Q5qzwjlEMbT7RwwWKpPu7uLXZBmA1:z4k5ucEM/2wWYaepV

Malware Config

Signatures

  • FatalRat

    FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

  • Fatal Rat payload 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7f39379d5a00823230db97e51a97994ba7eb7e653f70d5db7fdea809640bfbc0.exe
    "C:\Users\Admin\AppData\Local\Temp\7f39379d5a00823230db97e51a97994ba7eb7e653f70d5db7fdea809640bfbc0.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1028
  • C:\Users\Public\Documents\123\PTvrst.exe
    "C:\Users\Public\Documents\123\PTvrst.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2988
    • C:\WINDOWS\DNomb\spolsvt.exe
      C:\WINDOWS\DNomb\spolsvt.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2916
      • C:\Users\Public\Documents\t\spolsvt.exe
        C:\Users\Public\Documents\t\spolsvt.exe
        3⤵
        • Executes dropped EXE
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Public\Documents\123\PTvrst.exe

    Filesize

    1.2MB

    MD5

    d22cfb5bfaeb1503b12b07e53ef0a149

    SHA1

    8ea2c85e363f551a159fabd65377affed4e417a1

    SHA256

    260464fb05210cfb30ef7a12d568f75eb781634b251d958cae8911948f6ca360

    SHA512

    151024cb2960b1ee485ded7ccbb753fe368a93fda5699af72e568667fa54bfb0d1732444e7b60efaab6d372204157cdb6abbf8862d0e89d612dd963342215e45

  • C:\Users\Public\Documents\123\PTvrst.exe

    Filesize

    1.2MB

    MD5

    d22cfb5bfaeb1503b12b07e53ef0a149

    SHA1

    8ea2c85e363f551a159fabd65377affed4e417a1

    SHA256

    260464fb05210cfb30ef7a12d568f75eb781634b251d958cae8911948f6ca360

    SHA512

    151024cb2960b1ee485ded7ccbb753fe368a93fda5699af72e568667fa54bfb0d1732444e7b60efaab6d372204157cdb6abbf8862d0e89d612dd963342215e45

  • C:\Users\Public\Documents\t\spolsvt.exe

    Filesize

    16KB

    MD5

    cdce4713e784ae069d73723034a957ff

    SHA1

    9a393a6bab6568f1a774fb753353223f11367e09

    SHA256

    b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8

    SHA512

    0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

  • C:\Users\Public\Documents\t\spolsvt.exe

    Filesize

    16KB

    MD5

    cdce4713e784ae069d73723034a957ff

    SHA1

    9a393a6bab6568f1a774fb753353223f11367e09

    SHA256

    b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8

    SHA512

    0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

  • C:\WINDOWS\DNomb\Mpec.mbt

    Filesize

    488KB

    MD5

    2574fda691d172cbc388ecf8519946b1

    SHA1

    b2026e000ba42db4339810a9cd6e166cbba0ffa0

    SHA256

    57dc57a72f09c0e9d9b3b98102fbcd2c7ff8f276b4f02832b300430bfebaa38c

    SHA512

    67c51cb0da666f2ec0810a0a27a8ca1c43a767f0d5a7b42474d383a1be926264645552af466393eb7a51ccd2d02033c3ddc7feb8f2d00a2db7a7f494e144ab1a

  • C:\WINDOWS\DNomb\spolsvt.exe

    Filesize

    9KB

    MD5

    523d5c39f9d8d2375c3df68251fa2249

    SHA1

    d4ed365c44bec9246fc1a65a32a7791792647a10

    SHA256

    20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

    SHA512

    526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

  • C:\Windows\DNomb\spolsvt.exe

    Filesize

    9KB

    MD5

    523d5c39f9d8d2375c3df68251fa2249

    SHA1

    d4ed365c44bec9246fc1a65a32a7791792647a10

    SHA256

    20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

    SHA512

    526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

  • \Users\Public\Documents\t\spolsvt.exe

    Filesize

    16KB

    MD5

    cdce4713e784ae069d73723034a957ff

    SHA1

    9a393a6bab6568f1a774fb753353223f11367e09

    SHA256

    b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8

    SHA512

    0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

  • \Windows\DNomb\spolsvt.exe

    Filesize

    9KB

    MD5

    523d5c39f9d8d2375c3df68251fa2249

    SHA1

    d4ed365c44bec9246fc1a65a32a7791792647a10

    SHA256

    20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

    SHA512

    526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

  • memory/1028-108-0x0000000000400000-0x000000000057E000-memory.dmp

    Filesize

    1.5MB

  • memory/1028-103-0x0000000000400000-0x000000000057E000-memory.dmp

    Filesize

    1.5MB

  • memory/1028-14-0x0000000000400000-0x000000000057E000-memory.dmp

    Filesize

    1.5MB

  • memory/1028-13-0x0000000000400000-0x000000000057E000-memory.dmp

    Filesize

    1.5MB

  • memory/1028-0-0x0000000000400000-0x000000000057E000-memory.dmp

    Filesize

    1.5MB

  • memory/1052-85-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1052-89-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/1052-73-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/1052-75-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/1052-84-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/1052-90-0x0000000010000000-0x000000001002A000-memory.dmp

    Filesize

    168KB

  • memory/1052-80-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/1052-77-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2916-60-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2916-56-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/2916-53-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/2916-50-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/2916-47-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/2916-45-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/2916-59-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/2916-64-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/2988-37-0x0000000004380000-0x0000000004381000-memory.dmp

    Filesize

    4KB

  • memory/2988-44-0x00000000021F0000-0x00000000021F1000-memory.dmp

    Filesize

    4KB

  • memory/2988-38-0x0000000000400000-0x00000000006A2000-memory.dmp

    Filesize

    2.6MB

  • memory/2988-40-0x0000000004370000-0x0000000004371000-memory.dmp

    Filesize

    4KB

  • memory/2988-39-0x0000000004290000-0x0000000004291000-memory.dmp

    Filesize

    4KB

  • memory/2988-20-0x0000000004310000-0x0000000004311000-memory.dmp

    Filesize

    4KB

  • memory/2988-21-0x00000000041D0000-0x00000000041D1000-memory.dmp

    Filesize

    4KB

  • memory/2988-22-0x00000000042A0000-0x00000000042A1000-memory.dmp

    Filesize

    4KB

  • memory/2988-23-0x0000000004270000-0x0000000004271000-memory.dmp

    Filesize

    4KB

  • memory/2988-24-0x0000000004300000-0x0000000004301000-memory.dmp

    Filesize

    4KB

  • memory/2988-25-0x00000000042F0000-0x00000000042F1000-memory.dmp

    Filesize

    4KB

  • memory/2988-26-0x0000000004200000-0x0000000004201000-memory.dmp

    Filesize

    4KB

  • memory/2988-27-0x00000000042E0000-0x00000000042E2000-memory.dmp

    Filesize

    8KB

  • memory/2988-34-0x00000000021E0000-0x00000000021E1000-memory.dmp

    Filesize

    4KB

  • memory/2988-35-0x00000000042C0000-0x00000000042C1000-memory.dmp

    Filesize

    4KB

  • memory/2988-36-0x0000000004350000-0x0000000004351000-memory.dmp

    Filesize

    4KB

  • memory/2988-29-0x0000000004070000-0x0000000004071000-memory.dmp

    Filesize

    4KB

  • memory/2988-28-0x00000000041F0000-0x00000000041F1000-memory.dmp

    Filesize

    4KB

  • memory/2988-31-0x00000000042D0000-0x00000000042D1000-memory.dmp

    Filesize

    4KB

  • memory/2988-32-0x00000000042B0000-0x00000000042B1000-memory.dmp

    Filesize

    4KB

  • memory/2988-30-0x0000000004280000-0x0000000004281000-memory.dmp

    Filesize

    4KB

  • memory/2988-33-0x0000000004320000-0x0000000004321000-memory.dmp

    Filesize

    4KB

  • memory/2988-99-0x0000000000400000-0x00000000006A2000-memory.dmp

    Filesize

    2.6MB

  • memory/2988-18-0x0000000077190000-0x0000000077192000-memory.dmp

    Filesize

    8KB

  • memory/2988-16-0x0000000000400000-0x00000000006A2000-memory.dmp

    Filesize

    2.6MB