Analysis
-
max time kernel
121s -
max time network
162s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
07-11-2023 15:01
Behavioral task
behavioral1
Sample
7f39379d5a00823230db97e51a97994ba7eb7e653f70d5db7fdea809640bfbc0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
7f39379d5a00823230db97e51a97994ba7eb7e653f70d5db7fdea809640bfbc0.exe
Resource
win10v2004-20231020-en
General
-
Target
7f39379d5a00823230db97e51a97994ba7eb7e653f70d5db7fdea809640bfbc0.exe
-
Size
532KB
-
MD5
19f228f2b03012748f224bb8bb7b4982
-
SHA1
410bb016e57d520928c90ebea855569ea3f2bd9d
-
SHA256
7f39379d5a00823230db97e51a97994ba7eb7e653f70d5db7fdea809640bfbc0
-
SHA512
8319cae9045714e508928391f331597a8e7531dd11874478fd5c1d7da68849f94695f84e9322f350b9d3ce936e4432f59e4abc195fddc16b12014a24dc6cc9b0
-
SSDEEP
12288:9ZrM7Q5qzwjlEMbT7RwwWKpPu7uLXZBmA1:z4k5ucEM/2wWYaepV
Malware Config
Signatures
-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Fatal Rat payload 1 IoCs
resource yara_rule behavioral1/memory/1052-90-0x0000000010000000-0x000000001002A000-memory.dmp fatalrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ PTvrst.exe -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 2988 PTvrst.exe 2916 spolsvt.exe 1052 spolsvt.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Wine PTvrst.exe -
Loads dropped DLL 2 IoCs
pid Process 2988 PTvrst.exe 2916 spolsvt.exe -
resource yara_rule behavioral1/memory/1028-0-0x0000000000400000-0x000000000057E000-memory.dmp upx behavioral1/memory/1028-13-0x0000000000400000-0x000000000057E000-memory.dmp upx behavioral1/memory/1028-14-0x0000000000400000-0x000000000057E000-memory.dmp upx behavioral1/memory/1028-103-0x0000000000400000-0x000000000057E000-memory.dmp upx behavioral1/memory/1028-108-0x0000000000400000-0x000000000057E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Therecontinuous = "C:\\WINDOWS\\DNomb\\PTvrst.exe" PTvrst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ϵͳ×é¼þ = "C:\\Users\\Public\\Documents\\123\\PTvrst.exe" spolsvt.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2988 PTvrst.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2988 set thread context of 2916 2988 PTvrst.exe 31 PID 2916 set thread context of 1052 2916 spolsvt.exe 32 -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\DNomb\spolsvt.exe 7f39379d5a00823230db97e51a97994ba7eb7e653f70d5db7fdea809640bfbc0.exe File created C:\Windows\DNomb\Mpec.mbt 7f39379d5a00823230db97e51a97994ba7eb7e653f70d5db7fdea809640bfbc0.exe File opened for modification C:\Windows\DNomb\Mpec.mbt 7f39379d5a00823230db97e51a97994ba7eb7e653f70d5db7fdea809640bfbc0.exe File created C:\Windows\DNomb\PTvrst.exe 7f39379d5a00823230db97e51a97994ba7eb7e653f70d5db7fdea809640bfbc0.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 spolsvt.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz spolsvt.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1028 7f39379d5a00823230db97e51a97994ba7eb7e653f70d5db7fdea809640bfbc0.exe 1028 7f39379d5a00823230db97e51a97994ba7eb7e653f70d5db7fdea809640bfbc0.exe 1028 7f39379d5a00823230db97e51a97994ba7eb7e653f70d5db7fdea809640bfbc0.exe 1028 7f39379d5a00823230db97e51a97994ba7eb7e653f70d5db7fdea809640bfbc0.exe 1028 7f39379d5a00823230db97e51a97994ba7eb7e653f70d5db7fdea809640bfbc0.exe 1028 7f39379d5a00823230db97e51a97994ba7eb7e653f70d5db7fdea809640bfbc0.exe 1028 7f39379d5a00823230db97e51a97994ba7eb7e653f70d5db7fdea809640bfbc0.exe 1028 7f39379d5a00823230db97e51a97994ba7eb7e653f70d5db7fdea809640bfbc0.exe 2988 PTvrst.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 1052 spolsvt.exe 2916 spolsvt.exe 2916 spolsvt.exe 1028 7f39379d5a00823230db97e51a97994ba7eb7e653f70d5db7fdea809640bfbc0.exe 1028 7f39379d5a00823230db97e51a97994ba7eb7e653f70d5db7fdea809640bfbc0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1052 spolsvt.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1028 7f39379d5a00823230db97e51a97994ba7eb7e653f70d5db7fdea809640bfbc0.exe 1028 7f39379d5a00823230db97e51a97994ba7eb7e653f70d5db7fdea809640bfbc0.exe 2988 PTvrst.exe 2988 PTvrst.exe 2916 spolsvt.exe 2916 spolsvt.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2916 2988 PTvrst.exe 31 PID 2988 wrote to memory of 2916 2988 PTvrst.exe 31 PID 2988 wrote to memory of 2916 2988 PTvrst.exe 31 PID 2988 wrote to memory of 2916 2988 PTvrst.exe 31 PID 2988 wrote to memory of 2916 2988 PTvrst.exe 31 PID 2988 wrote to memory of 2916 2988 PTvrst.exe 31 PID 2988 wrote to memory of 2916 2988 PTvrst.exe 31 PID 2988 wrote to memory of 2916 2988 PTvrst.exe 31 PID 2988 wrote to memory of 2916 2988 PTvrst.exe 31 PID 2988 wrote to memory of 2916 2988 PTvrst.exe 31 PID 2988 wrote to memory of 2916 2988 PTvrst.exe 31 PID 2988 wrote to memory of 2916 2988 PTvrst.exe 31 PID 2988 wrote to memory of 2916 2988 PTvrst.exe 31 PID 2916 wrote to memory of 1052 2916 spolsvt.exe 32 PID 2916 wrote to memory of 1052 2916 spolsvt.exe 32 PID 2916 wrote to memory of 1052 2916 spolsvt.exe 32 PID 2916 wrote to memory of 1052 2916 spolsvt.exe 32 PID 2916 wrote to memory of 1052 2916 spolsvt.exe 32 PID 2916 wrote to memory of 1052 2916 spolsvt.exe 32 PID 2916 wrote to memory of 1052 2916 spolsvt.exe 32 PID 2916 wrote to memory of 1052 2916 spolsvt.exe 32 PID 2916 wrote to memory of 1052 2916 spolsvt.exe 32 PID 2916 wrote to memory of 1052 2916 spolsvt.exe 32 PID 2916 wrote to memory of 1052 2916 spolsvt.exe 32 PID 2916 wrote to memory of 1052 2916 spolsvt.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f39379d5a00823230db97e51a97994ba7eb7e653f70d5db7fdea809640bfbc0.exe"C:\Users\Admin\AppData\Local\Temp\7f39379d5a00823230db97e51a97994ba7eb7e653f70d5db7fdea809640bfbc0.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1028
-
C:\Users\Public\Documents\123\PTvrst.exe"C:\Users\Public\Documents\123\PTvrst.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\WINDOWS\DNomb\spolsvt.exeC:\WINDOWS\DNomb\spolsvt.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Public\Documents\t\spolsvt.exeC:\Users\Public\Documents\t\spolsvt.exe3⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1052
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5d22cfb5bfaeb1503b12b07e53ef0a149
SHA18ea2c85e363f551a159fabd65377affed4e417a1
SHA256260464fb05210cfb30ef7a12d568f75eb781634b251d958cae8911948f6ca360
SHA512151024cb2960b1ee485ded7ccbb753fe368a93fda5699af72e568667fa54bfb0d1732444e7b60efaab6d372204157cdb6abbf8862d0e89d612dd963342215e45
-
Filesize
1.2MB
MD5d22cfb5bfaeb1503b12b07e53ef0a149
SHA18ea2c85e363f551a159fabd65377affed4e417a1
SHA256260464fb05210cfb30ef7a12d568f75eb781634b251d958cae8911948f6ca360
SHA512151024cb2960b1ee485ded7ccbb753fe368a93fda5699af72e568667fa54bfb0d1732444e7b60efaab6d372204157cdb6abbf8862d0e89d612dd963342215e45
-
Filesize
16KB
MD5cdce4713e784ae069d73723034a957ff
SHA19a393a6bab6568f1a774fb753353223f11367e09
SHA256b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8
SHA5120a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f
-
Filesize
16KB
MD5cdce4713e784ae069d73723034a957ff
SHA19a393a6bab6568f1a774fb753353223f11367e09
SHA256b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8
SHA5120a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f
-
Filesize
488KB
MD52574fda691d172cbc388ecf8519946b1
SHA1b2026e000ba42db4339810a9cd6e166cbba0ffa0
SHA25657dc57a72f09c0e9d9b3b98102fbcd2c7ff8f276b4f02832b300430bfebaa38c
SHA51267c51cb0da666f2ec0810a0a27a8ca1c43a767f0d5a7b42474d383a1be926264645552af466393eb7a51ccd2d02033c3ddc7feb8f2d00a2db7a7f494e144ab1a
-
Filesize
9KB
MD5523d5c39f9d8d2375c3df68251fa2249
SHA1d4ed365c44bec9246fc1a65a32a7791792647a10
SHA25620e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78
SHA512526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4
-
Filesize
9KB
MD5523d5c39f9d8d2375c3df68251fa2249
SHA1d4ed365c44bec9246fc1a65a32a7791792647a10
SHA25620e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78
SHA512526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4
-
Filesize
16KB
MD5cdce4713e784ae069d73723034a957ff
SHA19a393a6bab6568f1a774fb753353223f11367e09
SHA256b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8
SHA5120a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f
-
Filesize
9KB
MD5523d5c39f9d8d2375c3df68251fa2249
SHA1d4ed365c44bec9246fc1a65a32a7791792647a10
SHA25620e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78
SHA512526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4