Resubmissions
29-11-2023 18:37
231129-w9nslsbf91 1029-11-2023 18:30
231129-w5nbaabf7s 1029-11-2023 18:23
231129-w1gmyabd85 7Analysis
-
max time kernel
49s -
platform
windows11-21h2_x64 -
resource
win11-20231128-en -
resource tags
arch:x64arch:x86image:win11-20231128-enlocale:en-usos:windows11-21h2-x64system -
submitted
29-11-2023 18:23
Static task
static1
Behavioral task
behavioral1
Sample
888 Rat v1.2.6.exe
Resource
win11-20231128-en
General
-
Target
888 Rat v1.2.6.exe
-
Size
75.0MB
-
MD5
ad33064a9ca95c5b3ed45c14b7fe2739
-
SHA1
0bd1286fa5fd936a31a4514798daffa444ce8e12
-
SHA256
5a14099abd6fe4b396094db7f9911251b25cd57893e14f97a7e7c5f44337bc98
-
SHA512
acb056e217edef4639179b24193a454f7e5aade51c1cc972e0458fc23c0ad982323161ad37050a4d849641dbf84719707efdcf4c99ecdf413381e5a752413647
-
SSDEEP
1572864:5mhnD+9mK/LnkHD1LYrXatfLllR3RboTmxXlIgU/cNruKPZiv:6nD+UozkJLYrXajR4ElIgU/c5Qv
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 3 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\aut9C84.tmp acprotect C:\Users\Admin\AppData\Local\Temp\skin.dll acprotect C:\Users\Admin\AppData\Local\Temp\skin.dll acprotect -
Loads dropped DLL 4 IoCs
Processes:
888 Rat v1.2.6.exepid process 3856 888 Rat v1.2.6.exe 3856 888 Rat v1.2.6.exe 3856 888 Rat v1.2.6.exe 3856 888 Rat v1.2.6.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\aut9C84.tmp upx C:\Users\Admin\AppData\Local\Temp\skin.dll upx C:\Users\Admin\AppData\Local\Temp\skin.dll upx behavioral1/memory/3856-44-0x000000000DE50000-0x000000000DF0B000-memory.dmp upx behavioral1/memory/3856-50-0x000000000DE50000-0x000000000DF0B000-memory.dmp upx behavioral1/memory/3856-90-0x000000000DE50000-0x000000000DF0B000-memory.dmp upx -
AutoIT Executable 11 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/3856-51-0x0000000000540000-0x000000000503D000-memory.dmp autoit_exe behavioral1/memory/3856-53-0x0000000000540000-0x000000000503D000-memory.dmp autoit_exe behavioral1/memory/3856-56-0x0000000000540000-0x000000000503D000-memory.dmp autoit_exe behavioral1/memory/3856-59-0x0000000000540000-0x000000000503D000-memory.dmp autoit_exe behavioral1/memory/3856-62-0x0000000000540000-0x000000000503D000-memory.dmp autoit_exe behavioral1/memory/3856-68-0x0000000000540000-0x000000000503D000-memory.dmp autoit_exe behavioral1/memory/3856-75-0x0000000000540000-0x000000000503D000-memory.dmp autoit_exe behavioral1/memory/3856-84-0x0000000000540000-0x000000000503D000-memory.dmp autoit_exe behavioral1/memory/3856-89-0x0000000000540000-0x000000000503D000-memory.dmp autoit_exe behavioral1/memory/3856-99-0x0000000000540000-0x000000000503D000-memory.dmp autoit_exe behavioral1/memory/3856-111-0x0000000000540000-0x000000000503D000-memory.dmp autoit_exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
888 Rat v1.2.6.exepid process 3856 888 Rat v1.2.6.exe 3856 888 Rat v1.2.6.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
888 Rat v1.2.6.exepid process 3856 888 Rat v1.2.6.exe 3856 888 Rat v1.2.6.exe 3856 888 Rat v1.2.6.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
888 Rat v1.2.6.exepid process 3856 888 Rat v1.2.6.exe 3856 888 Rat v1.2.6.exe 3856 888 Rat v1.2.6.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
888 Rat v1.2.6.exepid process 3856 888 Rat v1.2.6.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
239KB
MD529e1d5770184bf45139084bced50d306
SHA176c953cd86b013c3113f8495b656bd721be55e76
SHA256794987c4069286f797631f936c73b925c663c42d552aeca821106dfc7c7ba307
SHA5127cb3d0788978b6dc5a78f65349366dac3e91b1557efa4f385984bef4940b3ea859f75cfe42c71f6fe445555138f44305531de6a89c5beff4bf9d42001b4348e8
-
Filesize
3.3MB
MD5ea5d5266b8a7bcc8788c83ebb7c8c7d5
SHA13e9ac1ab7d5d54db9b3d141e82916513e572b415
SHA25691ac4d215b8d90aef9a000900c9088d4c33d58c5f35a720a385a3f2d2299e5d1
SHA512404b35fca478a1f489ec1af7be1df897190d7deb0cd8139c2c89d68c24fa377d904cf0c5e30c09ab448d74d87a47aaa3a872bf66a9bc9c124f52798320d34e60
-
Filesize
3.3MB
MD5ea5d5266b8a7bcc8788c83ebb7c8c7d5
SHA13e9ac1ab7d5d54db9b3d141e82916513e572b415
SHA25691ac4d215b8d90aef9a000900c9088d4c33d58c5f35a720a385a3f2d2299e5d1
SHA512404b35fca478a1f489ec1af7be1df897190d7deb0cd8139c2c89d68c24fa377d904cf0c5e30c09ab448d74d87a47aaa3a872bf66a9bc9c124f52798320d34e60
-
Filesize
239KB
MD529e1d5770184bf45139084bced50d306
SHA176c953cd86b013c3113f8495b656bd721be55e76
SHA256794987c4069286f797631f936c73b925c663c42d552aeca821106dfc7c7ba307
SHA5127cb3d0788978b6dc5a78f65349366dac3e91b1557efa4f385984bef4940b3ea859f75cfe42c71f6fe445555138f44305531de6a89c5beff4bf9d42001b4348e8
-
Filesize
239KB
MD529e1d5770184bf45139084bced50d306
SHA176c953cd86b013c3113f8495b656bd721be55e76
SHA256794987c4069286f797631f936c73b925c663c42d552aeca821106dfc7c7ba307
SHA5127cb3d0788978b6dc5a78f65349366dac3e91b1557efa4f385984bef4940b3ea859f75cfe42c71f6fe445555138f44305531de6a89c5beff4bf9d42001b4348e8