Analysis
-
max time kernel
1s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231130-en -
resource tags
arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2023 17:11
Static task
static1
Behavioral task
behavioral1
Sample
ece2049bf1201a5b0f7a6920b95bef4773683e523eddc5dd38d1bdd4c7515258.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
ece2049bf1201a5b0f7a6920b95bef4773683e523eddc5dd38d1bdd4c7515258.exe
Resource
win10v2004-20231130-en
General
-
Target
ece2049bf1201a5b0f7a6920b95bef4773683e523eddc5dd38d1bdd4c7515258.exe
-
Size
2.7MB
-
MD5
f4fb0391754cab22b08d5c518a57268d
-
SHA1
8d443fbb04a81b053c117e66bc6a069fcc2b1b87
-
SHA256
ece2049bf1201a5b0f7a6920b95bef4773683e523eddc5dd38d1bdd4c7515258
-
SHA512
8c2dd062374436c85ce698e7463f6d27f6652d0082aa3bd6637340abd132430fd408e19909af6f0eb84011e2d7d51ad6f9feb302591ce2a8fd9887b73f52b3df
-
SSDEEP
49152:dLY5etGvnVEAjHWgYGe7dquNGAnOtNmpHdHEIyQrZX6uaMmS83/VcYpD/UVJ1Bcx:G0tGvnVhHWgYGoquNLnOtNmpHdk4X6us
Malware Config
Signatures
-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Fatal Rat payload 2 IoCs
resource yara_rule behavioral2/memory/4320-30-0x0000000000D80000-0x0000000000DAA000-memory.dmp fatalrat behavioral2/memory/4972-53-0x0000000000D70000-0x0000000000D9A000-memory.dmp fatalrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-433534792-1200107535-3148087551-1000\Control Panel\International\Geo\Nation ece2049bf1201a5b0f7a6920b95bef4773683e523eddc5dd38d1bdd4c7515258.exe -
Executes dropped EXE 1 IoCs
pid Process 4320 QQMicroGameBox.exe -
Loads dropped DLL 1 IoCs
pid Process 4320 QQMicroGameBox.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files (x86)\Application Verifier\cvsd.xml ece2049bf1201a5b0f7a6920b95bef4773683e523eddc5dd38d1bdd4c7515258.exe File created C:\Program Files (x86)\Application Verifier\afd.bin ece2049bf1201a5b0f7a6920b95bef4773683e523eddc5dd38d1bdd4c7515258.exe File created C:\Program Files (x86)\Application Verifier\fufu.bin ece2049bf1201a5b0f7a6920b95bef4773683e523eddc5dd38d1bdd4c7515258.exe File created C:\Program Files (x86)\Application Verifier\QQMicroGameBox.exe ece2049bf1201a5b0f7a6920b95bef4773683e523eddc5dd38d1bdd4c7515258.exe File created C:\Program Files (x86)\Application Verifier\sentry.dll ece2049bf1201a5b0f7a6920b95bef4773683e523eddc5dd38d1bdd4c7515258.exe File opened for modification C:\Program Files (x86)\Application Verifier\QQMicroGameBox.exe QQMicroGameBox.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4948 ece2049bf1201a5b0f7a6920b95bef4773683e523eddc5dd38d1bdd4c7515258.exe 4948 ece2049bf1201a5b0f7a6920b95bef4773683e523eddc5dd38d1bdd4c7515258.exe 4948 ece2049bf1201a5b0f7a6920b95bef4773683e523eddc5dd38d1bdd4c7515258.exe 4948 ece2049bf1201a5b0f7a6920b95bef4773683e523eddc5dd38d1bdd4c7515258.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4320 QQMicroGameBox.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4948 ece2049bf1201a5b0f7a6920b95bef4773683e523eddc5dd38d1bdd4c7515258.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4948 wrote to memory of 4320 4948 ece2049bf1201a5b0f7a6920b95bef4773683e523eddc5dd38d1bdd4c7515258.exe 53 PID 4948 wrote to memory of 4320 4948 ece2049bf1201a5b0f7a6920b95bef4773683e523eddc5dd38d1bdd4c7515258.exe 53 PID 4948 wrote to memory of 4320 4948 ece2049bf1201a5b0f7a6920b95bef4773683e523eddc5dd38d1bdd4c7515258.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\ece2049bf1201a5b0f7a6920b95bef4773683e523eddc5dd38d1bdd4c7515258.exe"C:\Users\Admin\AppData\Local\Temp\ece2049bf1201a5b0f7a6920b95bef4773683e523eddc5dd38d1bdd4c7515258.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Program Files (x86)\Application Verifier\QQMicroGameBox.exe"C:\Program Files (x86)\Application Verifier\QQMicroGameBox.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:4320 -
C:\Users\Admin\AppData\Local\QQMicroGameBox.exe"C:\Users\Admin\AppData\Local\QQMicroGameBox.exe"3⤵PID:4972
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD57f8f210a6f11a1e556b8dd7bb26e2e7d
SHA149a1e7d58e43cc5e177de7857b8fa9c8a6f6d1c1
SHA256c7109e87b0d20b842816f055a8714f0eebccfa99a031e6b7a472397736329af7
SHA5121c414aa37879bed96a82a1d14658e58da6d085cd0a6d523a65780c9dc585d78afa99eefc64dc5d9961702dc5fdd8b647f9475eed25ef67287de01f82962921a7
-
Filesize
1.9MB
MD57f8f210a6f11a1e556b8dd7bb26e2e7d
SHA149a1e7d58e43cc5e177de7857b8fa9c8a6f6d1c1
SHA256c7109e87b0d20b842816f055a8714f0eebccfa99a031e6b7a472397736329af7
SHA5121c414aa37879bed96a82a1d14658e58da6d085cd0a6d523a65780c9dc585d78afa99eefc64dc5d9961702dc5fdd8b647f9475eed25ef67287de01f82962921a7
-
Filesize
1.9MB
MD57f8f210a6f11a1e556b8dd7bb26e2e7d
SHA149a1e7d58e43cc5e177de7857b8fa9c8a6f6d1c1
SHA256c7109e87b0d20b842816f055a8714f0eebccfa99a031e6b7a472397736329af7
SHA5121c414aa37879bed96a82a1d14658e58da6d085cd0a6d523a65780c9dc585d78afa99eefc64dc5d9961702dc5fdd8b647f9475eed25ef67287de01f82962921a7
-
Filesize
198KB
MD505053c75e7990b751933d1bfffdb7ad1
SHA1ce609dfac995d70596b9df22ed6a8cd4e2da96d3
SHA2567ef58d246cc28f19808b28613a287b2cc2d2f359b17b5ca9a878e028e0a9bfae
SHA5128138755349167a473b1e5046c3af4fc6e097315e3e0e6eff6378d1123e2ebb9b36c59863ba8b43c8bc73be4f98721e81baf418b603fe07f3193a58b05937d97e
-
Filesize
84KB
MD51d78cc969d6d164f7c9c6605214f7f10
SHA1ab8a49fb4905bdd492671958a957b15060706daa
SHA256befef93e2df09e4bcad8518f8611bb615ef004bc0fabc4899e6e767184708cc6
SHA512a6d9f25d22cdf61d8f985bb219a4fcb14fe65de9ac0483cc74b7abbab537e2ca08b030714d1de2ef05da8fe4db41838adfc2c00aad4b671fd2c8a30c53865b69
-
Filesize
84KB
MD51d78cc969d6d164f7c9c6605214f7f10
SHA1ab8a49fb4905bdd492671958a957b15060706daa
SHA256befef93e2df09e4bcad8518f8611bb615ef004bc0fabc4899e6e767184708cc6
SHA512a6d9f25d22cdf61d8f985bb219a4fcb14fe65de9ac0483cc74b7abbab537e2ca08b030714d1de2ef05da8fe4db41838adfc2c00aad4b671fd2c8a30c53865b69
-
Filesize
84KB
MD51d78cc969d6d164f7c9c6605214f7f10
SHA1ab8a49fb4905bdd492671958a957b15060706daa
SHA256befef93e2df09e4bcad8518f8611bb615ef004bc0fabc4899e6e767184708cc6
SHA512a6d9f25d22cdf61d8f985bb219a4fcb14fe65de9ac0483cc74b7abbab537e2ca08b030714d1de2ef05da8fe4db41838adfc2c00aad4b671fd2c8a30c53865b69
-
Filesize
1.9MB
MD57f8f210a6f11a1e556b8dd7bb26e2e7d
SHA149a1e7d58e43cc5e177de7857b8fa9c8a6f6d1c1
SHA256c7109e87b0d20b842816f055a8714f0eebccfa99a031e6b7a472397736329af7
SHA5121c414aa37879bed96a82a1d14658e58da6d085cd0a6d523a65780c9dc585d78afa99eefc64dc5d9961702dc5fdd8b647f9475eed25ef67287de01f82962921a7
-
Filesize
1.9MB
MD57f8f210a6f11a1e556b8dd7bb26e2e7d
SHA149a1e7d58e43cc5e177de7857b8fa9c8a6f6d1c1
SHA256c7109e87b0d20b842816f055a8714f0eebccfa99a031e6b7a472397736329af7
SHA5121c414aa37879bed96a82a1d14658e58da6d085cd0a6d523a65780c9dc585d78afa99eefc64dc5d9961702dc5fdd8b647f9475eed25ef67287de01f82962921a7