Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
07/12/2023, 04:27
Behavioral task
behavioral1
Sample
297782811cb69f269c4397e7bb71ce93875d5af3c9477bb0b6b22b11a92b135e.exe
Resource
win7-20231023-en
General
-
Target
297782811cb69f269c4397e7bb71ce93875d5af3c9477bb0b6b22b11a92b135e.exe
-
Size
9.8MB
-
MD5
0d73e8c3d996fdb9f796472e2270f18e
-
SHA1
ce891cba235832d3e7a62b899786a215f0c94dff
-
SHA256
297782811cb69f269c4397e7bb71ce93875d5af3c9477bb0b6b22b11a92b135e
-
SHA512
592aeea7acbdc214a50e463fc1a424e5c8898b723b8c626216a18bbd24e933e2cd2011d3136ca9307094673f8effb51c8b5a3bf87b397cd9618a30448ae118f6
-
SSDEEP
196608:9mO/7OgB71cJEfK2DkGztjKWZpoz6QQ+dKFl1x6Ew5ynPnH45u5Hx:9mOjbcJIK2DXhWWpshQ7h6Xy/Y5O
Malware Config
Signatures
-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Fatal Rat payload 1 IoCs
resource yara_rule behavioral2/memory/4816-40-0x0000000003280000-0x00000000032AA000-memory.dmp fatalrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 297782811cb69f269c4397e7bb71ce93875d5af3c9477bb0b6b22b11a92b135e.exe -
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000700000002323f-32.dat acprotect behavioral2/files/0x000700000002323f-31.dat acprotect -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 297782811cb69f269c4397e7bb71ce93875d5af3c9477bb0b6b22b11a92b135e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 297782811cb69f269c4397e7bb71ce93875d5af3c9477bb0b6b22b11a92b135e.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2598572287-1024438387-935107970-1000\Control Panel\International\Geo\Nation 297782811cb69f269c4397e7bb71ce93875d5af3c9477bb0b6b22b11a92b135e.exe -
Executes dropped EXE 1 IoCs
pid Process 4816 Updater.exe -
Loads dropped DLL 2 IoCs
pid Process 4816 Updater.exe 4816 Updater.exe -
resource yara_rule behavioral2/memory/1736-0-0x0000000000190000-0x0000000001719000-memory.dmp themida behavioral2/memory/1736-2-0x0000000000190000-0x0000000001719000-memory.dmp themida behavioral2/memory/1736-3-0x0000000000190000-0x0000000001719000-memory.dmp themida behavioral2/memory/1736-4-0x0000000000190000-0x0000000001719000-memory.dmp themida behavioral2/memory/1736-5-0x0000000000190000-0x0000000001719000-memory.dmp themida behavioral2/memory/1736-6-0x0000000000190000-0x0000000001719000-memory.dmp themida behavioral2/memory/1736-7-0x0000000000190000-0x0000000001719000-memory.dmp themida behavioral2/memory/1736-8-0x0000000000190000-0x0000000001719000-memory.dmp themida behavioral2/memory/1736-9-0x0000000000190000-0x0000000001719000-memory.dmp themida behavioral2/memory/1736-10-0x0000000000190000-0x0000000001719000-memory.dmp themida behavioral2/memory/1736-29-0x0000000000190000-0x0000000001719000-memory.dmp themida -
resource yara_rule behavioral2/memory/4816-33-0x0000000010000000-0x000000001008D000-memory.dmp upx behavioral2/files/0x000700000002323f-32.dat upx behavioral2/files/0x000700000002323f-31.dat upx behavioral2/memory/4816-45-0x0000000010000000-0x000000001008D000-memory.dmp upx behavioral2/memory/4816-58-0x0000000010000000-0x000000001008D000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 297782811cb69f269c4397e7bb71ce93875d5af3c9477bb0b6b22b11a92b135e.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1736 297782811cb69f269c4397e7bb71ce93875d5af3c9477bb0b6b22b11a92b135e.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\Funshion\cvsd.xml 297782811cb69f269c4397e7bb71ce93875d5af3c9477bb0b6b22b11a92b135e.exe File created C:\Program Files (x86)\Funshion\HttpFtp.dll 297782811cb69f269c4397e7bb71ce93875d5af3c9477bb0b6b22b11a92b135e.exe File created C:\Program Files (x86)\Funshion\libcurl.dll 297782811cb69f269c4397e7bb71ce93875d5af3c9477bb0b6b22b11a92b135e.exe File created C:\Program Files (x86)\Funshion\Updater.exe 297782811cb69f269c4397e7bb71ce93875d5af3c9477bb0b6b22b11a92b135e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Updater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Updater.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1736 297782811cb69f269c4397e7bb71ce93875d5af3c9477bb0b6b22b11a92b135e.exe 1736 297782811cb69f269c4397e7bb71ce93875d5af3c9477bb0b6b22b11a92b135e.exe 1736 297782811cb69f269c4397e7bb71ce93875d5af3c9477bb0b6b22b11a92b135e.exe 1736 297782811cb69f269c4397e7bb71ce93875d5af3c9477bb0b6b22b11a92b135e.exe 1736 297782811cb69f269c4397e7bb71ce93875d5af3c9477bb0b6b22b11a92b135e.exe 1736 297782811cb69f269c4397e7bb71ce93875d5af3c9477bb0b6b22b11a92b135e.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe 4816 Updater.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4816 Updater.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1736 297782811cb69f269c4397e7bb71ce93875d5af3c9477bb0b6b22b11a92b135e.exe 4816 Updater.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1736 wrote to memory of 4816 1736 297782811cb69f269c4397e7bb71ce93875d5af3c9477bb0b6b22b11a92b135e.exe 94 PID 1736 wrote to memory of 4816 1736 297782811cb69f269c4397e7bb71ce93875d5af3c9477bb0b6b22b11a92b135e.exe 94 PID 1736 wrote to memory of 4816 1736 297782811cb69f269c4397e7bb71ce93875d5af3c9477bb0b6b22b11a92b135e.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\297782811cb69f269c4397e7bb71ce93875d5af3c9477bb0b6b22b11a92b135e.exe"C:\Users\Admin\AppData\Local\Temp\297782811cb69f269c4397e7bb71ce93875d5af3c9477bb0b6b22b11a92b135e.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Program Files (x86)\Funshion\Updater.exe"C:\Program Files (x86)\Funshion\Updater.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
234KB
MD549fdb26643239695c5faa0677965a94c
SHA1308bdcac85a1a61b0e8efccb6603a58c0c68e8ef
SHA2567b56b12a0e16f2123110222e3884ac44fddf2cb9c780b053d3e29c3468b3a256
SHA51264fc81965a5e564b2896f01f5419a3644f4b3f251422b0e81ad125f7c3145a9a23df58d7a0dcf8da06963a70f974d223646d7fa0e1e532f46e2d06d721b1e22d
-
Filesize
234KB
MD549fdb26643239695c5faa0677965a94c
SHA1308bdcac85a1a61b0e8efccb6603a58c0c68e8ef
SHA2567b56b12a0e16f2123110222e3884ac44fddf2cb9c780b053d3e29c3468b3a256
SHA51264fc81965a5e564b2896f01f5419a3644f4b3f251422b0e81ad125f7c3145a9a23df58d7a0dcf8da06963a70f974d223646d7fa0e1e532f46e2d06d721b1e22d
-
Filesize
3.4MB
MD53e70fba5ef28862d49f63ac683859aa6
SHA17f74f5e0106d89e5c5e9b8cac71d28afaa790115
SHA25648c0f15c264d00bf7053531de69bc44a8d31246a1f867acfc5f48ec705624bd1
SHA5120be2e7d7dd1c07c348f2d1010d452972cba1db501c6ee69a1a40d68908866fb744a24f58caf9430b7ab48b78f4d0be06ce7ba7e0ce3fb0b4d8f903670e30ee1a
-
Filesize
3.4MB
MD53e70fba5ef28862d49f63ac683859aa6
SHA17f74f5e0106d89e5c5e9b8cac71d28afaa790115
SHA25648c0f15c264d00bf7053531de69bc44a8d31246a1f867acfc5f48ec705624bd1
SHA5120be2e7d7dd1c07c348f2d1010d452972cba1db501c6ee69a1a40d68908866fb744a24f58caf9430b7ab48b78f4d0be06ce7ba7e0ce3fb0b4d8f903670e30ee1a
-
Filesize
3.4MB
MD53e70fba5ef28862d49f63ac683859aa6
SHA17f74f5e0106d89e5c5e9b8cac71d28afaa790115
SHA25648c0f15c264d00bf7053531de69bc44a8d31246a1f867acfc5f48ec705624bd1
SHA5120be2e7d7dd1c07c348f2d1010d452972cba1db501c6ee69a1a40d68908866fb744a24f58caf9430b7ab48b78f4d0be06ce7ba7e0ce3fb0b4d8f903670e30ee1a
-
Filesize
121KB
MD5d90f53ba4bdf19d1ab57354eb52edaa1
SHA19338a9dede3f9c2746f3578eebbe6279899ce9aa
SHA256e43fb38e152363bd0886fe84a3247db739eb27dd7eec23cbfb1a22f88ad05b20
SHA512421f02c08c330bbe5fa836d9c75dca57fd35864f42a028c6939e56db4f509f387bf58b79f3fe3b1845f7e0bd7f65c16ac573c6fddd5c6feb7922ba8f658d1028
-
Filesize
121KB
MD5d90f53ba4bdf19d1ab57354eb52edaa1
SHA19338a9dede3f9c2746f3578eebbe6279899ce9aa
SHA256e43fb38e152363bd0886fe84a3247db739eb27dd7eec23cbfb1a22f88ad05b20
SHA512421f02c08c330bbe5fa836d9c75dca57fd35864f42a028c6939e56db4f509f387bf58b79f3fe3b1845f7e0bd7f65c16ac573c6fddd5c6feb7922ba8f658d1028
-
Filesize
198KB
MD5c68f04b5648ffe2e351d2f3831d708e5
SHA1e21871056c7b767bf357a1f5bc399fe7f1248a92
SHA256e5153b805563b3d00f7a7796d313f60685cc31b3f883fe47887ade617ca076aa
SHA5128807b38723f37c9b197a0d9f090c00fdd467ceb26ba810767676f16c29d6248a41ac6b41460a6b4972209ca0da5457622ce6b56205d0d27034bc57b6c5069d7d