Analysis

  • max time kernel
    122s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20231025-en
  • resource tags

    arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system
  • submitted
    08-12-2023 12:31

General

  • Target

    af047988b4aac732bb2170d21aeb500c29c73cc1bd8a1464cf14234130b53a68.exe

  • Size

    2.5MB

  • MD5

    88fe6af5621d0c427ed3e5409faf627d

  • SHA1

    20bb4297c5d1ed1f558b4e0a1cd1b7d4a0e1c7b1

  • SHA256

    af047988b4aac732bb2170d21aeb500c29c73cc1bd8a1464cf14234130b53a68

  • SHA512

    fa91761b3164d5ab77e6453bc0f3574e1893a9b041ae47fc66d7c8d716f290c3c205870e527a989ffe0db9ae4b9d0c16c327a403762ac70d921cb58e8c8bd8c0

  • SSDEEP

    49152:NBK9Ck5MOy8EK0uREiv6yq/cj332WpyeA2NiijZMNs39dvNfsg0O2iy:G95Os0uRH2cb32peLNFjWN4vrp2v

Malware Config

Signatures

  • FatalRat

    FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

  • Fatal Rat payload 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 53 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\af047988b4aac732bb2170d21aeb500c29c73cc1bd8a1464cf14234130b53a68.exe
    "C:\Users\Admin\AppData\Local\Temp\af047988b4aac732bb2170d21aeb500c29c73cc1bd8a1464cf14234130b53a68.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1768
    • C:\Program Files (x86)\Funshion\liaobei.exe
      "C:\Program Files (x86)\Funshion\liaobei.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Funshion\liaobei.exe

    Filesize

    2.6MB

    MD5

    91057184eb697259e88dff99a1e957cf

    SHA1

    0aad25610df49e54b2e6af9f888eff8fb5a99e07

    SHA256

    149a58359c568d4a5ebb1fee53c5cba1dd63fdc14b165d043fd2a4c5f641ff67

    SHA512

    e5b27feea207bb7d3d35f8b11b10d64cef7b947fb9aa2612fab6e69bb270c4bfe3f1316d477c7832ecd9f7fd9cb622721e2ee5ee717cef1954ad353221068ffe

  • C:\Program Files (x86)\Funshion\liaobei.exe

    Filesize

    2.6MB

    MD5

    91057184eb697259e88dff99a1e957cf

    SHA1

    0aad25610df49e54b2e6af9f888eff8fb5a99e07

    SHA256

    149a58359c568d4a5ebb1fee53c5cba1dd63fdc14b165d043fd2a4c5f641ff67

    SHA512

    e5b27feea207bb7d3d35f8b11b10d64cef7b947fb9aa2612fab6e69bb270c4bfe3f1316d477c7832ecd9f7fd9cb622721e2ee5ee717cef1954ad353221068ffe

  • C:\Program Files (x86)\Funshion\nw_elf.dll

    Filesize

    34KB

    MD5

    4c053083091bd4a335268290136f2dec

    SHA1

    f31b461e175ab67592e78ea9ce88054947dde8cf

    SHA256

    3f0712d0a5840926ec5553bfd8bd9bf5ddcb176792f78a3fcd00349bb81e7411

    SHA512

    ea5cb93a1c0a17cf98fa0dd7577170b47ab7b79549279cc48dfe0d3763a40612a5d6f7f3fdcc4c657ce068cf5356aea317d1c8be5893c565b5d5b392b3967e12

  • C:\ProgramData\afd.bin

    Filesize

    198KB

    MD5

    c4f9304f6c3537702cefc51af4cce151

    SHA1

    5b8215e1e37f570b1af734add3f5d11c17368243

    SHA256

    5fcaa5b158594c2f156cdea6942c6ecd834f53d870af630824e0127594c0ecd3

    SHA512

    4c12067c87ff0565d5dbd17ddc1231d11a30691cab2493be24b16f802fdb9213e4f7346335566feb740c11ab3961aefaa6b43487a8f559aa2f5baf40633b97bf

  • \Program Files (x86)\Funshion\liaobei.exe

    Filesize

    2.6MB

    MD5

    91057184eb697259e88dff99a1e957cf

    SHA1

    0aad25610df49e54b2e6af9f888eff8fb5a99e07

    SHA256

    149a58359c568d4a5ebb1fee53c5cba1dd63fdc14b165d043fd2a4c5f641ff67

    SHA512

    e5b27feea207bb7d3d35f8b11b10d64cef7b947fb9aa2612fab6e69bb270c4bfe3f1316d477c7832ecd9f7fd9cb622721e2ee5ee717cef1954ad353221068ffe

  • \Program Files (x86)\Funshion\nw_elf.dll

    Filesize

    34KB

    MD5

    4c053083091bd4a335268290136f2dec

    SHA1

    f31b461e175ab67592e78ea9ce88054947dde8cf

    SHA256

    3f0712d0a5840926ec5553bfd8bd9bf5ddcb176792f78a3fcd00349bb81e7411

    SHA512

    ea5cb93a1c0a17cf98fa0dd7577170b47ab7b79549279cc48dfe0d3763a40612a5d6f7f3fdcc4c657ce068cf5356aea317d1c8be5893c565b5d5b392b3967e12

  • memory/1768-5-0x00000000002D0000-0x00000000002DC000-memory.dmp

    Filesize

    48KB

  • memory/1768-3-0x00000000002C0000-0x00000000002D0000-memory.dmp

    Filesize

    64KB

  • memory/1768-9-0x0000000000400000-0x0000000000A4F000-memory.dmp

    Filesize

    6.3MB

  • memory/1768-11-0x0000000000400000-0x0000000000A4F000-memory.dmp

    Filesize

    6.3MB

  • memory/1768-13-0x0000000000400000-0x0000000000A4F000-memory.dmp

    Filesize

    6.3MB

  • memory/1768-19-0x0000000000400000-0x0000000000A4F000-memory.dmp

    Filesize

    6.3MB

  • memory/1768-7-0x00000000002A0000-0x00000000002A1000-memory.dmp

    Filesize

    4KB

  • memory/1768-0-0x0000000000400000-0x0000000000A4F000-memory.dmp

    Filesize

    6.3MB

  • memory/1768-4-0x0000000000400000-0x0000000000A4F000-memory.dmp

    Filesize

    6.3MB

  • memory/1768-6-0x0000000000400000-0x0000000000A4F000-memory.dmp

    Filesize

    6.3MB

  • memory/1768-28-0x0000000000240000-0x000000000028A000-memory.dmp

    Filesize

    296KB

  • memory/1768-29-0x0000000000400000-0x0000000000A4F000-memory.dmp

    Filesize

    6.3MB

  • memory/1768-1-0x0000000000240000-0x000000000028A000-memory.dmp

    Filesize

    296KB

  • memory/1768-2-0x0000000000240000-0x000000000028A000-memory.dmp

    Filesize

    296KB

  • memory/2800-33-0x0000000001E50000-0x0000000001EFE000-memory.dmp

    Filesize

    696KB

  • memory/2800-36-0x00000000003D0000-0x00000000003FA000-memory.dmp

    Filesize

    168KB

  • memory/2800-31-0x0000000010000000-0x0000000010031000-memory.dmp

    Filesize

    196KB