Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231127-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/12/2023, 12:31

General

  • Target

    af047988b4aac732bb2170d21aeb500c29c73cc1bd8a1464cf14234130b53a68.exe

  • Size

    2.5MB

  • MD5

    88fe6af5621d0c427ed3e5409faf627d

  • SHA1

    20bb4297c5d1ed1f558b4e0a1cd1b7d4a0e1c7b1

  • SHA256

    af047988b4aac732bb2170d21aeb500c29c73cc1bd8a1464cf14234130b53a68

  • SHA512

    fa91761b3164d5ab77e6453bc0f3574e1893a9b041ae47fc66d7c8d716f290c3c205870e527a989ffe0db9ae4b9d0c16c327a403762ac70d921cb58e8c8bd8c0

  • SSDEEP

    49152:NBK9Ck5MOy8EK0uREiv6yq/cj332WpyeA2NiijZMNs39dvNfsg0O2iy:G95Os0uRH2cb32peLNFjWN4vrp2v

Malware Config

Signatures

  • FatalRat

    FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

  • Fatal Rat payload 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\af047988b4aac732bb2170d21aeb500c29c73cc1bd8a1464cf14234130b53a68.exe
    "C:\Users\Admin\AppData\Local\Temp\af047988b4aac732bb2170d21aeb500c29c73cc1bd8a1464cf14234130b53a68.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4332
    • C:\Program Files (x86)\Funshion\liaobei.exe
      "C:\Program Files (x86)\Funshion\liaobei.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:468

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Funshion\liaobei.exe

          Filesize

          2.6MB

          MD5

          91057184eb697259e88dff99a1e957cf

          SHA1

          0aad25610df49e54b2e6af9f888eff8fb5a99e07

          SHA256

          149a58359c568d4a5ebb1fee53c5cba1dd63fdc14b165d043fd2a4c5f641ff67

          SHA512

          e5b27feea207bb7d3d35f8b11b10d64cef7b947fb9aa2612fab6e69bb270c4bfe3f1316d477c7832ecd9f7fd9cb622721e2ee5ee717cef1954ad353221068ffe

        • C:\Program Files (x86)\Funshion\liaobei.exe

          Filesize

          2.6MB

          MD5

          91057184eb697259e88dff99a1e957cf

          SHA1

          0aad25610df49e54b2e6af9f888eff8fb5a99e07

          SHA256

          149a58359c568d4a5ebb1fee53c5cba1dd63fdc14b165d043fd2a4c5f641ff67

          SHA512

          e5b27feea207bb7d3d35f8b11b10d64cef7b947fb9aa2612fab6e69bb270c4bfe3f1316d477c7832ecd9f7fd9cb622721e2ee5ee717cef1954ad353221068ffe

        • C:\Program Files (x86)\Funshion\liaobei.exe

          Filesize

          2.6MB

          MD5

          91057184eb697259e88dff99a1e957cf

          SHA1

          0aad25610df49e54b2e6af9f888eff8fb5a99e07

          SHA256

          149a58359c568d4a5ebb1fee53c5cba1dd63fdc14b165d043fd2a4c5f641ff67

          SHA512

          e5b27feea207bb7d3d35f8b11b10d64cef7b947fb9aa2612fab6e69bb270c4bfe3f1316d477c7832ecd9f7fd9cb622721e2ee5ee717cef1954ad353221068ffe

        • C:\Program Files (x86)\Funshion\nw_elf.dll

          Filesize

          34KB

          MD5

          4c053083091bd4a335268290136f2dec

          SHA1

          f31b461e175ab67592e78ea9ce88054947dde8cf

          SHA256

          3f0712d0a5840926ec5553bfd8bd9bf5ddcb176792f78a3fcd00349bb81e7411

          SHA512

          ea5cb93a1c0a17cf98fa0dd7577170b47ab7b79549279cc48dfe0d3763a40612a5d6f7f3fdcc4c657ce068cf5356aea317d1c8be5893c565b5d5b392b3967e12

        • C:\Program Files (x86)\Funshion\nw_elf.dll

          Filesize

          34KB

          MD5

          4c053083091bd4a335268290136f2dec

          SHA1

          f31b461e175ab67592e78ea9ce88054947dde8cf

          SHA256

          3f0712d0a5840926ec5553bfd8bd9bf5ddcb176792f78a3fcd00349bb81e7411

          SHA512

          ea5cb93a1c0a17cf98fa0dd7577170b47ab7b79549279cc48dfe0d3763a40612a5d6f7f3fdcc4c657ce068cf5356aea317d1c8be5893c565b5d5b392b3967e12

        • C:\ProgramData\afd.bin

          Filesize

          198KB

          MD5

          c4f9304f6c3537702cefc51af4cce151

          SHA1

          5b8215e1e37f570b1af734add3f5d11c17368243

          SHA256

          5fcaa5b158594c2f156cdea6942c6ecd834f53d870af630824e0127594c0ecd3

          SHA512

          4c12067c87ff0565d5dbd17ddc1231d11a30691cab2493be24b16f802fdb9213e4f7346335566feb740c11ab3961aefaa6b43487a8f559aa2f5baf40633b97bf

        • memory/468-40-0x00000000023A0000-0x00000000023CA000-memory.dmp

          Filesize

          168KB

        • memory/468-36-0x00000000022E0000-0x000000000238E000-memory.dmp

          Filesize

          696KB

        • memory/468-35-0x0000000010000000-0x0000000010031000-memory.dmp

          Filesize

          196KB

        • memory/4332-4-0x0000000000B80000-0x0000000000B81000-memory.dmp

          Filesize

          4KB

        • memory/4332-31-0x0000000000400000-0x0000000000A4F000-memory.dmp

          Filesize

          6.3MB

        • memory/4332-14-0x0000000000400000-0x0000000000A4F000-memory.dmp

          Filesize

          6.3MB

        • memory/4332-11-0x0000000000400000-0x0000000000A4F000-memory.dmp

          Filesize

          6.3MB

        • memory/4332-9-0x0000000000400000-0x0000000000A4F000-memory.dmp

          Filesize

          6.3MB

        • memory/4332-29-0x00000000027D0000-0x000000000281A000-memory.dmp

          Filesize

          296KB

        • memory/4332-6-0x0000000002830000-0x000000000283C000-memory.dmp

          Filesize

          48KB

        • memory/4332-13-0x0000000000400000-0x0000000000A4F000-memory.dmp

          Filesize

          6.3MB

        • memory/4332-7-0x0000000000400000-0x0000000000A4F000-memory.dmp

          Filesize

          6.3MB

        • memory/4332-0-0x0000000000400000-0x0000000000A4F000-memory.dmp

          Filesize

          6.3MB

        • memory/4332-5-0x0000000002820000-0x0000000002830000-memory.dmp

          Filesize

          64KB

        • memory/4332-3-0x0000000000400000-0x0000000000A4F000-memory.dmp

          Filesize

          6.3MB

        • memory/4332-2-0x00000000027D0000-0x000000000281A000-memory.dmp

          Filesize

          296KB

        • memory/4332-1-0x00000000027D0000-0x000000000281A000-memory.dmp

          Filesize

          296KB