Analysis

  • max time kernel
    136s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231127-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/12/2023, 11:02

General

  • Target

    5dd93e48b8f255126c1dfa996c2ef2c8ddc8eb29323945009ba7a7f8c32c3f81.exe

  • Size

    1.9MB

  • MD5

    7a6b6fbd4fa4514b972896477062ab23

  • SHA1

    d3f091e240ec96cf7f02e59003229cfce99b9801

  • SHA256

    5dd93e48b8f255126c1dfa996c2ef2c8ddc8eb29323945009ba7a7f8c32c3f81

  • SHA512

    77a55089c9e8809ec7e58e490b65364e1bce05897bf3d8b425f0ab3de7e4e530fc31310cc2a82b36ddaa7caa73d9ab9a3abf3806657da3ee2c9bf9715e442b59

  • SSDEEP

    49152:S7QMGIEr2hyyU/sQaIbd/HA/XXO5YbQBIEbrGygStXBqxoXbrSIQ5kBG8qYOpUX:S5GIE6XU/sQDd4/e5YkBIEbrGygSZr9l

Malware Config

Signatures

  • FatalRat

    FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

  • Fatal Rat payload 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 3 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 21 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5dd93e48b8f255126c1dfa996c2ef2c8ddc8eb29323945009ba7a7f8c32c3f81.exe
    "C:\Users\Admin\AppData\Local\Temp\5dd93e48b8f255126c1dfa996c2ef2c8ddc8eb29323945009ba7a7f8c32c3f81.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4536
  • C:\ProgramData\msdtc.exe
    C:\ProgramData\msdtc.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\ProgramData\msdtc.exe
      C:\ProgramData\msdtc.exe Win7
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Checks processor information in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4148

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\msdtc.exe

          Filesize

          1.9MB

          MD5

          7a6b6fbd4fa4514b972896477062ab23

          SHA1

          d3f091e240ec96cf7f02e59003229cfce99b9801

          SHA256

          5dd93e48b8f255126c1dfa996c2ef2c8ddc8eb29323945009ba7a7f8c32c3f81

          SHA512

          77a55089c9e8809ec7e58e490b65364e1bce05897bf3d8b425f0ab3de7e4e530fc31310cc2a82b36ddaa7caa73d9ab9a3abf3806657da3ee2c9bf9715e442b59

        • C:\ProgramData\msdtc.exe

          Filesize

          1.9MB

          MD5

          7a6b6fbd4fa4514b972896477062ab23

          SHA1

          d3f091e240ec96cf7f02e59003229cfce99b9801

          SHA256

          5dd93e48b8f255126c1dfa996c2ef2c8ddc8eb29323945009ba7a7f8c32c3f81

          SHA512

          77a55089c9e8809ec7e58e490b65364e1bce05897bf3d8b425f0ab3de7e4e530fc31310cc2a82b36ddaa7caa73d9ab9a3abf3806657da3ee2c9bf9715e442b59

        • C:\ProgramData\msdtc.exe

          Filesize

          1.9MB

          MD5

          7a6b6fbd4fa4514b972896477062ab23

          SHA1

          d3f091e240ec96cf7f02e59003229cfce99b9801

          SHA256

          5dd93e48b8f255126c1dfa996c2ef2c8ddc8eb29323945009ba7a7f8c32c3f81

          SHA512

          77a55089c9e8809ec7e58e490b65364e1bce05897bf3d8b425f0ab3de7e4e530fc31310cc2a82b36ddaa7caa73d9ab9a3abf3806657da3ee2c9bf9715e442b59

        • C:\WINDOWS\SysWOW64\1.bin

          Filesize

          209KB

          MD5

          37f2e3e7a313b58925f1a0fdd69cb563

          SHA1

          5042b795955a5e04fe0b7d2430f28e196f5de95e

          SHA256

          40773f94ff0dcbd2047570ddbf1d189a071c237a189ac4ed61c3ab956dbccf44

          SHA512

          533294585e0a1608e8251ee626d27188d1813710a975b51d4b47fe37820a4676afbaf81b21953cda57180712a1d845098d0de2193fcd71f96fcadd31ebfaeca0

        • C:\WINDOWS\SysWOW64\1.bin

          Filesize

          209KB

          MD5

          37f2e3e7a313b58925f1a0fdd69cb563

          SHA1

          5042b795955a5e04fe0b7d2430f28e196f5de95e

          SHA256

          40773f94ff0dcbd2047570ddbf1d189a071c237a189ac4ed61c3ab956dbccf44

          SHA512

          533294585e0a1608e8251ee626d27188d1813710a975b51d4b47fe37820a4676afbaf81b21953cda57180712a1d845098d0de2193fcd71f96fcadd31ebfaeca0

        • memory/4536-1-0x0000000003210000-0x0000000003245000-memory.dmp

          Filesize

          212KB

        • memory/4536-2-0x0000000010000000-0x000000001002A000-memory.dmp

          Filesize

          168KB