Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
13-12-2023 15:56
Behavioral task
behavioral1
Sample
82fc444c2e6ebe55046ddf5c031b7fcad832a8fd4f66b8a40e509a81ca413735.dll
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
82fc444c2e6ebe55046ddf5c031b7fcad832a8fd4f66b8a40e509a81ca413735.dll
Resource
win10v2004-20231127-en
General
-
Target
82fc444c2e6ebe55046ddf5c031b7fcad832a8fd4f66b8a40e509a81ca413735.dll
-
Size
520KB
-
MD5
00d96db6440e496f298013ae3d4806d8
-
SHA1
2d3801fb6264694adfe8d61d25662ec31939d49e
-
SHA256
82fc444c2e6ebe55046ddf5c031b7fcad832a8fd4f66b8a40e509a81ca413735
-
SHA512
2361c93d789da3a93008e37f02bc16f59eb107918260b87d6466e0a280ad14c9472c8bc60f17b2e585da72e0740905591a5300b4463d87ad00fb88b043ac8c9b
-
SSDEEP
12288:vXLLkwykYRIZLNpxjb72MCt0LARqbdpZs:vXLLmkNZLflHCtc2qbx
Malware Config
Signatures
-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral2/memory/4188-22-0x0000000003340000-0x000000000335A000-memory.dmp family_gh0strat behavioral2/memory/4188-24-0x0000000003340000-0x000000000335A000-memory.dmp family_gh0strat behavioral2/memory/4188-23-0x0000000003340000-0x000000000335A000-memory.dmp family_gh0strat -
Fatal Rat payload 2 IoCs
resource yara_rule behavioral2/memory/4188-13-0x0000000001150000-0x0000000001180000-memory.dmp fatalrat behavioral2/memory/4188-14-0x0000000010000000-0x0000000010029000-memory.dmp fatalrat -
Blocklisted process makes network request 3 IoCs
flow pid Process 8 3124 rundll32.exe 92 3124 rundll32.exe 114 3124 rundll32.exe -
Executes dropped EXE 1 IoCs
pid Process 4188 Agghosts.exe -
Loads dropped DLL 2 IoCs
pid Process 4188 Agghosts.exe 4188 Agghosts.exe -
resource yara_rule behavioral2/memory/4188-19-0x0000000003340000-0x000000000335A000-memory.dmp upx behavioral2/memory/4188-22-0x0000000003340000-0x000000000335A000-memory.dmp upx behavioral2/memory/4188-24-0x0000000003340000-0x000000000335A000-memory.dmp upx behavioral2/memory/4188-23-0x0000000003340000-0x000000000335A000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2013768333-4045878716-2922883000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Çý¶¯Éú = "C:\\egfzwg\\Agghosts.exe" Agghosts.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4744 4188 WerFault.exe 109 1976 4188 WerFault.exe 109 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Agghosts.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Agghosts.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ helppane.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe 4188 Agghosts.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4188 Agghosts.exe Token: SeDebugPrivilege 4188 Agghosts.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3968 helppane.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3968 helppane.exe 3968 helppane.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3900 wrote to memory of 3124 3900 rundll32.exe 86 PID 3900 wrote to memory of 3124 3900 rundll32.exe 86 PID 3900 wrote to memory of 3124 3900 rundll32.exe 86 PID 3968 wrote to memory of 4188 3968 helppane.exe 109 PID 3968 wrote to memory of 4188 3968 helppane.exe 109 PID 3968 wrote to memory of 4188 3968 helppane.exe 109
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\82fc444c2e6ebe55046ddf5c031b7fcad832a8fd4f66b8a40e509a81ca413735.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\82fc444c2e6ebe55046ddf5c031b7fcad832a8fd4f66b8a40e509a81ca413735.dll,#12⤵
- Blocklisted process makes network request
PID:3124
-
-
C:\Windows\helppane.exeC:\Windows\helppane.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\egfzwg\Agghosts.exe"C:\egfzwg\Agghosts.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4188 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4188 -s 13563⤵
- Program crash
PID:4744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4188 -s 13243⤵
- Program crash
PID:1976
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4188 -ip 41881⤵PID:2968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4188 -ip 41881⤵PID:1708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD55aab297fa8f143bfa67310ad78b76d3f
SHA15db963c2cca1bc8c8c060c52f7df76ccb477f01a
SHA2568ec64bc55e5641d7683288e5e8e27c9391f06eb4da096c3d677d8f25ca4d04df
SHA512c1ee67bd4c6bcfdc4179f905c7abc4ac632c9265b61dd5fdb90eeeec39802abe2cc487a5c8ded8a0748728104170c1b4d3a88904f102e1c3f891fac7702a2256
-
Filesize
157KB
MD54c0049dab2c53c5a6997e49734dba61c
SHA12ee93a6536e99922bf202d45631bcbaef1f79135
SHA25658d7576d19f750715654041c97cf5911cf6f65b38cc39ffc08dfe346d463fca4
SHA51294a1299210cdafbcded34ce1173613b7b2c388130771403462373f4389d07561987a9d4e3f87906073b05cd4511397d809242e0fa4acb1e8ef11e2c7f4829a0c
-
Filesize
123KB
MD55e426092839f4fb2b77b10968500b6f7
SHA196e0be8e3975f93d429b27869fe3353c8462757b
SHA256ed419431870a7bf25a04d1919023837b350f5956f05d683cc25ef0debf47e69c
SHA5129c1d55ff14d57711d2f3a4fb04adf62f2a186ef7b4160ca37178a413ebb3b20c703d9380e6d54b3d03a4e1cd97b44f66cf6f5a67028e1a4cc34e74f576915a46
-
Filesize
77KB
MD5f107a3c7371c4543bd3908ba729dd2db
SHA1af8e7e8f446de74db2f31d532e46eab8bbf41e0a
SHA25600df0901c101254525a219d93ff1830da3a20d3f14bc323354d8d5fee5854ec0
SHA512fd776f8ceaac498f4f44819794c0fa89224712a8c476819ffc76ba4c7ff4caa9b360b9d299d9df7965387e5bbcb330f316f53759b5146a73b27a5f2e964c3530