Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2023 08:30
Static task
static1
Behavioral task
behavioral1
Sample
6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe
Resource
win10v2004-20231215-en
General
-
Target
6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe
-
Size
951KB
-
MD5
c6f4b84ea898f6a46cf5c4d78b84b58d
-
SHA1
9a70d273c9e6c05dc8ca1d449eb7bf9bbe0206a1
-
SHA256
6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814
-
SHA512
a7cd8277ae8da1103c825a9b66c184428d86e13924d6edef6f0dc247b5e8258e7645e6945fe379950722e206d3f2cb949c3fbff34d3171b2335a339e0f833cdf
-
SSDEEP
24576:k0FaewhcAu6vcEDdNAlRQY1IJQTGngTqhG7:itw4cEDd2l12iTGnWqh
Malware Config
Signatures
-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral2/memory/2184-56-0x0000000003960000-0x0000000003AAD000-memory.dmp family_gh0strat behavioral2/memory/2184-58-0x0000000003960000-0x0000000003AAD000-memory.dmp family_gh0strat -
Fatal Rat payload 2 IoCs
resource yara_rule behavioral2/memory/2184-35-0x0000000001580000-0x00000000015B0000-memory.dmp fatalrat behavioral2/memory/2184-36-0x0000000010000000-0x0000000010029000-memory.dmp fatalrat -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation en.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe -
Deletes itself 1 IoCs
pid Process 1864 WScript.exe -
Executes dropped EXE 2 IoCs
pid Process 2108 en.exe 2184 Agghosts.exe -
Loads dropped DLL 2 IoCs
pid Process 2184 Agghosts.exe 2184 Agghosts.exe -
resource yara_rule behavioral2/files/0x0007000000023226-10.dat upx behavioral2/memory/2108-12-0x0000000000400000-0x0000000000545000-memory.dmp upx behavioral2/memory/2108-20-0x0000000000400000-0x0000000000545000-memory.dmp upx behavioral2/memory/2108-45-0x0000000000400000-0x0000000000545000-memory.dmp upx behavioral2/memory/2184-53-0x0000000003960000-0x0000000003AAD000-memory.dmp upx behavioral2/memory/2184-56-0x0000000003960000-0x0000000003AAD000-memory.dmp upx behavioral2/memory/2184-58-0x0000000003960000-0x0000000003AAD000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Çý¶¯Éú = "C:\\nfbemp\\Agghosts.exe" Agghosts.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Agghosts.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Agghosts.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ helppane.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000_Classes\Local Settings en.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000_Classes\Local Settings 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2184 Agghosts.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2876 helppane.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 2108 en.exe 2108 en.exe 2876 helppane.exe 2876 helppane.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 452 wrote to memory of 2108 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 96 PID 452 wrote to memory of 2108 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 96 PID 452 wrote to memory of 2108 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 96 PID 2876 wrote to memory of 2184 2876 helppane.exe 98 PID 2876 wrote to memory of 2184 2876 helppane.exe 98 PID 2876 wrote to memory of 2184 2876 helppane.exe 98 PID 2108 wrote to memory of 3668 2108 en.exe 99 PID 2108 wrote to memory of 3668 2108 en.exe 99 PID 2108 wrote to memory of 3668 2108 en.exe 99 PID 452 wrote to memory of 1864 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 100 PID 452 wrote to memory of 1864 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 100 PID 452 wrote to memory of 1864 452 6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe"C:\Users\Admin\AppData\Local\Temp\6a60bb89f83b1bf201e2552ed71ff0c7d24f3620992c82382e266f88feeb0814.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Public\Pictures\en\en.exeC:\Users\Public\Pictures\en\en.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Public\Pictures\en\tem.vbs"3⤵PID:3668
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\tem.vbs"2⤵
- Deletes itself
PID:1864
-
-
C:\Windows\helppane.exeC:\Windows\helppane.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\nfbemp\Agghosts.exe"C:\nfbemp\Agghosts.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:2184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
275B
MD51cfa0bfd5509dbc83ca1e2a819bceaf1
SHA180c89fd052ddf749fbbc0725c49837cb37669ef6
SHA2564b4af0a6021b734f292dbddb3f13b6aca9e3ee77c07c688d73f2f0da67eab4ac
SHA5120daef18479f8901902d89974fe4306cca000904c3e471cbac2c41d1d375b73284b1852eae18ac09e30db68b15f16dc4c21439966056f7b677e5f0cdeadba8242
-
Filesize
618KB
MD5a42deae0974ab7c9122370bfba837fe6
SHA1237ff0b63a56126542a9cb103c7cbfc397ada84b
SHA25636ad631425f128b45e48d26d11e8750f44aa4d4802d60cff4dc7ab9577639b74
SHA5129ea8820f7da135a9188b1cca234cdc7080e7dade8b69b9e8c79569fa9c5c49406d8e3b84bdae0b29aa5f836804f9c855f7c662ceb9d152cff1dd01478996fcad
-
Filesize
201B
MD55874194ca45bbcdef0cd97b4dd74f67b
SHA179463b9eea30ce54006f5ed141967401c3a39be5
SHA25625435af4b04471ae098fc67306bf5b855c1df60c2274ce473b683b10b5359fce
SHA51273db0899d3afbd03021be4394b7250577cad3fc221365a35b1fb51a1aeaa35b9ca252ee76d93ef74303b4b362e0a4efc6064adafebbbfddc98c0a56176ed423a
-
Filesize
23KB
MD55aab297fa8f143bfa67310ad78b76d3f
SHA15db963c2cca1bc8c8c060c52f7df76ccb477f01a
SHA2568ec64bc55e5641d7683288e5e8e27c9391f06eb4da096c3d677d8f25ca4d04df
SHA512c1ee67bd4c6bcfdc4179f905c7abc4ac632c9265b61dd5fdb90eeeec39802abe2cc487a5c8ded8a0748728104170c1b4d3a88904f102e1c3f891fac7702a2256
-
Filesize
157KB
MD56d4775f18b2ee05bb4763d3080d36bbe
SHA1cdf9525b39409515b350d02b91bff61aac3cd55f
SHA25623bb3a8e6cd6be562f57e98441888782f8f0d8d8ce456a9a40bf711a68a34c97
SHA51245368d3468e45324362eded3905d16850136318acf88c9d8d9590f77fb912d423fe52f24ab3b0b4d001605692e2d0627ba1463de533b96724cd25a8548cf9e82
-
Filesize
123KB
MD5daa799b7defab6d9867c5d519b36611f
SHA14020d8587c28df934bd460b4dc953561be61e4ff
SHA2566cec316645c5abc4f31eb25f3f09f462f843fc73b9c1db79c5f580c6773e8d00
SHA51252979cb556129d2efd2615001cfd5dab74066c9ed45d46746c02d71f6418b92a61fc5dc4c182089d2bc66d7d1a5e461b8fa60702f872d63194412bc4fa699777
-
Filesize
77KB
MD5f107a3c7371c4543bd3908ba729dd2db
SHA1af8e7e8f446de74db2f31d532e46eab8bbf41e0a
SHA25600df0901c101254525a219d93ff1830da3a20d3f14bc323354d8d5fee5854ec0
SHA512fd776f8ceaac498f4f44819794c0fa89224712a8c476819ffc76ba4c7ff4caa9b360b9d299d9df7965387e5bbcb330f316f53759b5146a73b27a5f2e964c3530