Overview
overview
10Static
static
10IFProtects...ts.exe
windows7-x64
6IFProtects...ts.exe
windows10-2004-x64
1IFProtects...s2.exe
windows7-x64
1IFProtects...s2.exe
windows10-2004-x64
6IFProtects...ut.exe
windows7-x64
3IFProtects...ut.exe
windows10-2004-x64
3active/WebUnion.exe
windows7-x64
1active/WebUnion.exe
windows10-2004-x64
6d86645adc1...sm.exe
windows7-x64
1d86645adc1...sm.exe
windows10-2004-x64
10d86645adc1...df.lnk
windows7-x64
3d86645adc1...df.lnk
windows10-2004-x64
10fgyjk/03F7...BF.exe
windows7-x64
6fgyjk/03F7...BF.exe
windows10-2004-x64
6wyanoc/Agghosts.exe
windows7-x64
10wyanoc/Agghosts.exe
windows10-2004-x64
10xiuxiu-/we...ss.exe
windows7-x64
10xiuxiu-/we...ss.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2024 02:42
Behavioral task
behavioral1
Sample
IFProtects/Protects/AAProtects.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
IFProtects/Protects/AAProtects.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
IFProtects/Protects/AAProtects2.exe
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
IFProtects/Protects/AAProtects2.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
IFProtects/lWAbout/IWAbout.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
IFProtects/lWAbout/IWAbout.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
active/WebUnion.exe
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
active/WebUnion.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral9
Sample
d86645adc1cdc9e4ad55f0bb801525e5f08a4c52efbf8043ad4fffcfaa311cef/Dism.exe
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
d86645adc1cdc9e4ad55f0bb801525e5f08a4c52efbf8043ad4fffcfaa311cef/Dism.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
d86645adc1cdc9e4ad55f0bb801525e5f08a4c52efbf8043ad4fffcfaa311cef/Document.pdf.lnk
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
d86645adc1cdc9e4ad55f0bb801525e5f08a4c52efbf8043ad4fffcfaa311cef/Document.pdf.lnk
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
fgyjk/03F76412C9334BF.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
fgyjk/03F76412C9334BF.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
wyanoc/Agghosts.exe
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
wyanoc/Agghosts.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral17
Sample
xiuxiu-/webprocess.exe
Resource
win7-20231215-en
General
-
Target
wyanoc/Agghosts.exe
-
Size
23KB
-
MD5
5aab297fa8f143bfa67310ad78b76d3f
-
SHA1
5db963c2cca1bc8c8c060c52f7df76ccb477f01a
-
SHA256
8ec64bc55e5641d7683288e5e8e27c9391f06eb4da096c3d677d8f25ca4d04df
-
SHA512
c1ee67bd4c6bcfdc4179f905c7abc4ac632c9265b61dd5fdb90eeeec39802abe2cc487a5c8ded8a0748728104170c1b4d3a88904f102e1c3f891fac7702a2256
-
SSDEEP
384:08bdzeOuMnujhAz3W1xEuw41M0Jn5DGlIPxh8E9VF0NyEoMe:0wdzeBo4lndw2M8n5DGiPxWE2g
Malware Config
Signatures
-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Fatal Rat payload 2 IoCs
resource yara_rule behavioral16/memory/1896-0-0x0000000001470000-0x0000000001495000-memory.dmp fatalrat behavioral16/memory/1896-1-0x0000000010000000-0x000000001001D000-memory.dmp fatalrat -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Æô¶¯Ïî¹ÜÀí = "C:\\Users\\Admin\\AppData\\Local\\Agghosts.exe" Agghosts.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Æô¶¯Ïî¹ÜÀí = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wyanoc\\Agghosts.exe" Agghosts.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation Agghosts.exe -
Executes dropped EXE 1 IoCs
pid Process 4480 Agghosts.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process 1516 4480 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1896 Agghosts.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1896 wrote to memory of 4480 1896 Agghosts.exe 22 PID 1896 wrote to memory of 4480 1896 Agghosts.exe 22 PID 1896 wrote to memory of 4480 1896 Agghosts.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\wyanoc\Agghosts.exe"C:\Users\Admin\AppData\Local\Temp\wyanoc\Agghosts.exe"1⤵
- Adds Run key to start application
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Local\Agghosts.exe"C:\Users\Admin\AppData\Local\Agghosts.exe"2⤵
- Adds Run key to start application
- Executes dropped EXE
PID:4480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4480 -ip 44801⤵PID:1816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 2281⤵
- Program crash
PID:1516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD55aab297fa8f143bfa67310ad78b76d3f
SHA15db963c2cca1bc8c8c060c52f7df76ccb477f01a
SHA2568ec64bc55e5641d7683288e5e8e27c9391f06eb4da096c3d677d8f25ca4d04df
SHA512c1ee67bd4c6bcfdc4179f905c7abc4ac632c9265b61dd5fdb90eeeec39802abe2cc487a5c8ded8a0748728104170c1b4d3a88904f102e1c3f891fac7702a2256