Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
14-01-2024 03:03
Static task
static1
Behavioral task
behavioral1
Sample
5a1bb777d4127a871626f9276771ecca.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5a1bb777d4127a871626f9276771ecca.exe
Resource
win10v2004-20231215-en
General
-
Target
5a1bb777d4127a871626f9276771ecca.exe
-
Size
818KB
-
MD5
5a1bb777d4127a871626f9276771ecca
-
SHA1
727930ec9e050478e53a99bef15bc035a0404dff
-
SHA256
e118e14e52a9fc203dc91df7ea00a8dd047379a56f9ddff0334cc16428f07d5e
-
SHA512
bc478bce7a24f68c585f413f5b33d8cbbade33d1f1c2b9b2c28bde4d38c4536cc958a1912a9d0cbea320e24ebfe0a4a1587e084da6950004178584e3b60555c3
-
SSDEEP
12288:EVWZDtv7F0izVusS8Av3KAXcpy9Hh9B2d:qQDt48Av6ECydj+
Malware Config
Signatures
-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Fatal Rat payload 1 IoCs
resource yara_rule behavioral1/memory/2660-2-0x0000000010000000-0x000000001002A000-memory.dmp fatalrat -
Executes dropped EXE 2 IoCs
pid Process 2436 Jklmno.exe 2616 Jklmno.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Jklmno.exe 5a1bb777d4127a871626f9276771ecca.exe File opened for modification C:\Windows\Jklmno.exe 5a1bb777d4127a871626f9276771ecca.exe File opened for modification C:\Windows\Jklmno.exe Jklmno.exe File created C:\Windows\Jklmno.exe Jklmno.exe -
Modifies data under HKEY_USERS 16 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SYSTEM Jklmno.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft Jklmno.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows Jklmno.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion Jklmno.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies Jklmno.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableLockWorkstation = "1" Jklmno.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System Jklmno.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableLockWorkstation = "1" Jklmno.exe Set value (str) \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Services\Jklmno Qrstuvwx\Group = "Fatal" Jklmno.exe Set value (str) \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Services\Jklmno Qrstuvwx\InstallTime = "2024-01-14 03:03" Jklmno.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Jklmno.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet Jklmno.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Services\Jklmno Qrstuvwx Jklmno.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System Jklmno.exe Key created \REGISTRY\USER\.DEFAULT\Software Jklmno.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Services Jklmno.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2660 5a1bb777d4127a871626f9276771ecca.exe Token: SeDebugPrivilege 2436 Jklmno.exe Token: SeDebugPrivilege 2616 Jklmno.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2616 2436 Jklmno.exe 29 PID 2436 wrote to memory of 2616 2436 Jklmno.exe 29 PID 2436 wrote to memory of 2616 2436 Jklmno.exe 29 PID 2436 wrote to memory of 2616 2436 Jklmno.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a1bb777d4127a871626f9276771ecca.exe"C:\Users\Admin\AppData\Local\Temp\5a1bb777d4127a871626f9276771ecca.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
C:\Windows\Jklmno.exeC:\Windows\Jklmno.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\Jklmno.exeC:\Windows\Jklmno.exe Win72⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152KB
MD5b02e46db6e44bab74dccf4cfd14a1076
SHA1295a06cc304356f7f9671c03fc858dc071e1f391
SHA25624448f93ddeadd0d1c71f273e6a080f0f6200cc0c753f88efb06fced3c816ebf
SHA512a53948cdef001502e0dc17c0ecf5331dfcff78c54b41d3a4bd11cbe73afe61a55339689d5192fcad7e7f2a805a7b8ada4fadd3b6e637738c589d5c91603e77b4
-
Filesize
818KB
MD55a1bb777d4127a871626f9276771ecca
SHA1727930ec9e050478e53a99bef15bc035a0404dff
SHA256e118e14e52a9fc203dc91df7ea00a8dd047379a56f9ddff0334cc16428f07d5e
SHA512bc478bce7a24f68c585f413f5b33d8cbbade33d1f1c2b9b2c28bde4d38c4536cc958a1912a9d0cbea320e24ebfe0a4a1587e084da6950004178584e3b60555c3