Analysis

  • max time kernel
    102s
  • max time network
    100s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    18-02-2024 16:01

General

  • Target

    Avc.exe

  • Size

    7.8MB

  • MD5

    9f6000733ad51ff5a95be62811855e5f

  • SHA1

    7ff7d76aa4f0984b65c06f942530efd0160c9a0e

  • SHA256

    34df26560bc85bd15133870be420b25782c037e5fdaba57d7c35080203ed251c

  • SHA512

    32addd254dee4af155fe96d5e918c54f20798d0d23590a861cef0c2db1ac2569230846d8d9473855422b8dc2be2960905cf0198ba9a740b8bf38581ad0873460

  • SSDEEP

    196608:NuBUad84j8rER0TAQGC3Lzec+OFy8fR0Vt22F9Q:NgUK8LTAEDPp+Vt22o

Malware Config

Signatures

  • FatalRat

    FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

  • Fatal Rat payload 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 12 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 14 IoCs
  • Modifies data under HKEY_USERS 22 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 51 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Avc.exe
    "C:\Users\Admin\AppData\Local\Temp\Avc.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2288
    • C:\Users\Admin\AppData\Local\Temp\2288f7672cf\AdiApi0.3.exe
      "C:\Users\Admin\AppData\Local\Temp\2288f7672cf\AdiApi0.3.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2616
      • C:\Users\Admin\AppData\Local\Temp\AdiApi0.3.exe
        "C:\Users\Admin\AppData\Local\Temp\AdiApi0.3.exe"
        3⤵
        • Executes dropped EXE
        • Modifies system certificate store
        PID:1504
      • C:\Users\Admin\AppData\Local\Temp\selenium.exe
        "C:\Users\Admin\AppData\Local\Temp\selenium.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        PID:2828
  • C:\Windows\selenium.exe
    C:\Windows\selenium.exe
    1⤵
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2476
    • C:\Windows\selenium.exe
      C:\Windows\selenium.exe Win7
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Checks processor information in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F59A01A8B782D93EA6991BC172CEFFB1

    Filesize

    867B

    MD5

    c5dfb849ca051355ee2dba1ac33eb028

    SHA1

    d69b561148f01c77c54578c10926df5b856976ad

    SHA256

    cbb522d7b7f127ad6a0113865bdf1cd4102e7d0759af635a7cf4720dc963c53b

    SHA512

    88289cdd2c2dd1f5f4c13ab2cf9bc601fc634b5945309bedf9fc5b96bf21697b4cd6da2f383497825e02272816befbac4f44955282ffbbd4dd0ddc52281082da

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9211a2f46fcfd4fac86cd7e23f7359b5

    SHA1

    25ace01197fc24bf0c72508a800729df3eb8df4b

    SHA256

    183dba4c51348ad34db383c97431fa238965f779978726223347de7be4330281

    SHA512

    3d2eb55a3f1c1d3381f283627adf972865cf55446c2779ea98bb80d7f0f73373c7c14959cbd80403a314857be28b1a4b5a1a25020b6c51439283fd81b097cee5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d1482c5164b8e86121d035e14d8dd8ed

    SHA1

    1fb730fceafe240542bf6345e6f7e3660f627d7b

    SHA256

    f4e57f48350b0252b0b715af4cf6e913c2b2cfe8504903cbdf5f802c6e256187

    SHA512

    82c4e47e0d8e4398b42cf61b4a345c6928047cc9d8a56a3174ae1a309e184d849250b9f884b35aa347530f4a8cb3b2718583e04aac212bcd63d13bb1c80bb309

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    148e571f0b206b8eb31e25f64a028e51

    SHA1

    e496415bbcf2bb3c468811c5d5ebfa65dca53e48

    SHA256

    e0e6eebd51b910caba282cf015e9086da16a7b6a42a250530b60aecee23b9ddf

    SHA512

    2c864374d1ef5014557def6eda96b7322b5218bf56f804106b23daa8db45c87bcc250f9640173f33a457fcf2fc3a3d928ee98cce09c3aebb1869fbc557d5ab48

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d1dd8c494d1a96a22ba6d407fe18515b

    SHA1

    99bad2aae976a10ecc65d41bb6c8a7eee965bc53

    SHA256

    7d1a6695c6a5aa40f8e41355335924a55bee12b3a2a7620fc581594337809206

    SHA512

    6e34ce81fab9e6c4709537f8c8741d846b8fa23897ea957507356838bccbf7ce13abdad0ce5bf30a1fde3f6b3c124f15bb3fd56ebdacec29f6c6af440348e6ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F59A01A8B782D93EA6991BC172CEFFB1

    Filesize

    242B

    MD5

    e490280b1dcecf7d9265de67d5c0dfe3

    SHA1

    955007d5bd60f4ee93eef726387604577f919b6b

    SHA256

    e8686145ca9ff6397d5b282e000953f5cec20061758e077d76983cc7765a5260

    SHA512

    1d50878014608778f8c9d688f31c20694b7c36f24b0ed0f98539f9b83a1dc7ff6424a6314866c415d875954e3f0a5bdd288fea5ab2057db566955c7124bd9d74

  • C:\Users\Admin\AppData\Local\Temp\2288f7672cf\AdiApi0.3.exe

    Filesize

    896KB

    MD5

    256d8418c09c1151b0f6da2f04afa55b

    SHA1

    4012449da084ba07341f9870b10fcd978a254805

    SHA256

    210111701679dd2c1f1bec8fcf791dc54f8af1275faba306edbe802e629bc424

    SHA512

    94a1610660cc36ed18b96f906a0e44160abd957b43b1ed81514778d23e833e390b444d7b467c865e525543e9f7d0af94cdd199afb9c1d80f6b889f8a71f3acdf

  • C:\Users\Admin\AppData\Local\Temp\2288f7672cf\AdiApi0.3.exe

    Filesize

    1.5MB

    MD5

    f09618ac09713f7b8231be6ce24aed10

    SHA1

    2202b0cd4fae9d2b0247abcb72b7a17040ac4c18

    SHA256

    e19f211337a57ddc07f2b27a0d544d96262d20b0af3c36e7443c28a7af1d0ef7

    SHA512

    6f55c458e30ee47b5f24b6fcf4849ee6985612ac7ff5dd4f5b49f284a567fe40596f84f1bde1d5d6c617cb67430800e833969c8817a2fb101247f7ad59652d5a

  • C:\Users\Admin\AppData\Local\Temp\AdiApi0.3.exe

    Filesize

    2.0MB

    MD5

    eb9d59f8d586cf1086f3c378cbaf4630

    SHA1

    5df403db4899731379bc9218c9299d76ef306f6e

    SHA256

    71483365a3f84f1ca55b5e068eddc4e861ed489e9767084d15e71cea6d4cda15

    SHA512

    5610944b69daf5e7ef4daf02531822cb705fea67f35c46897154538c91b8bec2926685f757f6816399a76a8851d339b294a6245b6fd0babbcfbace0f0bf4a889

  • C:\Users\Admin\AppData\Local\Temp\AdiApi0.3.exe

    Filesize

    1.8MB

    MD5

    316a67a685dca3cd865fb6313df2a616

    SHA1

    0576820f5685ed046746a763200ce64d981b352b

    SHA256

    7d78c1bf276764578032f59fee42b4c8ef59ec29ed33bd181ee576b4ef9c775e

    SHA512

    e56f6de72055896cb9e2d58666b47b74c91c1735014515d0c65c28c751e9a8a68a7392c20e28f42d54c894f00349f912cca48fd9e232f1f004b882a375c92eeb

  • C:\Users\Admin\AppData\Local\Temp\AdiApi0.3.exe

    Filesize

    3.1MB

    MD5

    5e94fe0d9cd0f2d54af457e917d8725f

    SHA1

    2e63999e26c85780576f5fa8eb293d797d3b7649

    SHA256

    e48762789a34d1872ce3c794e379c5a39f1a636bca0adb3ef7e86c0e7ab18512

    SHA512

    f5d2f2024682219581995be42c90d756869826c50447514266f6600b9e6a1ce425b71e68f45e9f84ef9a15e407a51a4434acfc611754a4976147cc0d3e4718c3

  • C:\Users\Admin\AppData\Local\Temp\Cab9465.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarA1C0.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Local\Temp\selenium.exe

    Filesize

    192KB

    MD5

    b729a5b7077af4f0d8b368b7adc87e4c

    SHA1

    dd380033d8165c2826d3beed28aa469ffe0261cc

    SHA256

    3551f9c2c84ef2f1e65ecc02aeeefb35a486a672a569f4fd55b616b70a20629e

    SHA512

    6b9bd96e961c719b378bf6326da541bbb85dea4c6b805506c7545c2bbc7083781c52ff1dd31801f4b2b30a550d8b34eb5bec39af060733e696df113b5b1ba2df

  • \Users\Admin\AppData\Local\Temp\2288f7672cf\AdiApi0.3.exe

    Filesize

    448KB

    MD5

    d9187e72f7ec947931d2256d4456d570

    SHA1

    9585d655d5adf76e4fe0883026ba76b82feba4ef

    SHA256

    c5ddbb85ad0203226d77d33c92e3bc640e60066256b10a478c0c3a4ef94fea01

    SHA512

    10e1b18ce56c07fd9b0a2cf377f9c7a9844347daaaccf88a138b0556b22478c80bb5dfa822747f5fa6c39a8db140496d2f74a0a79e9d3ccf169c937cea3f34b8

  • \Users\Admin\AppData\Local\Temp\2288f7672cf\AdiApi0.3.exe

    Filesize

    1.6MB

    MD5

    a149dc6eaa8b0c3c0d135f72b075b908

    SHA1

    4875510a97e6134111fb78b83a1e762905fb273d

    SHA256

    88a633e2ac096aabd07924a8ee6d7a37c40b0771ab830e1390aa0ddd1093612b

    SHA512

    c104af6a8b9b3d153874272e78aed11048df08dead37bad20eec0d3b3a722e1c812060f484d4fe929a088ba5bc928fa3935e46ee61204a788d4d99a5872937e9

  • \Users\Admin\AppData\Local\Temp\2288f7672cf\AdiApi0.3.exe

    Filesize

    192KB

    MD5

    bf7a423ec02ed093cc82f2577796b2f9

    SHA1

    c882fe5d4629b92104059bf57fd778a97ed14319

    SHA256

    b005a1c68440bdd72dcfeadf1c1d833899f7c8c86d258ef147390787aaba41de

    SHA512

    1fe1332f8623a9251b698e498f2d21d602ed524a3ed6f42ae451f03f447f3e5c947670e4544cdeedc56694dcbe12701922e558c80dec2bf3cfc197aaf0fde8b4

  • \Users\Admin\AppData\Local\Temp\2288f7672cf\AdiApi0.3.exe

    Filesize

    128KB

    MD5

    861c5d8c2ef8480f4967115dc98db3c8

    SHA1

    6858ab2933e162e2cd0d39afba6674e650ccf09f

    SHA256

    487f5b734c8d072e3f081b0c3de23b62abc53fce9821eed10c0d6e4eb30dc6c4

    SHA512

    82ac5300c5e7e2d4525a12fb424e713e2b592c456a1c8c3bdd1fd677a5ba0d766e8088ef289edcbbac9316868fc24b05f8ad14c6a9e8ac2ed502a5bc37b25f34

  • \Users\Admin\AppData\Local\Temp\2288f7672cf\SkinH_EL.dll

    Filesize

    86KB

    MD5

    114054313070472cd1a6d7d28f7c5002

    SHA1

    9a044986e6101df1a126035da7326a50c3fe9a23

    SHA256

    e15d9e1b772fed3db19e67b8d54533d1a2d46a37f8b12702a5892c6b886e9db1

    SHA512

    a2ff8481e89698dae4a1c83404105093472e384d7a3debbd7014e010543e08efc8ebb3f67c8a4ce09029e6b2a8fb7779bb402aae7c9987e61389cd8a72c73522

  • \Users\Admin\AppData\Local\Temp\2288f7672cf\TApi.dll

    Filesize

    1.5MB

    MD5

    825bcc3315dfb8f82c7f15a502bd013f

    SHA1

    53eea664c10c3d41c343045e1f34a81d410f1493

    SHA256

    1703773f1de625e673a07d4899c7bc85c0badc49a1168a216b21251da34907be

    SHA512

    a0ad3ae527a4d1a8b22071b52cdadddd2c728cf46246d7395e81d2d06ae8da550d1738b2e62caaf6f7aa7fdc8ea900001eac0ac6cc569e8470285d1c332bff26

  • \Users\Admin\AppData\Local\Temp\2288f7672cf\TLib.dll

    Filesize

    707KB

    MD5

    84d18da644ec2559aa8a9f5cdc3948c0

    SHA1

    660c10a221ace21b418e526de45453ef972e66c1

    SHA256

    b8ab64b00c2cb719d7dabdacf17187ff75e053aad1aeae7298b4e596a6edf354

    SHA512

    5d9e3e639995a921d0ec4fe591ceda6541895e07987644d7fdd039289e828564bb918a4ed0f6c6304ef8a89013b8dd05ddfa09ce51049e0ea1f45899e294c864

  • \Users\Admin\AppData\Local\Temp\2288f7672cf\t_baibaoyun_win32.dll

    Filesize

    512KB

    MD5

    216363a553508566f05dfac57731fa47

    SHA1

    10ae354fa3d6fb1887da4a4fe2fbea39f04ccb87

    SHA256

    0eb773286176541764e6ce7713d0e26f94eab0289774d9d03b95a7a92ad0c03f

    SHA512

    37e285d95ff87f02e6c3f64ab16bfdc93f83f1e1ca2bb2684c4593e0609b960b979d9715b7f11f966f4cfa494077e41ff4dc0ff2c3d4236adcc6d540fcb7870d

  • \Users\Admin\AppData\Local\Temp\AdiApi0.3.exe

    Filesize

    2.1MB

    MD5

    71408de5d88cd1158bda22bcf8c9e8c4

    SHA1

    55d637a61c3eee9c5ce2f2f65f21cdde950f5b93

    SHA256

    eeec111831f93b9fadf26f4fa582bfec4ff2b2a9689dc23ce66a234021d9703d

    SHA512

    a02207ae78fabf90406158581410adb6578ec1e2645b7a9b3946d83f5bf36f9db19c2bb6aeba88506eda336a2111aaff6be07d0add760e0caaf55488731e5d3a

  • \Users\Admin\AppData\Local\Temp\AdiApi0.3.exe

    Filesize

    64KB

    MD5

    65e383cb49bb2efb691a7b49e34eec6b

    SHA1

    e4f3f4d928f1b36995a36e791db589973a974d78

    SHA256

    6e235cb599ce04342019fc8f84bf6e18e40f5a4cae745affb6768f4ec0e0dfd9

    SHA512

    6cb70d21c91cc7bd5f8a72c87d30f84dfade1de5df4454489a10aa3cebeb199a522129b5dcb4a139fb33afcad3b1ab8929d6d0fdc692ccdf2bd1064735bdc86c

  • memory/2288-0-0x0000000003900000-0x0000000003EBC000-memory.dmp

    Filesize

    5.7MB

  • memory/2288-244-0x00000000068C0000-0x00000000068E0000-memory.dmp

    Filesize

    128KB

  • memory/2288-38-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2288-41-0x0000000075F60000-0x0000000076BAA000-memory.dmp

    Filesize

    12.3MB

  • memory/2288-44-0x0000000075F60000-0x0000000076BAA000-memory.dmp

    Filesize

    12.3MB

  • memory/2288-243-0x00000000068C0000-0x00000000068E0000-memory.dmp

    Filesize

    128KB

  • memory/2288-242-0x00000000068C0000-0x00000000068E0000-memory.dmp

    Filesize

    128KB

  • memory/2288-37-0x0000000075F60000-0x0000000076BAA000-memory.dmp

    Filesize

    12.3MB

  • memory/2288-253-0x00000000068C0000-0x00000000068E0000-memory.dmp

    Filesize

    128KB

  • memory/2288-256-0x00000000068C0000-0x00000000068E0000-memory.dmp

    Filesize

    128KB

  • memory/2288-347-0x0000000075F60000-0x0000000076BAA000-memory.dmp

    Filesize

    12.3MB

  • memory/2288-28-0x0000000075F60000-0x0000000076BAA000-memory.dmp

    Filesize

    12.3MB

  • memory/2288-724-0x00000000068C0000-0x00000000068E0000-memory.dmp

    Filesize

    128KB

  • memory/2288-65-0x0000000075F60000-0x0000000076BAA000-memory.dmp

    Filesize

    12.3MB

  • memory/2288-695-0x0000000075F60000-0x0000000076BAA000-memory.dmp

    Filesize

    12.3MB

  • memory/2828-95-0x0000000010000000-0x000000001002A000-memory.dmp

    Filesize

    168KB