Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-02-2024 16:01

General

  • Target

    Avc.exe

  • Size

    7.8MB

  • MD5

    9f6000733ad51ff5a95be62811855e5f

  • SHA1

    7ff7d76aa4f0984b65c06f942530efd0160c9a0e

  • SHA256

    34df26560bc85bd15133870be420b25782c037e5fdaba57d7c35080203ed251c

  • SHA512

    32addd254dee4af155fe96d5e918c54f20798d0d23590a861cef0c2db1ac2569230846d8d9473855422b8dc2be2960905cf0198ba9a740b8bf38581ad0873460

  • SSDEEP

    196608:NuBUad84j8rER0TAQGC3Lzec+OFy8fR0Vt22F9Q:NgUK8LTAEDPp+Vt22o

Malware Config

Signatures

  • FatalRat

    FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

  • Fatal Rat payload 2 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 4 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 5 IoCs
  • Modifies data under HKEY_USERS 21 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Avc.exe
    "C:\Users\Admin\AppData\Local\Temp\Avc.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2972
    • C:\Users\Admin\AppData\Local\Temp\2972e576f73\AdiApi0.3.exe
      "C:\Users\Admin\AppData\Local\Temp\2972e576f73\AdiApi0.3.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3580
      • C:\Users\Admin\AppData\Local\Temp\AdiApi0.3.exe
        "C:\Users\Admin\AppData\Local\Temp\AdiApi0.3.exe"
        3⤵
        • Executes dropped EXE
        • Modifies system certificate store
        PID:3972
      • C:\Users\Admin\AppData\Local\Temp\selenium.exe
        "C:\Users\Admin\AppData\Local\Temp\selenium.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        PID:3744
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 2988
      2⤵
      • Program crash
      PID:1560
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 2672
      2⤵
      • Program crash
      PID:2052
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2972 -ip 2972
    1⤵
      PID:2532
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2972 -ip 2972
      1⤵
        PID:4536
      • C:\Windows\selenium.exe
        C:\Windows\selenium.exe
        1⤵
        • Executes dropped EXE
        • Modifies data under HKEY_USERS
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4032
        • C:\Windows\selenium.exe
          C:\Windows\selenium.exe Win7
          2⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • Checks processor information in registry
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4816

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\2972e576f73\AdiApi0.3.exe

        Filesize

        4.2MB

        MD5

        105b09d4258eab5a6cf6c0fc9a845dd1

        SHA1

        1284e3a6ccc8e1ad646fb5846ce2914ab7a422f6

        SHA256

        ce8d345c473a0f91bb3cd532249c86ba16bb6503e984b8dc611a3858af91499c

        SHA512

        085b87c071e1960f505e72abbdbb25b4bd9a0dfb1796b278144597bd9b18d899155cb77a1da3a5dda1ea54cd5ada11ad169995ec9ec3f2ec9411f56650f0140f

      • C:\Users\Admin\AppData\Local\Temp\2972e576f73\AdiApi0.3.exe

        Filesize

        1.3MB

        MD5

        3e64c005b0026379e0113b78dd47cbae

        SHA1

        c0733f23de190820c2af7f5c3fb4d8a96f7a9d10

        SHA256

        d5759281b6dc14047d2fa1f5d001eccd406487afedb4506ea0a236908b4661e9

        SHA512

        a946763ac9aa2c8f6f96175fb3390ef40aa243727b357cbddf4c249ce36004735087a711463073a654643a4aed7df70d2bc74ef4a24a787cc5c9b173f08f14d6

      • C:\Users\Admin\AppData\Local\Temp\2972e576f73\AdiApi0.3.exe

        Filesize

        960KB

        MD5

        52ba96b001131fe42817cdc7cddc56ed

        SHA1

        4c9fae7d375ae9def3f4ee0b2f39f3288ea39e65

        SHA256

        424d1d095f3e5fc107396d1aeff8de1d99593b1793c8b8d4eedfe8fc65a11214

        SHA512

        b4ce4c6edf93b5bea14dbd82e896bbaab1909256e5b54012092537bc36fb9953a299144ad298241dcbfac07d1d1da5c2328a069b531e4c9f396946eca9d9acc8

      • C:\Users\Admin\AppData\Local\Temp\2972e576f73\SkinH_EL.dll

        Filesize

        86KB

        MD5

        114054313070472cd1a6d7d28f7c5002

        SHA1

        9a044986e6101df1a126035da7326a50c3fe9a23

        SHA256

        e15d9e1b772fed3db19e67b8d54533d1a2d46a37f8b12702a5892c6b886e9db1

        SHA512

        a2ff8481e89698dae4a1c83404105093472e384d7a3debbd7014e010543e08efc8ebb3f67c8a4ce09029e6b2a8fb7779bb402aae7c9987e61389cd8a72c73522

      • C:\Users\Admin\AppData\Local\Temp\2972e576f73\TApi.dll

        Filesize

        1.8MB

        MD5

        20a87544961d0189b6f180fb330e96bd

        SHA1

        4eb6d4edecad1472ede74989753043704b754300

        SHA256

        e3a682bc9ab15846da7105c819b138c9aee29fbf43ab4c9d349ea9bac9ed6773

        SHA512

        239034fc0c7544556508f6a4c56697c1ed2b36a1c025c2429e1600c8b8497c82a10db9cb4093be3a74e597084c7397b576021b764173bb1a04c8de9a41fc59a6

      • C:\Users\Admin\AppData\Local\Temp\2972e576f73\TLib.dll

        Filesize

        707KB

        MD5

        84d18da644ec2559aa8a9f5cdc3948c0

        SHA1

        660c10a221ace21b418e526de45453ef972e66c1

        SHA256

        b8ab64b00c2cb719d7dabdacf17187ff75e053aad1aeae7298b4e596a6edf354

        SHA512

        5d9e3e639995a921d0ec4fe591ceda6541895e07987644d7fdd039289e828564bb918a4ed0f6c6304ef8a89013b8dd05ddfa09ce51049e0ea1f45899e294c864

      • C:\Users\Admin\AppData\Local\Temp\2972e576f73\t_baibaoyun_win32.dll

        Filesize

        1.2MB

        MD5

        22fb4088016272b0284a927187d89808

        SHA1

        ced1857001bb07529f3e4d5d66a00fca586081a3

        SHA256

        960fdf8a31e985b7c69b934ad3f19b55f4d52804113401060a7b7a7cf79391df

        SHA512

        6c195991a47694885acc429e192c29056e056ee3fb8d2dfa45cbb977cc129c80e1f8718ceba6686e47144dfa60515bf45cd2eee008cbfc0df5a7ea706758b116

      • C:\Users\Admin\AppData\Local\Temp\AdiApi0.3.exe

        Filesize

        5.5MB

        MD5

        05c25bb5caee227e2ed2c2b38e2395b6

        SHA1

        9907306807538b2c1b36811b13bb906875d69898

        SHA256

        3eec960d10b47b72a298c8ee18a24a9d1ee3daa16ea22cf26f27bcb0d6667628

        SHA512

        77bfb1e473a9420465e8edca225eb65174c6b883a1c1249033bd34e19ba3a96aba42a64d12e93772baaa162cd4a72d0e36b906e6bc70b9847869bbda70b2e1cb

      • C:\Users\Admin\AppData\Local\Temp\AdiApi0.3.exe

        Filesize

        1.8MB

        MD5

        316a67a685dca3cd865fb6313df2a616

        SHA1

        0576820f5685ed046746a763200ce64d981b352b

        SHA256

        7d78c1bf276764578032f59fee42b4c8ef59ec29ed33bd181ee576b4ef9c775e

        SHA512

        e56f6de72055896cb9e2d58666b47b74c91c1735014515d0c65c28c751e9a8a68a7392c20e28f42d54c894f00349f912cca48fd9e232f1f004b882a375c92eeb

      • C:\Users\Admin\AppData\Local\Temp\AdiApi0.3.exe

        Filesize

        2.0MB

        MD5

        01779e1db5d207644178707638bfaf46

        SHA1

        f5a473a4a458a3205f84d3d354a50255633fcf1c

        SHA256

        2d8438b3f3917ae50bf702c81450f6b2b9a6bf26d37480ac746fa6ee60ac84ac

        SHA512

        bb092587986efa81bf18ba35a64780844609d94270461ec683940a4406f997e2ad503b0f6f380f65b1f16343b3f5c906aded3fe74092d144f6a26ef9140b3149

      • C:\Users\Admin\AppData\Local\Temp\selenium.exe

        Filesize

        192KB

        MD5

        b729a5b7077af4f0d8b368b7adc87e4c

        SHA1

        dd380033d8165c2826d3beed28aa469ffe0261cc

        SHA256

        3551f9c2c84ef2f1e65ecc02aeeefb35a486a672a569f4fd55b616b70a20629e

        SHA512

        6b9bd96e961c719b378bf6326da541bbb85dea4c6b805506c7545c2bbc7083781c52ff1dd31801f4b2b30a550d8b34eb5bec39af060733e696df113b5b1ba2df

      • memory/2972-47-0x0000000010000000-0x000000001003E000-memory.dmp

        Filesize

        248KB

      • memory/2972-67-0x0000000077830000-0x0000000077DE3000-memory.dmp

        Filesize

        5.7MB

      • memory/2972-48-0x0000000010000000-0x000000001003E000-memory.dmp

        Filesize

        248KB

      • memory/2972-21-0x0000000077830000-0x0000000077DE3000-memory.dmp

        Filesize

        5.7MB

      • memory/2972-46-0x0000000010000000-0x000000001003E000-memory.dmp

        Filesize

        248KB

      • memory/2972-44-0x0000000010000000-0x000000001003E000-memory.dmp

        Filesize

        248KB

      • memory/3744-103-0x0000000010000000-0x000000001002A000-memory.dmp

        Filesize

        168KB

      • memory/4032-111-0x0000000010000000-0x000000001002A000-memory.dmp

        Filesize

        168KB