Analysis

  • max time kernel
    148s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-03-2024 15:57

General

  • Target

    94c42770a1fcfd7ca4da5b31863e888e63937a7ef3937db52826d5a10e2f38fc.exe

  • Size

    888KB

  • MD5

    0a6f134168a6b2274ecbd1ffac7f2baf

  • SHA1

    79154b96f2fa68e98e7effe466027472fb4be523

  • SHA256

    94c42770a1fcfd7ca4da5b31863e888e63937a7ef3937db52826d5a10e2f38fc

  • SHA512

    27f80b5a816592ad37c65ffd70e86891ef163c74a14a8d72b3bac31023888f2f610be07fa201e3b7a8b6ce00646d5c5684768719af1a18edc26123b61091c0b3

  • SSDEEP

    24576:BlPrXQ/dKgXwQ4DbEM7VG3dDDy7FhK0fVTwmXOry3ACK2lQE7:BlzXQ/d/M7VGNveiCBwmXSA

Malware Config

Signatures

  • FatalRat

    FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

  • Fatal Rat payload 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 33 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\94c42770a1fcfd7ca4da5b31863e888e63937a7ef3937db52826d5a10e2f38fc.exe
    "C:\Users\Admin\AppData\Local\Temp\94c42770a1fcfd7ca4da5b31863e888e63937a7ef3937db52826d5a10e2f38fc.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3292
    • C:\Users\Admin\AppData\Local\94c42770a1fcfd7ca4da5b31863e888e63937a7ef3937db52826d5a10e2f38fc.exe
      "C:\Users\Admin\AppData\Local\94c42770a1fcfd7ca4da5b31863e888e63937a7ef3937db52826d5a10e2f38fc.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of AdjustPrivilegeToken
      PID:3192
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5396 --field-trial-handle=2272,i,17338911640954948469,1637568328132129119,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:2756

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\94c42770a1fcfd7ca4da5b31863e888e63937a7ef3937db52826d5a10e2f38fc.exe

      Filesize

      888KB

      MD5

      0a6f134168a6b2274ecbd1ffac7f2baf

      SHA1

      79154b96f2fa68e98e7effe466027472fb4be523

      SHA256

      94c42770a1fcfd7ca4da5b31863e888e63937a7ef3937db52826d5a10e2f38fc

      SHA512

      27f80b5a816592ad37c65ffd70e86891ef163c74a14a8d72b3bac31023888f2f610be07fa201e3b7a8b6ce00646d5c5684768719af1a18edc26123b61091c0b3

    • memory/3192-13090-0x0000000000400000-0x00000000004F3000-memory.dmp

      Filesize

      972KB

    • memory/3192-26169-0x0000000000400000-0x00000000004F3000-memory.dmp

      Filesize

      972KB

    • memory/3192-26163-0x0000000000400000-0x00000000004F3000-memory.dmp

      Filesize

      972KB

    • memory/3192-26162-0x0000000000400000-0x00000000004F3000-memory.dmp

      Filesize

      972KB

    • memory/3192-26160-0x0000000000400000-0x00000000004F3000-memory.dmp

      Filesize

      972KB

    • memory/3192-26159-0x0000000000400000-0x00000000004F3000-memory.dmp

      Filesize

      972KB

    • memory/3192-18974-0x0000000076ED0000-0x0000000076F4A000-memory.dmp

      Filesize

      488KB

    • memory/3192-16965-0x0000000076130000-0x00000000762D0000-memory.dmp

      Filesize

      1.6MB

    • memory/3192-13091-0x0000000076AA0000-0x0000000076CB5000-memory.dmp

      Filesize

      2.1MB

    • memory/3292-13070-0x0000000000400000-0x00000000004F3000-memory.dmp

      Filesize

      972KB

    • memory/3292-13087-0x0000000000400000-0x00000000004F3000-memory.dmp

      Filesize

      972KB

    • memory/3292-13074-0x0000000010000000-0x000000001002A000-memory.dmp

      Filesize

      168KB

    • memory/3292-13073-0x0000000000400000-0x00000000004F3000-memory.dmp

      Filesize

      972KB

    • memory/3292-13072-0x0000000000400000-0x00000000004F3000-memory.dmp

      Filesize

      972KB

    • memory/3292-0-0x0000000000400000-0x00000000004F3000-memory.dmp

      Filesize

      972KB

    • memory/3292-13069-0x0000000000400000-0x00000000004F3000-memory.dmp

      Filesize

      972KB

    • memory/3292-5884-0x0000000076ED0000-0x0000000076F4A000-memory.dmp

      Filesize

      488KB

    • memory/3292-3875-0x0000000076130000-0x00000000762D0000-memory.dmp

      Filesize

      1.6MB

    • memory/3292-1-0x0000000076AA0000-0x0000000076CB5000-memory.dmp

      Filesize

      2.1MB