Analysis
-
max time kernel
141s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
15-03-2024 13:58
Static task
static1
Behavioral task
behavioral1
Sample
ae3efb1b411272af7b33672451bd5826202a22670de9d45e924ee4f630694aad.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
ae3efb1b411272af7b33672451bd5826202a22670de9d45e924ee4f630694aad.dll
Resource
win10v2004-20240226-en
General
-
Target
ae3efb1b411272af7b33672451bd5826202a22670de9d45e924ee4f630694aad.dll
-
Size
988KB
-
MD5
9c1ef756d041773c4bbea023053137b6
-
SHA1
9aa542b974a7f4efb97032d9b41a3695b5c629c4
-
SHA256
ae3efb1b411272af7b33672451bd5826202a22670de9d45e924ee4f630694aad
-
SHA512
09db098308e88450f67a3c9d1d696417b7f02241879d85855d164280ed9a9596dcbe6a96d4f9bf0b473a6fbcb4d37f2681385d59b86a0dca987b8e002b80d277
-
SSDEEP
24576:yj3A8X9TeaAr64xW/9muOBCXMq8Xu/mjJk5YrbqIVZSySsL:CXct9xcouOsXMHXuMJZrbqIWy
Malware Config
Signatures
-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Fatal Rat payload 17 IoCs
resource yara_rule behavioral1/memory/2976-3-0x0000000010000000-0x000000001022E000-memory.dmp fatalrat behavioral1/memory/2976-4-0x0000000000AD0000-0x0000000000AFA000-memory.dmp fatalrat behavioral1/memory/2976-14-0x0000000010000000-0x000000001022E000-memory.dmp fatalrat behavioral1/memory/2976-15-0x0000000010000000-0x000000001022E000-memory.dmp fatalrat behavioral1/memory/2976-16-0x0000000010000000-0x000000001022E000-memory.dmp fatalrat behavioral1/memory/2976-17-0x0000000010000000-0x000000001022E000-memory.dmp fatalrat behavioral1/memory/2976-18-0x0000000010000000-0x000000001022E000-memory.dmp fatalrat behavioral1/memory/2976-19-0x0000000010000000-0x000000001022E000-memory.dmp fatalrat behavioral1/memory/2976-20-0x0000000010000000-0x000000001022E000-memory.dmp fatalrat behavioral1/memory/2976-21-0x0000000010000000-0x000000001022E000-memory.dmp fatalrat behavioral1/memory/2976-22-0x0000000010000000-0x000000001022E000-memory.dmp fatalrat behavioral1/memory/2976-23-0x0000000010000000-0x000000001022E000-memory.dmp fatalrat behavioral1/memory/2976-24-0x0000000010000000-0x000000001022E000-memory.dmp fatalrat behavioral1/memory/2976-25-0x0000000010000000-0x000000001022E000-memory.dmp fatalrat behavioral1/memory/2976-26-0x0000000010000000-0x000000001022E000-memory.dmp fatalrat behavioral1/memory/2976-27-0x0000000010000000-0x000000001022E000-memory.dmp fatalrat behavioral1/memory/2976-28-0x0000000010000000-0x000000001022E000-memory.dmp fatalrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Blocklisted process makes network request 8 IoCs
flow pid Process 2 2976 rundll32.exe 3 2976 rundll32.exe 4 2976 rundll32.exe 5 2976 rundll32.exe 6 2976 rundll32.exe 7 2976 rundll32.exe 8 2976 rundll32.exe 9 2976 rundll32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Wine rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2976 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2976 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2976 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2976 2956 rundll32.exe 28 PID 2956 wrote to memory of 2976 2956 rundll32.exe 28 PID 2956 wrote to memory of 2976 2956 rundll32.exe 28 PID 2956 wrote to memory of 2976 2956 rundll32.exe 28 PID 2956 wrote to memory of 2976 2956 rundll32.exe 28 PID 2956 wrote to memory of 2976 2956 rundll32.exe 28 PID 2956 wrote to memory of 2976 2956 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ae3efb1b411272af7b33672451bd5826202a22670de9d45e924ee4f630694aad.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ae3efb1b411272af7b33672451bd5826202a22670de9d45e924ee4f630694aad.dll,#12⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Blocklisted process makes network request
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2976
-