Analysis
-
max time kernel
118s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
06-04-2024 00:45
Static task
static1
Behavioral task
behavioral1
Sample
9d9961770ec49cd827541c17d730178cc22471848ff75b946b58225570ab39a0.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
9d9961770ec49cd827541c17d730178cc22471848ff75b946b58225570ab39a0.exe
Resource
win10v2004-20240226-en
General
-
Target
9d9961770ec49cd827541c17d730178cc22471848ff75b946b58225570ab39a0.exe
-
Size
1016KB
-
MD5
77b6361879cd2095663baa717c5a33ed
-
SHA1
af5ca68dacc2df0d1868b3a4ca83a1228a7014eb
-
SHA256
9d9961770ec49cd827541c17d730178cc22471848ff75b946b58225570ab39a0
-
SHA512
b951f065bb2b2d7bcf0337d1fb4cfc314c7cceecc184e9cc221a5abdf735662e555f62411523526eb5c203de46ebcf47415ec7cc4ef436a1f0201e7990eb71ba
-
SSDEEP
24576:HEeG1Gv/aSmbdppcBz6z6rgdzDUsQWe0:HEvGnaScZ8fUNAsQW
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral1/files/0x0033000000015cb0-2.dat family_blackmoon -
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Detects executables calling ClearMyTracksByProcess 2 IoCs
resource yara_rule behavioral1/memory/2596-18-0x0000000000170000-0x00000000001A0000-memory.dmp INDICATOR_SUSPICIOUS_EXE_ClearMyTracksByProcess behavioral1/memory/2596-19-0x0000000010000000-0x0000000010029000-memory.dmp INDICATOR_SUSPICIOUS_EXE_ClearMyTracksByProcess -
Fatal Rat payload 2 IoCs
resource yara_rule behavioral1/memory/2596-18-0x0000000000170000-0x00000000001A0000-memory.dmp fatalrat behavioral1/memory/2596-19-0x0000000010000000-0x0000000010029000-memory.dmp fatalrat -
Executes dropped EXE 1 IoCs
pid Process 2596 Agghosts.exe -
Loads dropped DLL 3 IoCs
pid Process 2900 9d9961770ec49cd827541c17d730178cc22471848ff75b946b58225570ab39a0.exe 2596 Agghosts.exe 2596 Agghosts.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Çý¶¯Éú = "C:\\ddeebl\\Agghosts.exe" Agghosts.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Agghosts.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Agghosts.exe -
Suspicious behavior: EnumeratesProcesses 52 IoCs
pid Process 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2596 Agghosts.exe 2900 9d9961770ec49cd827541c17d730178cc22471848ff75b946b58225570ab39a0.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2456 helppane.exe Token: SeDebugPrivilege 2596 Agghosts.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2456 helppane.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2456 helppane.exe 2456 helppane.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2456 wrote to memory of 2596 2456 helppane.exe 29 PID 2456 wrote to memory of 2596 2456 helppane.exe 29 PID 2456 wrote to memory of 2596 2456 helppane.exe 29 PID 2456 wrote to memory of 2596 2456 helppane.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d9961770ec49cd827541c17d730178cc22471848ff75b946b58225570ab39a0.exe"C:\Users\Admin\AppData\Local\Temp\9d9961770ec49cd827541c17d730178cc22471848ff75b946b58225570ab39a0.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2900
-
C:\Windows\helppane.exeC:\Windows\helppane.exe -Embedding1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\ddeebl\Agghosts.exe"C:\ddeebl\Agghosts.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD55aab297fa8f143bfa67310ad78b76d3f
SHA15db963c2cca1bc8c8c060c52f7df76ccb477f01a
SHA2568ec64bc55e5641d7683288e5e8e27c9391f06eb4da096c3d677d8f25ca4d04df
SHA512c1ee67bd4c6bcfdc4179f905c7abc4ac632c9265b61dd5fdb90eeeec39802abe2cc487a5c8ded8a0748728104170c1b4d3a88904f102e1c3f891fac7702a2256
-
Filesize
157KB
MD56d4775f18b2ee05bb4763d3080d36bbe
SHA1cdf9525b39409515b350d02b91bff61aac3cd55f
SHA25623bb3a8e6cd6be562f57e98441888782f8f0d8d8ce456a9a40bf711a68a34c97
SHA51245368d3468e45324362eded3905d16850136318acf88c9d8d9590f77fb912d423fe52f24ab3b0b4d001605692e2d0627ba1463de533b96724cd25a8548cf9e82
-
Filesize
496KB
MD548e5090cd753cfe7adf3fd52897921e4
SHA141e40686fd744b42589dfc42f5740316cec6f94e
SHA25687d27360ddd3176904e8aaf49f779aa9e566ad738de8b29ed61818730f99c9a5
SHA512e15c64ee11a0d5f9eff0677d8fafb7ff73f2db0d5d66dfaa0d1994b02096f97793925c25409e4ad6f87f2a0db8b7050b2ffcce38e686b89e61798b90122ff194
-
Filesize
123KB
MD5daa799b7defab6d9867c5d519b36611f
SHA14020d8587c28df934bd460b4dc953561be61e4ff
SHA2566cec316645c5abc4f31eb25f3f09f462f843fc73b9c1db79c5f580c6773e8d00
SHA51252979cb556129d2efd2615001cfd5dab74066c9ed45d46746c02d71f6418b92a61fc5dc4c182089d2bc66d7d1a5e461b8fa60702f872d63194412bc4fa699777
-
Filesize
77KB
MD5f107a3c7371c4543bd3908ba729dd2db
SHA1af8e7e8f446de74db2f31d532e46eab8bbf41e0a
SHA25600df0901c101254525a219d93ff1830da3a20d3f14bc323354d8d5fee5854ec0
SHA512fd776f8ceaac498f4f44819794c0fa89224712a8c476819ffc76ba4c7ff4caa9b360b9d299d9df7965387e5bbcb330f316f53759b5146a73b27a5f2e964c3530