Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
28-06-2024 01:38
Static task
static1
Behavioral task
behavioral1
Sample
a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe
Resource
win10v2004-20240226-en
General
-
Target
a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe
-
Size
2.6MB
-
MD5
6bd5512a96b83249d901a839219d2b0a
-
SHA1
135782fae43c702daa401e2faaaf963f66e95d46
-
SHA256
a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca
-
SHA512
e78746312eb6b307a99566412d5de56e1fa0fa8d3eb760f7268eca36bc491f9dcbe86518d0399ffabd4f237b0461e4191f6c5cb77a2fcc2526b8f5ca901c9b2f
-
SSDEEP
49152:KnsHyjtk2MYC5GDbZnsHyjtk2MYC5GD+TncLwB/S5jSWIOva6DwmI7qmPV8WXTlh:Knsmtk2aaZnsmtk2apcL
Malware Config
Signatures
-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Detects executables calling ClearMyTracksByProcess 1 IoCs
resource yara_rule behavioral1/memory/1620-20-0x0000000010000000-0x000000001002A000-memory.dmp INDICATOR_SUSPICIOUS_EXE_ClearMyTracksByProcess -
Fatal Rat payload 1 IoCs
resource yara_rule behavioral1/memory/1620-20-0x0000000010000000-0x000000001002A000-memory.dmp fatalrat -
Executes dropped EXE 5 IoCs
pid Process 1620 ._cache_a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe 2632 Synaptics.exe 2444 ._cache_Synaptics.exe 2684 ._cache_a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe 2884 ._cache_Synaptics.exe -
Loads dropped DLL 11 IoCs
pid Process 2968 a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe 2968 a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe 2968 a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe 2968 a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe 2632 Synaptics.exe 2632 Synaptics.exe 2632 Synaptics.exe 1620 ._cache_a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe 1620 ._cache_a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe 2444 ._cache_Synaptics.exe 2444 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\SVP7 = "C:\\Users\\Admin\\AppData\\Local\\._cache_a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe" ._cache_a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\SVP7 = "C:\\Users\\Admin\\AppData\\Local\\._cache_Synaptics.exe" ._cache_Synaptics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1620 ._cache_a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe Token: SeDebugPrivilege 2444 ._cache_Synaptics.exe Token: SeDebugPrivilege 2684 ._cache_a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe Token: SeDebugPrivilege 2884 ._cache_Synaptics.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2968 wrote to memory of 1620 2968 a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe 28 PID 2968 wrote to memory of 1620 2968 a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe 28 PID 2968 wrote to memory of 1620 2968 a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe 28 PID 2968 wrote to memory of 1620 2968 a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe 28 PID 2968 wrote to memory of 2632 2968 a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe 29 PID 2968 wrote to memory of 2632 2968 a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe 29 PID 2968 wrote to memory of 2632 2968 a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe 29 PID 2968 wrote to memory of 2632 2968 a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe 29 PID 2632 wrote to memory of 2444 2632 Synaptics.exe 30 PID 2632 wrote to memory of 2444 2632 Synaptics.exe 30 PID 2632 wrote to memory of 2444 2632 Synaptics.exe 30 PID 2632 wrote to memory of 2444 2632 Synaptics.exe 30 PID 1620 wrote to memory of 2684 1620 ._cache_a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe 32 PID 1620 wrote to memory of 2684 1620 ._cache_a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe 32 PID 1620 wrote to memory of 2684 1620 ._cache_a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe 32 PID 1620 wrote to memory of 2684 1620 ._cache_a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe 32 PID 2444 wrote to memory of 2884 2444 ._cache_Synaptics.exe 33 PID 2444 wrote to memory of 2884 2444 ._cache_Synaptics.exe 33 PID 2444 wrote to memory of 2884 2444 ._cache_Synaptics.exe 33 PID 2444 wrote to memory of 2884 2444 ._cache_Synaptics.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe"C:\Users\Admin\AppData\Local\Temp\a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\._cache_a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe"C:\Users\Admin\AppData\Local\Temp\._cache_a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Local\._cache_a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe"C:\Users\Admin\AppData\Local\._cache_a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\._cache_Synaptics.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2884
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD56bd5512a96b83249d901a839219d2b0a
SHA1135782fae43c702daa401e2faaaf963f66e95d46
SHA256a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca
SHA512e78746312eb6b307a99566412d5de56e1fa0fa8d3eb760f7268eca36bc491f9dcbe86518d0399ffabd4f237b0461e4191f6c5cb77a2fcc2526b8f5ca901c9b2f
-
\Users\Admin\AppData\Local\Temp\._cache_a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe
Filesize192KB
MD57c8d0f0df1f11b55991502a51dece2f3
SHA16b71fd7070d4411dfe81df3c8b6f7f6f3e1a45b5
SHA25688feba24748c14a3b285e4add02391fb2a34c9eb714710cb7b64df6ec4d99017
SHA5122cba88017529b4cdc4837794479b44d2e0691015516007eaa094f41fdeb506171dfaeab2c0b18e93189edc2ea5ff2daeef948c22ba279418e7c83c605c5fbdc1