Analysis
-
max time kernel
156s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-06-2024 01:38
Static task
static1
Behavioral task
behavioral1
Sample
a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe
Resource
win10v2004-20240226-en
General
-
Target
a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe
-
Size
2.6MB
-
MD5
6bd5512a96b83249d901a839219d2b0a
-
SHA1
135782fae43c702daa401e2faaaf963f66e95d46
-
SHA256
a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca
-
SHA512
e78746312eb6b307a99566412d5de56e1fa0fa8d3eb760f7268eca36bc491f9dcbe86518d0399ffabd4f237b0461e4191f6c5cb77a2fcc2526b8f5ca901c9b2f
-
SSDEEP
49152:KnsHyjtk2MYC5GDbZnsHyjtk2MYC5GD+TncLwB/S5jSWIOva6DwmI7qmPV8WXTlh:Knsmtk2aaZnsmtk2apcL
Malware Config
Signatures
-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Detects executables calling ClearMyTracksByProcess 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3616-92-0x0000000010000000-0x000000001002A000-memory.dmp INDICATOR_SUSPICIOUS_EXE_ClearMyTracksByProcess -
Fatal Rat payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3616-92-0x0000000010000000-0x000000001002A000-memory.dmp fatalrat -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exeSynaptics.exe._cache_Synaptics.exe._cache_a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation ._cache_Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation ._cache_a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe -
Executes dropped EXE 5 IoCs
Processes:
._cache_a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exeSynaptics.exe._cache_Synaptics.exe._cache_Synaptics.exe._cache_a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exepid Process 3616 ._cache_a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe 748 Synaptics.exe 808 ._cache_Synaptics.exe 4892 ._cache_Synaptics.exe 2932 ._cache_a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
._cache_a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe._cache_Synaptics.exea70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SVP7 = "C:\\Users\\Admin\\AppData\\Local\\._cache_a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe" ._cache_a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SVP7 = "C:\\Users\\Admin\\AppData\\Local\\._cache_Synaptics.exe" ._cache_Synaptics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Modifies registry class 2 IoCs
Processes:
Synaptics.exea70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid Process 1484 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
._cache_a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe._cache_Synaptics.exe._cache_Synaptics.exe._cache_a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exedescription pid Process Token: SeDebugPrivilege 3616 ._cache_a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe Token: SeDebugPrivilege 808 ._cache_Synaptics.exe Token: SeDebugPrivilege 4892 ._cache_Synaptics.exe Token: SeDebugPrivilege 2932 ._cache_a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
EXCEL.EXEpid Process 1484 EXCEL.EXE 1484 EXCEL.EXE 1484 EXCEL.EXE 1484 EXCEL.EXE 1484 EXCEL.EXE 1484 EXCEL.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exeSynaptics.exe._cache_Synaptics.exe._cache_a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exedescription pid Process procid_target PID 648 wrote to memory of 3616 648 a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe 90 PID 648 wrote to memory of 3616 648 a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe 90 PID 648 wrote to memory of 3616 648 a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe 90 PID 648 wrote to memory of 748 648 a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe 91 PID 648 wrote to memory of 748 648 a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe 91 PID 648 wrote to memory of 748 648 a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe 91 PID 748 wrote to memory of 808 748 Synaptics.exe 92 PID 748 wrote to memory of 808 748 Synaptics.exe 92 PID 748 wrote to memory of 808 748 Synaptics.exe 92 PID 808 wrote to memory of 4892 808 ._cache_Synaptics.exe 109 PID 808 wrote to memory of 4892 808 ._cache_Synaptics.exe 109 PID 808 wrote to memory of 4892 808 ._cache_Synaptics.exe 109 PID 3616 wrote to memory of 2932 3616 ._cache_a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe 110 PID 3616 wrote to memory of 2932 3616 ._cache_a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe 110 PID 3616 wrote to memory of 2932 3616 ._cache_a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe"C:\Users\Admin\AppData\Local\Temp\a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Users\Admin\AppData\Local\Temp\._cache_a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe"C:\Users\Admin\AppData\Local\Temp\._cache_a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Users\Admin\AppData\Local\._cache_a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe"C:\Users\Admin\AppData\Local\._cache_a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2932
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\AppData\Local\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\._cache_Synaptics.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4892
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1484
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3636 --field-trial-handle=1928,i,13242902252791919845,10377620236057253993,262144 --variations-seed-version /prefetch:81⤵PID:3668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD56bd5512a96b83249d901a839219d2b0a
SHA1135782fae43c702daa401e2faaaf963f66e95d46
SHA256a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca
SHA512e78746312eb6b307a99566412d5de56e1fa0fa8d3eb760f7268eca36bc491f9dcbe86518d0399ffabd4f237b0461e4191f6c5cb77a2fcc2526b8f5ca901c9b2f
-
C:\Users\Admin\AppData\Local\Temp\._cache_a70fe514acbae5c180dbd53901ac1b9cfeab7d9c20b8c096eeb0fe124d3f28ca.exe
Filesize192KB
MD57c8d0f0df1f11b55991502a51dece2f3
SHA16b71fd7070d4411dfe81df3c8b6f7f6f3e1a45b5
SHA25688feba24748c14a3b285e4add02391fb2a34c9eb714710cb7b64df6ec4d99017
SHA5122cba88017529b4cdc4837794479b44d2e0691015516007eaa094f41fdeb506171dfaeab2c0b18e93189edc2ea5ff2daeef948c22ba279418e7c83c605c5fbdc1
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04