Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    18-07-2024 16:16

General

  • Target

    4bf33d5531fe319bed3d1550608ded652ef6b52437b6cc94d47a0d388f5bb03b.msi

  • Size

    9.5MB

  • MD5

    8b1b9af08bc62e4608d21b5568c0a581

  • SHA1

    acc808accbb6897da328a1def679b42e198bf9e0

  • SHA256

    4bf33d5531fe319bed3d1550608ded652ef6b52437b6cc94d47a0d388f5bb03b

  • SHA512

    9c03511ccc5c4f1ee386a61e91f9afadc7310d1798a2ba7d233a308fa73dfa260a868c4e30efd92b3259406f645fc50e0449b89aeab8827d32c4c725dd2f971f

  • SSDEEP

    196608:nWxLkNZONFiVDfWpugrukEa3bwQLWnhLQusRQR7p+2+E:nELkNZONFMUFruxoNazsRO7pJt

Malware Config

Signatures

  • FatalRat

    FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

  • Fatal Rat payload 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Blocklisted process makes network request 5 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Windows directory 24 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 34 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 1 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 46 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\4bf33d5531fe319bed3d1550608ded652ef6b52437b6cc94d47a0d388f5bb03b.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2568
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2688
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 86FC24854E57CF3B81F4C186D9D046C1
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      PID:876
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding A73CB615512903BBA7CEA43899DC6B52 M Global\MSI0000
      2⤵
      • Loads dropped DLL
      PID:1380
    • C:\Windows\Installer\MSIF1E9.tmp
      "C:\Windows\Installer\MSIF1E9.tmp" /DontWait "C:\Users\Admin\AppData\Roaming\WPS.exe"
      2⤵
      • Executes dropped EXE
      PID:696
    • C:\Windows\Installer\MSIF1EA.tmp
      "C:\Windows\Installer\MSIF1EA.tmp" /DontWait "C:\ProgramData\Microsoft\MF\thelper.exe"
      2⤵
      • Executes dropped EXE
      PID:1812
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2664
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000588" "00000000000005D8"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2852
  • C:\ProgramData\Microsoft\MF\thelper.exe
    "C:\ProgramData\Microsoft\MF\thelper.exe"
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3064
    • C:\Users\Admin\AppData\Local\thelper.exe
      "C:\Users\Admin\AppData\Local\thelper.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2088
  • C:\Users\Admin\AppData\Roaming\WPS.exe
    "C:\Users\Admin\AppData\Roaming\WPS.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Executes dropped EXE
    • Suspicious behavior: EnumeratesProcesses
    PID:444

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f76e525.rbs

    Filesize

    377KB

    MD5

    e8260505be60e37a0a70cdef0ef1ab66

    SHA1

    cb355819e068fe48a42fbc5202f09e97fd3be063

    SHA256

    b3e203246fa80335ff7340cd61357289a6a5836ec10f81d96cf708950cfcbce5

    SHA512

    b75e41e122bac1001864aaa61e8a94708ee699141c5870eae04e3cccb97a4c3a39b7e666a6eef632f44b3b131eeb6a608e6881e48bb45d6ed38488d26a758a58

  • C:\ProgramData\Microsoft\MF\Mi.jpg

    Filesize

    199KB

    MD5

    75cbb4f1e63e245bd3462cab5cb5be2c

    SHA1

    2961f8579ed879cdc1bd50dde56c6441965818ed

    SHA256

    dec9df011a3ee5fb9a9544bda976eec41667f344bc0b3166392f4cfffaf3f7c6

    SHA512

    f7620741cf450da09981f8fc8449d79981490696b84b65f35354f5be7d0d3a6ed6ce8a08334e50f5b9d81ddaaebe30b4fdb6da6fd8015b0270477d761e2ee642

  • C:\ProgramData\Microsoft\MF\XLFSIO2.DLL

    Filesize

    209KB

    MD5

    1bc7af7a8512cf79d4f0efc5cb138ce3

    SHA1

    68fd202d9380cacd2f8e0ce06d8df1c03c791c5b

    SHA256

    ef474b18f89310c067a859d55abd4e4f42fdac732e49eafe4246545e36872a62

    SHA512

    84de4d193d22a305be2ba28fc67bd1cccf83616cead721e57347f1b2e0736d351fef1abf168f7914caa1bcc7a72db43769991016673cd4646def544802ee8960

  • C:\ProgramData\Microsoft\MF\XLGraphic.dll

    Filesize

    730KB

    MD5

    74c75ae5b97ad708dbe6f69d3a602430

    SHA1

    a02764d99b44ce4b1d199ef0f8ce73431d094a6a

    SHA256

    89fbb6b1ca9168a452e803dbdc6343db7c661ad70860a245d76b3b08830156e2

    SHA512

    52c5f7e00dffb1c0719d18184da2cc8ec2ad178b222775f167b87320f0683a3c2846e30190bc506f12d14c07fa45896935b3d4ac396baa14d7564996e35c2ada

  • C:\ProgramData\Microsoft\MF\XLUE.dll

    Filesize

    2.4MB

    MD5

    0abbe96e1f7a254e23a80f06a1018c69

    SHA1

    0b83322fd5e18c9da8c013a0ed952cffa34381ae

    SHA256

    10f099f68741c179d5ad60b226d15233bb02d73f84ce51a5bbbbc4eb6a08e9d4

    SHA512

    2924e1e11e11bd655f27eb0243f87002a50a2d4b80e0b0e3ad6fd4c3d75c44222fab426fcaa695881b0093babf544e8aeee50a065ea92274145b0f88b1db0c58

  • C:\ProgramData\Microsoft\MF\libexpat.dll

    Filesize

    668KB

    MD5

    5ff790879aab8078884eaac71affeb4a

    SHA1

    59352663fdcf24bb01c1f219410e49c15b51d5c5

    SHA256

    cceca70f34bbcec861a02c3700de79ea17d80c0a7b9f33d7edd1357a714e0f2f

    SHA512

    34fbaffc48912e3d3fa2d224e001121e8b36f5be7284a33eb31d306b9a5c00de6e23a9fdc1a17a61fb1371768f0b0e30b9c6e899a08c735fc70482d5aa8ea824

  • C:\ProgramData\Microsoft\MF\libpng13.dll

    Filesize

    157KB

    MD5

    bb1922dfbdd99e0b89bec66c30c31b73

    SHA1

    f7a561619c101ba9b335c0b3d318f965b8fc1dfb

    SHA256

    76457f38cbbdd3dce078a40d42d9ac0dc26ae1c4bb68ab9c880eb7ffb400fd99

    SHA512

    3054574dd645feb1468cee53db2fd456e4f923eaf5fd686557a01c72c0572b19d70f3885d47fe42e97cdf7ccc2c674a6e966ff19668907cf7828e0a943cf474a

  • C:\ProgramData\Microsoft\MF\mt.dll

    Filesize

    1.5MB

    MD5

    9ded3fdffb0ff7f62e6a0a7f996c0caf

    SHA1

    fcc959b28a32923ccdb1ca4e304c74a31dede929

    SHA256

    87aab1db611adb132f503c08c32dc4efc23c9216d97e918f7279f86920701c93

    SHA512

    a7e7cb96a78827b01e71c595ca0d106eaf7afe35d4a548e5beccf0b009cc02d33274822958dca4998a427d8b4027eaefe99b40b3648e24730c81df34eab32ba0

  • C:\ProgramData\Microsoft\MF\thelper.exe

    Filesize

    226KB

    MD5

    17749f66292f190ef93652eb512c5ab7

    SHA1

    e2f651aa9d37404063ffc79e920787c9d3e71fdb

    SHA256

    0aa17ee66b8dae520e82a94388b1a1d603ec2aed20c464d6cac9a521d4167f24

    SHA512

    2ef192a191dc40a16c9b8768e749175c1a57319ab896809691effcc5de61c4a38fd8a8388b8907a1985e505907a8529f4d10990e362831092c75dafb8900b13e

  • C:\ProgramData\Microsoft\MF\zlib1.dll

    Filesize

    62KB

    MD5

    37163aacc5534fbab012fb505be8d647

    SHA1

    73de6343e52180a24c74f4629e38a62ed8ad5f81

    SHA256

    0a6357a8852daaafe7aed300e2f7e69d993cac4156e882baa8a3a56b583255ba

    SHA512

    c3bed1c9bc58652ed16b162ed16a93cf7479a0492db7e6ea577001dbe859affc0b20387d93d23e06e73f49f395e4c9a5a07680f000ebb82d32269742c16a5242

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C5C8CC0A7FE31816B4641D0465402560

    Filesize

    1KB

    MD5

    e94fb54871208c00df70f708ac47085b

    SHA1

    4efc31460c619ecae59c1bce2c008036d94c84b8

    SHA256

    7b9d553e1c92cb6e8803e137f4f287d4363757f5d44b37d52f9fca22fb97df86

    SHA512

    2e15b76e16264abb9f5ef417752a1cbb75f29c11f96ac7d73793172bd0864db65f2d2b7be0f16bbbe686068f0c368815525f1e39db5a0d6ca3ab18be6923b898

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4fe93b9afc4650d2f73b223bc7090b94

    SHA1

    9f0aa9d2f0cef6517ba0813b36d33be37c7bd353

    SHA256

    34e7c855bf4da3e46ef58491cb24f209bf0da16aa3df58e13624ce2e908d0e8b

    SHA512

    4c1cf2ca7212aca59bb8a3b683daf760a4613cef275cb9f3c98414acc85d41e87813afcae95fb7ca085fa833425c95cac0878f11c713f6bca133dd6a16c2f3e9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C5C8CC0A7FE31816B4641D0465402560

    Filesize

    264B

    MD5

    abbf7bf670630fe5bba6da67dc6aa876

    SHA1

    dc5a783592b2f12d09b37a2348f1ae947aaf2790

    SHA256

    0eb07c7a6cdcc7db03a27747d35aed8a687dc0e016f917f28cc968c5f3004283

    SHA512

    8f0e45366b74ecc2ffde1f370c8824b8eacf59673eb33cdb355a5e687819c80e9c65612dda7f86c68dfed7f81c43d79f13f54b6b0672288363e61558a40a40f0

  • C:\Users\Admin\AppData\Local\AdvinstAnalytics\6696c9562ff508bfba81ef0a\76.23.66\tracking.ini

    Filesize

    84B

    MD5

    6485e1ce0dc195c4200de9a20180d65a

    SHA1

    4ded2d28b2514250faa81fa1d63d1ff60ce67c3b

    SHA256

    e6304a2d1f355dbb1e356c38d2c0ccb1b3589d6cc9b2e4398c661a2c802ed017

    SHA512

    18578a464349b6e54299e1f0cb73a591844560cd94d2166bbd63da515a60de697a42f0eb61770862d2f2f3d38de59bbc1f24927658cf39e02a9ce8c0df99b488

  • C:\Users\Admin\AppData\Local\AdvinstAnalytics\6696c9562ff508bfba81ef0a\76.23.66\{3EBE481C-7E43-457B-96D7-3C56C9FC060F}.session

    Filesize

    4KB

    MD5

    b45c21e234b00a020406399fc7accd60

    SHA1

    242c18884d623c74aa719039023c203f366d8359

    SHA256

    5c1fc0eb6d4f39cfb611f2d23c3ce5a8d73df1468e92b65b6f4b6af560adbf67

    SHA512

    15f9d904d1814dff33c001feaf795b67b395c0d80030ff9b9a41d7f74da7ae580b403895905db4bede45db8c379f271a5330d76974f97bdc28e917228893c7e2

  • C:\Users\Admin\AppData\Local\Temp\CabC515.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC538.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\Installer\MSIE8A7.tmp

    Filesize

    436KB

    MD5

    475d20c0ea477a35660e3f67ecf0a1df

    SHA1

    67340739f51e1134ae8f0ffc5ae9dd710e8e3a08

    SHA256

    426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd

    SHA512

    99525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e

  • C:\Windows\Installer\MSIE965.tmp

    Filesize

    897KB

    MD5

    6189cdcb92ab9ddbffd95facd0b631fa

    SHA1

    b74c72cefcb5808e2c9ae4ba976fa916ba57190d

    SHA256

    519f7ac72beba9d5d7dcf71fcac15546f5cfd3bcfc37a5129e63b4e0be91a783

    SHA512

    ee9ce27628e7a07849cd9717609688ca4229d47579b69e3d3b5b2e7c2433369de9557ef6a13fa59964f57fb213cd8ca205b35f5791ea126bde5a4e00f6a11caf

  • C:\Windows\Installer\MSIEF26.tmp

    Filesize

    187KB

    MD5

    f11e8ec00dfd2d1344d8a222e65fea09

    SHA1

    235ed90cc729c50eb6b8a36ebcd2cf044a2d8b20

    SHA256

    775037d6d7de214796f2f5850440257ae7f04952b73538da2b55db45f3b26e93

    SHA512

    6163dd8fd18b4520d7fda0986a80f2e424fe55f5d65d67f5a3519a366e53049f902a08164ea5669476100b71bb2f0c085327b7c362174cb7a051d268f10872d3

  • C:\Windows\Installer\MSIF1E9.tmp

    Filesize

    389KB

    MD5

    b9545ed17695a32face8c3408a6a3553

    SHA1

    f6c31c9cd832ae2aebcd88e7b2fa6803ae93fc83

    SHA256

    1e0e63b446eecf6c9781c7d1cae1f46a3bb31654a70612f71f31538fb4f4729a

    SHA512

    f6d6dc40dcba5ff091452d7cc257427dcb7ce2a21816b4fec2ee249e63246b64667f5c4095220623533243103876433ef8c12c9b612c0e95fdfffe41d1504e04

  • \ProgramData\Microsoft\MF\XLFSIO.dll

    Filesize

    900KB

    MD5

    a06090c5f2d3df2cedc51cc99e19e821

    SHA1

    701ac97c2fd140464b234f666a0453d058c9fabf

    SHA256

    64ffdffb82fc649e6847b3c4f8678d9cca0d5117fa54c9abbb746625d3feef89

    SHA512

    541804db74a25fc5f50801f23b4d9f2be788d3c95d3d23dd8098f4c8888d1fc808e6eb6959c458965c639ea28b594a87dff7f3a89c4750c109b29b573c4535cf

  • \ProgramData\Microsoft\MF\XLLuaRuntime.dll

    Filesize

    249KB

    MD5

    5362cb2efe55c6d6e9b51849ec0706b2

    SHA1

    d91acbe95dedc3bcac7ec0051c04ddddd5652778

    SHA256

    1d7519acca9c8a013c31af2064fbc599a0b14cfd1dfb793a345fab14045fed40

    SHA512

    dbd591c3d0b9847d9cef59277c03ec89e246db0e54b58fbbe9d492b75cdcb32d75444012cdfb1c77376d15db7fde1f74e694d2487c481ce29a2133342b91e1f5

  • \ProgramData\Microsoft\MF\ic.dll

    Filesize

    1.6MB

    MD5

    bb1197bea58b158554fa3fa25866d1ea

    SHA1

    cae7f395ed42fa2dd3362f4c816fb678072feb49

    SHA256

    20a04729fdd8e02e2fb5be79af130c364d0f3ce85e49478a6819a0a2020ae844

    SHA512

    f80b7669da861400a5b5add8148b85cc62994819e3a3a2220475d7ec2fc31f70bc3c683d5a5d6043b319b428a0ac47b9b41201aee7aba5d5cc927a8556dd7b73

  • \Windows\Installer\MSIE740.tmp

    Filesize

    770KB

    MD5

    356fc2c181cc37e3f8ae4d6b855ebfcb

    SHA1

    2ead1e69f14099ae33a3216a9312c88007b73cd1

    SHA256

    c92b2d9623f19f8acfeac5fd894346515631ebb590e68f22c40a35fbacbef03c

    SHA512

    74ea73d3206ba1c6f1963caa4866589fe86636f68815c74733644ad6c4913de3f1399770f6095a48c9d94a7d934072d8d8b409a393de644265f6e456455dcebd

  • memory/444-461-0x0000000000220000-0x00000000007C3000-memory.dmp

    Filesize

    5.6MB

  • memory/444-446-0x0000000000220000-0x00000000007C3000-memory.dmp

    Filesize

    5.6MB

  • memory/444-445-0x0000000000220000-0x00000000007C3000-memory.dmp

    Filesize

    5.6MB

  • memory/444-438-0x0000000000220000-0x00000000007C3000-memory.dmp

    Filesize

    5.6MB

  • memory/444-425-0x0000000000220000-0x00000000007C3000-memory.dmp

    Filesize

    5.6MB

  • memory/696-356-0x0000000000120000-0x0000000000122000-memory.dmp

    Filesize

    8KB

  • memory/1812-355-0x00000000001F0000-0x00000000001F2000-memory.dmp

    Filesize

    8KB

  • memory/2088-413-0x0000000000560000-0x0000000000595000-memory.dmp

    Filesize

    212KB

  • memory/2088-407-0x0000000000450000-0x0000000000558000-memory.dmp

    Filesize

    1.0MB

  • memory/2088-416-0x00000000005A0000-0x00000000005DF000-memory.dmp

    Filesize

    252KB

  • memory/2088-420-0x0000000072980000-0x0000000072B97000-memory.dmp

    Filesize

    2.1MB

  • memory/2088-421-0x0000000072740000-0x0000000072974000-memory.dmp

    Filesize

    2.2MB

  • memory/2088-419-0x0000000021C90000-0x0000000021D7F000-memory.dmp

    Filesize

    956KB

  • memory/3064-376-0x0000000000580000-0x00000000005BF000-memory.dmp

    Filesize

    252KB

  • memory/3064-392-0x0000000000BD0000-0x0000000000BFA000-memory.dmp

    Filesize

    168KB

  • memory/3064-381-0x0000000021C90000-0x0000000021D7F000-memory.dmp

    Filesize

    956KB

  • memory/3064-422-0x0000000021C90000-0x0000000021D7F000-memory.dmp

    Filesize

    956KB

  • memory/3064-372-0x00000000001E0000-0x0000000000215000-memory.dmp

    Filesize

    212KB

  • memory/3064-362-0x0000000000470000-0x0000000000578000-memory.dmp

    Filesize

    1.0MB

  • memory/3064-423-0x0000000072980000-0x0000000072B97000-memory.dmp

    Filesize

    2.1MB

  • memory/3064-424-0x0000000072740000-0x0000000072974000-memory.dmp

    Filesize

    2.2MB

  • memory/3064-385-0x0000000072980000-0x0000000072B97000-memory.dmp

    Filesize

    2.1MB

  • memory/3064-386-0x0000000072740000-0x0000000072974000-memory.dmp

    Filesize

    2.2MB

  • memory/3064-388-0x0000000000680000-0x00000000006B1000-memory.dmp

    Filesize

    196KB