Analysis

  • max time kernel
    428s
  • max time network
    1189s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240709-en
  • resource tags

    arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    22-07-2024 18:22

General

  • Target

    6b6f99.msi

  • Size

    9.2MB

  • MD5

    99606454c555b45ccf7d94e9ecd73cee

  • SHA1

    5f90e81883ffe92fe903b2150c2690eedc2bbed4

  • SHA256

    9005cc0bc07d213f5691fe31f65b686b6f73a66b1117c2020941c44d53c88df9

  • SHA512

    cbde49abf9744fb0eff5e09439f030caf166f717cb25bda41a361cb020a86abefc7becee1f8dbd8a0977dce328dc606a2e63d6a17ad1deb276b6fd6d2dde92e8

  • SSDEEP

    196608:CWxLkNZONktVDrKfuNL2WO/2eCr4hUQQAcLdu9FtVy7QGO8m:CELkNZONk7r7AW2ichTQTiUg

Malware Config

Signatures

  • FatalRat

    FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

  • Fatal Rat payload 2 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Blocklisted process makes network request 5 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 27 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 40 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 1 TTPs 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\6b6f99.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1720
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4784
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:1496
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 1291E530871844310C6F2FA6A21BD7CD
        2⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        PID:3300
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 18098C732D41944D50A1EC1CA3648326 E Global\MSI0000
        2⤵
        • Loads dropped DLL
        PID:1696
      • C:\Windows\Installer\MSI17A8.tmp
        "C:\Windows\Installer\MSI17A8.tmp" /DontWait "C:\Users\Admin\AppData\Roaming\WPS.exe"
        2⤵
        • Executes dropped EXE
        PID:3648
      • C:\Windows\Installer\MSI17B9.tmp
        "C:\Windows\Installer\MSI17B9.tmp" /DontWait "C:\ProgramData\Microsoft\MF\thelper.exe"
        2⤵
        • Executes dropped EXE
        PID:3732
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:1600
    • C:\ProgramData\Microsoft\MF\thelper.exe
      "C:\ProgramData\Microsoft\MF\thelper.exe"
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2472
      • C:\Users\Admin\AppData\Local\thelper.exe
        "C:\Users\Admin\AppData\Local\thelper.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:1872
    • C:\Users\Admin\AppData\Roaming\WPS.exe
      "C:\Users\Admin\AppData\Roaming\WPS.exe"
      1⤵
      • Executes dropped EXE
      PID:2008

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e580e27.rbs

      Filesize

      377KB

      MD5

      1aac608d9bfd7a77a912aa5010981b80

      SHA1

      f2948545cf655d198ff25782f8795895622bcdf1

      SHA256

      a05e2820f60a70f33662f6ec77c27e6a1744c3f5229140e2b09e5f6abee9b4fd

      SHA512

      821d0820d8d32d44d017660edf4a4744ce03279dce087e9cb4e5420ef728fd1e025e32200502457d90028d10c9ce4dfa369ffac06eb12bb1b447c010c87b03f2

    • C:\ProgramData\Microsoft\MF\Mi.jpg

      Filesize

      214KB

      MD5

      7dc8e6bde9ddc21461cc07e0e0ab6c66

      SHA1

      403de5313b419b17c10a214725d4769ab6e224e7

      SHA256

      958782d86a36d3d9e3c878d1d5880821bf005625095d67ba06f68ca1d076f7ed

      SHA512

      bf225ca55e61c4d8ba5b0feeed64a4a7568aa7c5ada3d67348b4da0d254773d33914542ff858b0540454d3b51ef25ff6f8db8e63c64ae5b036433997cd850765

    • C:\ProgramData\Microsoft\MF\XLFSIO.dll

      Filesize

      900KB

      MD5

      a06090c5f2d3df2cedc51cc99e19e821

      SHA1

      701ac97c2fd140464b234f666a0453d058c9fabf

      SHA256

      64ffdffb82fc649e6847b3c4f8678d9cca0d5117fa54c9abbb746625d3feef89

      SHA512

      541804db74a25fc5f50801f23b4d9f2be788d3c95d3d23dd8098f4c8888d1fc808e6eb6959c458965c639ea28b594a87dff7f3a89c4750c109b29b573c4535cf

    • C:\ProgramData\Microsoft\MF\XLFSIO2.dll

      Filesize

      209KB

      MD5

      1bc7af7a8512cf79d4f0efc5cb138ce3

      SHA1

      68fd202d9380cacd2f8e0ce06d8df1c03c791c5b

      SHA256

      ef474b18f89310c067a859d55abd4e4f42fdac732e49eafe4246545e36872a62

      SHA512

      84de4d193d22a305be2ba28fc67bd1cccf83616cead721e57347f1b2e0736d351fef1abf168f7914caa1bcc7a72db43769991016673cd4646def544802ee8960

    • C:\ProgramData\Microsoft\MF\XLGraphic.dll

      Filesize

      730KB

      MD5

      74c75ae5b97ad708dbe6f69d3a602430

      SHA1

      a02764d99b44ce4b1d199ef0f8ce73431d094a6a

      SHA256

      89fbb6b1ca9168a452e803dbdc6343db7c661ad70860a245d76b3b08830156e2

      SHA512

      52c5f7e00dffb1c0719d18184da2cc8ec2ad178b222775f167b87320f0683a3c2846e30190bc506f12d14c07fa45896935b3d4ac396baa14d7564996e35c2ada

    • C:\ProgramData\Microsoft\MF\XLLuaRuntime.dll

      Filesize

      249KB

      MD5

      5362cb2efe55c6d6e9b51849ec0706b2

      SHA1

      d91acbe95dedc3bcac7ec0051c04ddddd5652778

      SHA256

      1d7519acca9c8a013c31af2064fbc599a0b14cfd1dfb793a345fab14045fed40

      SHA512

      dbd591c3d0b9847d9cef59277c03ec89e246db0e54b58fbbe9d492b75cdcb32d75444012cdfb1c77376d15db7fde1f74e694d2487c481ce29a2133342b91e1f5

    • C:\ProgramData\Microsoft\MF\XLUE.dll

      Filesize

      2.4MB

      MD5

      0abbe96e1f7a254e23a80f06a1018c69

      SHA1

      0b83322fd5e18c9da8c013a0ed952cffa34381ae

      SHA256

      10f099f68741c179d5ad60b226d15233bb02d73f84ce51a5bbbbc4eb6a08e9d4

      SHA512

      2924e1e11e11bd655f27eb0243f87002a50a2d4b80e0b0e3ad6fd4c3d75c44222fab426fcaa695881b0093babf544e8aeee50a065ea92274145b0f88b1db0c58

    • C:\ProgramData\Microsoft\MF\ic.dll

      Filesize

      165KB

      MD5

      1fcd1d41cd1d799989c4d9b1d7b7be07

      SHA1

      14f762898c75356519702817804ddf6fb95b7ea2

      SHA256

      8ac99c6716bd235986cad57cc30602c9cb5f15685971b93c77a36e70de5a3d44

      SHA512

      d8f601d6d7694b339ed931ff48899844bbe7e52d0b2df725f1134b7cfd14baa61c4fdc54f27d574479cca554a2c8a9c87eb764974864411ce72a467e802eb637

    • C:\ProgramData\Microsoft\MF\libexpat.dll

      Filesize

      668KB

      MD5

      5ff790879aab8078884eaac71affeb4a

      SHA1

      59352663fdcf24bb01c1f219410e49c15b51d5c5

      SHA256

      cceca70f34bbcec861a02c3700de79ea17d80c0a7b9f33d7edd1357a714e0f2f

      SHA512

      34fbaffc48912e3d3fa2d224e001121e8b36f5be7284a33eb31d306b9a5c00de6e23a9fdc1a17a61fb1371768f0b0e30b9c6e899a08c735fc70482d5aa8ea824

    • C:\ProgramData\Microsoft\MF\libpng13.dll

      Filesize

      157KB

      MD5

      bb1922dfbdd99e0b89bec66c30c31b73

      SHA1

      f7a561619c101ba9b335c0b3d318f965b8fc1dfb

      SHA256

      76457f38cbbdd3dce078a40d42d9ac0dc26ae1c4bb68ab9c880eb7ffb400fd99

      SHA512

      3054574dd645feb1468cee53db2fd456e4f923eaf5fd686557a01c72c0572b19d70f3885d47fe42e97cdf7ccc2c674a6e966ff19668907cf7828e0a943cf474a

    • C:\ProgramData\Microsoft\MF\mt.dll

      Filesize

      1.5MB

      MD5

      bfaa6c11ad36cb958d175f3d4740c90d

      SHA1

      2fe774c4e7e61404b0e78341823248fbc1ccf1b2

      SHA256

      7ad42985ab304dcd65ba10186e0a0892dc55303236eef902bdc2f89dbbae10dc

      SHA512

      8d47f98674f3303d8213dd80979d9e2f4114e7fea98d0695fb4bb7a4fb47491d9509f539c869da97906923a6e39c97e09338470d67587c91d8ec3b7c7be5a0e5

    • C:\ProgramData\Microsoft\MF\thelper.exe

      Filesize

      226KB

      MD5

      ffbed32e4009acd7fadcaa4bf1bdd898

      SHA1

      7485fcf366f7b3e61afc02130f296e0016d342c3

      SHA256

      79b496701e7a68dea3406f01b81e4d05fa484597a5a711889875f1cfb743822a

      SHA512

      320006a900494d77c82013a683b6300f7d578b0a9c6a1597af1a2ba877f61eb546ee85a5e2b640b5944b36f4c8e27ca75e77744e6eb087f51bba2dc64e4cc29f

    • C:\ProgramData\Microsoft\MF\zlib1.dll

      Filesize

      62KB

      MD5

      37163aacc5534fbab012fb505be8d647

      SHA1

      73de6343e52180a24c74f4629e38a62ed8ad5f81

      SHA256

      0a6357a8852daaafe7aed300e2f7e69d993cac4156e882baa8a3a56b583255ba

      SHA512

      c3bed1c9bc58652ed16b162ed16a93cf7479a0492db7e6ea577001dbe859affc0b20387d93d23e06e73f49f395e4c9a5a07680f000ebb82d32269742c16a5242

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\30069012ED3CF5DB92F9F4FC78D55E2D_16AA5B9B040CB195ADDB70661F18F3C5

      Filesize

      1KB

      MD5

      4d54a398a9de3773110b08e3053c6922

      SHA1

      442e8ad891dc493f3abe3f30a9ed9e76e75ca06e

      SHA256

      e921a4033d60b79777a57cbfdb802a3ed1e9a09fa900ead5283c02e6fc74f46a

      SHA512

      ab83a99b7620a790030dd50e0328ff7af71b4d6575914895eff330670b7f279825ad02a5bbe7b71a1305811b4e3b5ab734154bb0269060ccfb3ec2d50424dae6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B03113490075047F519A3F760F0FF379_F891537EEBBDBB955ED6C40DCF761C31

      Filesize

      2KB

      MD5

      0ba0a57d0973c75a874c8d488b388416

      SHA1

      49393bb338381be8a85788cbcab5307b4d1c6366

      SHA256

      98e9408a6fc0de2bb8c77f4a3d1d652f46a9b75ce8500a34c62fdb1199072bd0

      SHA512

      6a0fbf476942adc34b4b91f6ad5f2aed5a72b956bb99909f1e22fe08168c9853fb3e43038577b98277113dfc14699e4041030ed458d576e525bb98d262e27550

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\30069012ED3CF5DB92F9F4FC78D55E2D_16AA5B9B040CB195ADDB70661F18F3C5

      Filesize

      412B

      MD5

      b40caacffc56fd66b155ed36b19ee3d8

      SHA1

      25cd6f8bc923a699486a537480a23e0c1f898897

      SHA256

      2c9fe80359af451826cd03f19b6b4c09517e65719935af8b01d0fbcb26f56700

      SHA512

      718249fbc510e30dcae8f483be632792bbad199a2af4429d659f1d694c0b4c6050b6ba46268ebbdfd777edbae4c46a2ff6d9635b89b139ead5f9482987a9c19a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B03113490075047F519A3F760F0FF379_F891537EEBBDBB955ED6C40DCF761C31

      Filesize

      428B

      MD5

      de5ffcaba48c2271fc2f4368bfacec7c

      SHA1

      4d13171b53975bed2d66d25d6227e334a072da70

      SHA256

      c03ed828c891ede12f602f6f035555858108bcd67735c1fd5b3793eca8d17794

      SHA512

      1584af6572631279266c6364ca04bcd4c6f3013eadf8304d8de298179998cf8f05f8374a67646d8d8dad9b6bf03ffdbba06bd0b32cf560a86a8f15a85e0e7fb9

    • C:\Users\Admin\AppData\Local\AdvinstAnalytics\6696c9562ff508bfba81ef0a\76.20.36\tracking.ini

      Filesize

      84B

      MD5

      d41997f7339ff03f283f4fc05edacce5

      SHA1

      2c41b7c24658a3be6407b2213dbb18a2ff859389

      SHA256

      51575a65778ac8828552bc3778eae109e2a87d50fbb65c7614e88503432df793

      SHA512

      44bdb0a9c8588eee086860abd5c075b3efba85662ea2efc2e2fe19619ab57271302033a44917da1843f7b452236ac0a668eec893190c9e51b96b2314602648ca

    • C:\Users\Admin\AppData\Local\AdvinstAnalytics\6696c9562ff508bfba81ef0a\76.20.36\{62AB6F3F-7106-45BF-A83F-81D51BEB9489}.session

      Filesize

      6KB

      MD5

      4501b3ac3589d328dfc5b35ccdd89328

      SHA1

      88d8047a6594293a71643bc5a000d581d21c8f07

      SHA256

      371a3f0250531d8ad3013174371febfdef9fb0dcfac5ea2891b9e8cc9b163968

      SHA512

      4a271778eae7d160077d8266c90a871646af1c3cd80b92a53f38fbb09cfc43904fd990e46963649994aaa5ea92deccfa5d85a3e372cc23605515b65134031fb2

    • C:\Users\Admin\AppData\Roaming\WPS.exe

      Filesize

      2.9MB

      MD5

      b52ba2b99108c496389ae5bb81fa6537

      SHA1

      9073d8c4a1968be24357862015519f2afecd833a

      SHA256

      c6ac7d9add40b913112b265d4f366d9ef80bbd711049db085fc750fcad4e14d8

      SHA512

      6637506ee80d359e729e0011b97e8d827e14356393193247f502b7fcfbbca249dc045b8acfe4b31ce462468f421dc5d9a4e31183bedb66c45a9aa43c01f81397

    • C:\Windows\Installer\MSI10F4.tmp

      Filesize

      436KB

      MD5

      475d20c0ea477a35660e3f67ecf0a1df

      SHA1

      67340739f51e1134ae8f0ffc5ae9dd710e8e3a08

      SHA256

      426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd

      SHA512

      99525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e

    • C:\Windows\Installer\MSI1155.tmp

      Filesize

      897KB

      MD5

      6189cdcb92ab9ddbffd95facd0b631fa

      SHA1

      b74c72cefcb5808e2c9ae4ba976fa916ba57190d

      SHA256

      519f7ac72beba9d5d7dcf71fcac15546f5cfd3bcfc37a5129e63b4e0be91a783

      SHA512

      ee9ce27628e7a07849cd9717609688ca4229d47579b69e3d3b5b2e7c2433369de9557ef6a13fa59964f57fb213cd8ca205b35f5791ea126bde5a4e00f6a11caf

    • C:\Windows\Installer\MSI14E6.tmp

      Filesize

      187KB

      MD5

      f11e8ec00dfd2d1344d8a222e65fea09

      SHA1

      235ed90cc729c50eb6b8a36ebcd2cf044a2d8b20

      SHA256

      775037d6d7de214796f2f5850440257ae7f04952b73538da2b55db45f3b26e93

      SHA512

      6163dd8fd18b4520d7fda0986a80f2e424fe55f5d65d67f5a3519a366e53049f902a08164ea5669476100b71bb2f0c085327b7c362174cb7a051d268f10872d3

    • C:\Windows\Installer\MSI17A8.tmp

      Filesize

      389KB

      MD5

      b9545ed17695a32face8c3408a6a3553

      SHA1

      f6c31c9cd832ae2aebcd88e7b2fa6803ae93fc83

      SHA256

      1e0e63b446eecf6c9781c7d1cae1f46a3bb31654a70612f71f31538fb4f4729a

      SHA512

      f6d6dc40dcba5ff091452d7cc257427dcb7ce2a21816b4fec2ee249e63246b64667f5c4095220623533243103876433ef8c12c9b612c0e95fdfffe41d1504e04

    • C:\Windows\Installer\MSIF1E.tmp

      Filesize

      770KB

      MD5

      356fc2c181cc37e3f8ae4d6b855ebfcb

      SHA1

      2ead1e69f14099ae33a3216a9312c88007b73cd1

      SHA256

      c92b2d9623f19f8acfeac5fd894346515631ebb590e68f22c40a35fbacbef03c

      SHA512

      74ea73d3206ba1c6f1963caa4866589fe86636f68815c74733644ad6c4913de3f1399770f6095a48c9d94a7d934072d8d8b409a393de644265f6e456455dcebd

    • memory/1872-299-0x0000000072260000-0x0000000072477000-memory.dmp

      Filesize

      2.1MB

    • memory/1872-294-0x0000000003490000-0x00000000034BA000-memory.dmp

      Filesize

      168KB

    • memory/1872-285-0x00000000015F0000-0x000000000162F000-memory.dmp

      Filesize

      252KB

    • memory/1872-310-0x0000000072260000-0x0000000072477000-memory.dmp

      Filesize

      2.1MB

    • memory/1872-309-0x0000000021C90000-0x0000000021D7F000-memory.dmp

      Filesize

      956KB

    • memory/1872-283-0x0000000001850000-0x0000000001958000-memory.dmp

      Filesize

      1.0MB

    • memory/1872-289-0x0000000021C90000-0x0000000021D7F000-memory.dmp

      Filesize

      956KB

    • memory/1872-287-0x0000000001970000-0x00000000019A5000-memory.dmp

      Filesize

      212KB

    • memory/1872-290-0x0000000003420000-0x0000000003451000-memory.dmp

      Filesize

      196KB

    • memory/2008-300-0x0000000000C30000-0x00000000011D3000-memory.dmp

      Filesize

      5.6MB

    • memory/2008-308-0x0000000000C30000-0x00000000011D3000-memory.dmp

      Filesize

      5.6MB

    • memory/2008-320-0x0000000000C30000-0x00000000011D3000-memory.dmp

      Filesize

      5.6MB

    • memory/2008-312-0x0000000000C30000-0x00000000011D3000-memory.dmp

      Filesize

      5.6MB

    • memory/2008-311-0x0000000000C30000-0x00000000011D3000-memory.dmp

      Filesize

      5.6MB

    • memory/2008-281-0x0000000000C30000-0x00000000011D3000-memory.dmp

      Filesize

      5.6MB

    • memory/2472-263-0x0000000003530000-0x000000000355A000-memory.dmp

      Filesize

      168KB

    • memory/2472-277-0x0000000021C90000-0x0000000021D7F000-memory.dmp

      Filesize

      956KB

    • memory/2472-245-0x0000000001AD0000-0x0000000001B05000-memory.dmp

      Filesize

      212KB

    • memory/2472-278-0x0000000072260000-0x0000000072477000-memory.dmp

      Filesize

      2.1MB

    • memory/2472-258-0x00000000034F0000-0x0000000003521000-memory.dmp

      Filesize

      196KB

    • memory/2472-247-0x0000000001800000-0x0000000001A76000-memory.dmp

      Filesize

      2.5MB

    • memory/2472-242-0x0000000001A80000-0x0000000001ABF000-memory.dmp

      Filesize

      252KB

    • memory/2472-256-0x0000000021C90000-0x0000000021D7F000-memory.dmp

      Filesize

      956KB