Analysis

  • max time kernel
    138s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25-07-2024 02:46

General

  • Target

    Lisect_AVT_24003_G2A_100.exe

  • Size

    6.3MB

  • MD5

    347e0f187d52f4abac877354dfd1539d

  • SHA1

    8f1e98efbfd1be61f1fd0f89787f014b19651ba4

  • SHA256

    4f21d26ddb7e2f75f05b09a9d0394a65bef18f6520c8d6b37eba9eedadfd7710

  • SHA512

    54ffc9911b8cca85e5208bfae4af69ded091b740e82b9ae8b92baf68575195191ed0ac6aa3f3be7f6fe79d831b2a2091dc3501e77db51134986dd2b40db90abc

  • SSDEEP

    98304:JrQvvKGZ6MulJ2LK4hulR7AWIsVk8QWG1qvoZKMRREaXbGqZAQifd64MNnSs17u:ZyvYXJ2q93VDGVRaQKQCI4MNS27

Malware Config

Signatures

  • FatalRat

    FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

  • Fatal Rat payload 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Drops file in Program Files directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Lisect_AVT_24003_G2A_100.exe
    "C:\Users\Admin\AppData\Local\Temp\Lisect_AVT_24003_G2A_100.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2060
    • C:\Program Files (x86)\Fonsd\update.exe
      "C:\Program Files (x86)\Fonsd\update.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2508

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Fonsd\MSVCP100.dll

    Filesize

    412KB

    MD5

    ed40615aa67499e2d2da8389ba9b331a

    SHA1

    09780d2c9d75878f7a9bb94599f3dc9386cf3789

    SHA256

    cd28daeda3c8731030e2077e6eccbb609e2098919b05ff310bef8dce1dce2d8d

    SHA512

    47d94c5f4829a0f901b57084c22b24adefb4aec2f7b8df9ea838e485dbc607aa837ed6d3c7186159499c44a3ff488fb04f770c624649a406854d82cd3baf72ee

  • C:\Program Files (x86)\Fonsd\MSVCR100.dll

    Filesize

    756KB

    MD5

    ef3e115c225588a680acf365158b2f4a

    SHA1

    ecda6d3b4642d2451817833b39248778e9c2cbb0

    SHA256

    25d1cc5be93c7a0b58855ad1f4c9df3cfb9ec87e5dc13db85b147b1951ac6fa8

    SHA512

    d51f51336b7a34eb6c8f429597c3d685eb53853ee5e9d4857c40fc7be6956f1b8363d8d34bebad15ccceae45a6eb69f105f2df6a672f15fb0e6f8d0bb1afb91a

  • C:\Program Files (x86)\Fonsd\kdsd.dat

    Filesize

    198KB

    MD5

    549af62420bf054e967a2e1c5bb88769

    SHA1

    043dc0cccd0337e83cc2aa45b572fd83584b6c82

    SHA256

    0c2dcd599299c084fc53384d9eb9f50ac3d74a96029b50b4bf3ccd9aa209897d

    SHA512

    547148f4c9c97acae26431af818e6ae94834ac85284b1fab8603ce654b2c889e9467addecb8b6db23fa36cf420bf6f5251bf3009a4926db3777dbe06cc715123

  • C:\Program Files (x86)\Fonsd\version.xml

    Filesize

    78KB

    MD5

    003f49618eb5502132ed575cf1124c19

    SHA1

    4d378b777d881f1da23c2a8e7bf702e6e2953b1d

    SHA256

    6098f2a0e775bede6c322628b76a64eae7c2656c178858d7f65b4c0846e5c568

    SHA512

    98fbbaa15ae3c35922a458bc06ad218fd0b076bfae67af1522b888f9b2bc349514f2362dc2fc22ef2cceb68d22b230e3bc18e724b58ca89048b0daaf8d950881

  • \Program Files (x86)\Fonsd\dmcef.dll

    Filesize

    112KB

    MD5

    4cc6c14965dc584f09024497e32bce07

    SHA1

    67143d3b0338b7bcb8c1cfcfc24a25859d67095a

    SHA256

    08fdef9c3b54e2049ad80b838a4a4afef3a99c608e1305f358360ea1d0e37cb9

    SHA512

    f26db500778869bbc04b7ae54a75a7250edcb2fd6c9ff9a692cc98030863ae0b87952320c7dcd6d64c35c6b46b6f7090aa493f656fb606ec53bf31d10d0841c4

  • \Program Files (x86)\Fonsd\update.exe

    Filesize

    294KB

    MD5

    bcf4278bf8b9a49fbab9b49d9d6e34cd

    SHA1

    4138c5b6159e280cb9df9007d63d859e4aae9bdd

    SHA256

    bce88b8d91f9dad4d0492a5ba633cab7ffb32afdfe9a47e4e76898d8662835c8

    SHA512

    aa23a9f38636175ef06bb64c0c7bb881a9ce5a169b77445347d333c40ca49b243ce119ab0602fd661a6574a1e9ec914306ab0a3bfe9b7a2b58ca5ef63f4971a3

  • memory/2060-32-0x0000000000EE5000-0x0000000001348000-memory.dmp

    Filesize

    4.4MB

  • memory/2060-34-0x0000000000D80000-0x0000000001989000-memory.dmp

    Filesize

    12.0MB

  • memory/2060-30-0x0000000000D80000-0x0000000001989000-memory.dmp

    Filesize

    12.0MB

  • memory/2060-29-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/2060-27-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/2060-24-0x00000000001A0000-0x00000000001A1000-memory.dmp

    Filesize

    4KB

  • memory/2060-22-0x00000000001A0000-0x00000000001A1000-memory.dmp

    Filesize

    4KB

  • memory/2060-19-0x0000000000190000-0x0000000000191000-memory.dmp

    Filesize

    4KB

  • memory/2060-17-0x0000000000190000-0x0000000000191000-memory.dmp

    Filesize

    4KB

  • memory/2060-14-0x0000000000180000-0x0000000000181000-memory.dmp

    Filesize

    4KB

  • memory/2060-12-0x0000000000180000-0x0000000000181000-memory.dmp

    Filesize

    4KB

  • memory/2060-0-0x0000000000110000-0x0000000000111000-memory.dmp

    Filesize

    4KB

  • memory/2060-47-0x0000000000EE5000-0x0000000001348000-memory.dmp

    Filesize

    4.4MB

  • memory/2060-9-0x0000000000170000-0x0000000000171000-memory.dmp

    Filesize

    4KB

  • memory/2060-48-0x0000000000D80000-0x0000000001989000-memory.dmp

    Filesize

    12.0MB

  • memory/2060-5-0x0000000000170000-0x0000000000171000-memory.dmp

    Filesize

    4KB

  • memory/2060-7-0x0000000000170000-0x0000000000171000-memory.dmp

    Filesize

    4KB

  • memory/2060-4-0x0000000000110000-0x0000000000111000-memory.dmp

    Filesize

    4KB

  • memory/2060-2-0x0000000000110000-0x0000000000111000-memory.dmp

    Filesize

    4KB

  • memory/2508-60-0x0000000001F10000-0x0000000002007000-memory.dmp

    Filesize

    988KB

  • memory/2508-62-0x0000000000240000-0x0000000000271000-memory.dmp

    Filesize

    196KB

  • memory/2508-55-0x0000000010000000-0x0000000010018000-memory.dmp

    Filesize

    96KB

  • memory/2508-66-0x0000000002010000-0x0000000002107000-memory.dmp

    Filesize

    988KB

  • memory/2508-67-0x00000000001C0000-0x00000000001EA000-memory.dmp

    Filesize

    168KB