Analysis
-
max time kernel
121s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-08-2024 14:32
Static task
static1
Behavioral task
behavioral1
Sample
50b4945478aef7db5e7cfd2681d855d0e984e3e219181edae95839353b778979.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
50b4945478aef7db5e7cfd2681d855d0e984e3e219181edae95839353b778979.exe
Resource
win10v2004-20240802-en
General
-
Target
50b4945478aef7db5e7cfd2681d855d0e984e3e219181edae95839353b778979.exe
-
Size
868KB
-
MD5
4f1b748ea4b5b97209b85126eb89d1eb
-
SHA1
17fc1483d5aadfad83f16e5b2ec32af777db9121
-
SHA256
50b4945478aef7db5e7cfd2681d855d0e984e3e219181edae95839353b778979
-
SHA512
6aaa898098f7c88dc04d179cb1df3f16b109372ab6f627aef6b4f167ca0b62a924beb25ace44516d175b6b3346ada9e384f85d87e3513bc3d12d6ec75b8e2d18
-
SSDEEP
24576:/VtCLSEynMWnnlxZjXGUijM/OFa8j8jUduL0XHoIfdoPjKElxREqFvTTNH:NtaROMWnnlxZjWAOFa8j8jUduLkoIfdM
Malware Config
Signatures
-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Fatal Rat payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2292-0-0x0000000010000000-0x000000001002A000-memory.dmp fatalrat -
Executes dropped EXE 2 IoCs
Processes:
Nopqrs.exeNopqrs.exepid process 2572 Nopqrs.exe 2968 Nopqrs.exe -
Loads dropped DLL 1 IoCs
Processes:
Nopqrs.exepid process 2572 Nopqrs.exe -
Drops file in System32 directory 7 IoCs
Processes:
Nopqrs.exeNopqrs.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Nopqrs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Nopqrs.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\getip[1].htm Nopqrs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_786387CC77858B88BA3234B304062475 Nopqrs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_786387CC77858B88BA3234B304062475 Nopqrs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CF14D1855652602540DFCFECD21854DB_47530B00274A9A7AF822523F21AAA8A1 Nopqrs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CF14D1855652602540DFCFECD21854DB_47530B00274A9A7AF822523F21AAA8A1 Nopqrs.exe -
Drops file in Program Files directory 4 IoCs
Processes:
50b4945478aef7db5e7cfd2681d855d0e984e3e219181edae95839353b778979.exeNopqrs.exedescription ioc process File opened for modification C:\Program Files (x86)\AppPatch\Nopqrs.exe 50b4945478aef7db5e7cfd2681d855d0e984e3e219181edae95839353b778979.exe File opened for modification C:\Program Files (x86)\AppPatch\Nopqrs.exe Nopqrs.exe File created C:\Program Files (x86)\AppPatch\Nopqrs.exe Nopqrs.exe File created C:\Program Files (x86)\AppPatch\Nopqrs.exe 50b4945478aef7db5e7cfd2681d855d0e984e3e219181edae95839353b778979.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
50b4945478aef7db5e7cfd2681d855d0e984e3e219181edae95839353b778979.exeNopqrs.exeNopqrs.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 50b4945478aef7db5e7cfd2681d855d0e984e3e219181edae95839353b778979.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nopqrs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nopqrs.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Nopqrs.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Nopqrs.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Nopqrs.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
Nopqrs.exeNopqrs.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates Nopqrs.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft Nopqrs.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6D9B3702-0093-465D-913D-830EBBC758EF}\WpadDecision = "0" Nopqrs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA Nopqrs.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs Nopqrs.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates Nopqrs.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a2-fd-a1-fd-6e-bd\WpadDetectedUrl Nopqrs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople Nopqrs.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a2-fd-a1-fd-6e-bd\WpadDecisionReason = "1" Nopqrs.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a2-fd-a1-fd-6e-bd Nopqrs.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a2-fd-a1-fd-6e-bd\WpadDecision = "0" Nopqrs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot Nopqrs.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0199000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Nopqrs.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Nopqrs.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion Nopqrs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Nopqrs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust Nopqrs.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0199000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Nopqrs.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft Nopqrs.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableLockWorkstation = "1" Nopqrs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed Nopqrs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Nopqrs.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0199000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Nopqrs.exe Set value (str) \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Services\Nopqrs Uvwxyabc\InstallTime = "2024-08-12 14:32" Nopqrs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing Nopqrs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust Nopqrs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Nopqrs.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies Nopqrs.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableLockWorkstation = "1" Nopqrs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed Nopqrs.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates Nopqrs.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs Nopqrs.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs Nopqrs.exe Key created \REGISTRY\USER\.DEFAULT\Software Nopqrs.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs Nopqrs.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs Nopqrs.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs Nopqrs.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a2-fd-a1-fd-6e-bd\WpadDecisionTime = b0896474c4ecda01 Nopqrs.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Nopqrs.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a2-fd-a1-fd-6e-bd Nopqrs.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6D9B3702-0093-465D-913D-830EBBC758EF}\WpadDecisionTime = b0896474c4ecda01 Nopqrs.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Nopqrs.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs Nopqrs.exe Set value (str) \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Services\Nopqrs Uvwxyabc\Group = "Fatal" Nopqrs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My Nopqrs.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Nopqrs.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6D9B3702-0093-465D-913D-830EBBC758EF}\WpadDecisionTime = b0819b72c4ecda01 Nopqrs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople Nopqrs.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs Nopqrs.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs Nopqrs.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates Nopqrs.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 Nopqrs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Nopqrs.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6D9B3702-0093-465D-913D-830EBBC758EF}\WpadNetworkName = "Network 3" Nopqrs.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates Nopqrs.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Nopqrs.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates Nopqrs.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet Nopqrs.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6D9B3702-0093-465D-913D-830EBBC758EF}\WpadDecisionReason = "1" Nopqrs.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6D9B3702-0093-465D-913D-830EBBC758EF} Nopqrs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System Nopqrs.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie Nopqrs.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum Nopqrs.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum\Version = "7" Nopqrs.exe -
Suspicious behavior: EnumeratesProcesses 51 IoCs
Processes:
Nopqrs.exepid process 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe 2968 Nopqrs.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
50b4945478aef7db5e7cfd2681d855d0e984e3e219181edae95839353b778979.exeNopqrs.exeNopqrs.exedescription pid process Token: SeDebugPrivilege 2292 50b4945478aef7db5e7cfd2681d855d0e984e3e219181edae95839353b778979.exe Token: SeDebugPrivilege 2572 Nopqrs.exe Token: SeDebugPrivilege 2968 Nopqrs.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
Nopqrs.exedescription pid process target process PID 2572 wrote to memory of 2968 2572 Nopqrs.exe Nopqrs.exe PID 2572 wrote to memory of 2968 2572 Nopqrs.exe Nopqrs.exe PID 2572 wrote to memory of 2968 2572 Nopqrs.exe Nopqrs.exe PID 2572 wrote to memory of 2968 2572 Nopqrs.exe Nopqrs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\50b4945478aef7db5e7cfd2681d855d0e984e3e219181edae95839353b778979.exe"C:\Users\Admin\AppData\Local\Temp\50b4945478aef7db5e7cfd2681d855d0e984e3e219181edae95839353b778979.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2292
-
C:\Program Files (x86)\AppPatch\Nopqrs.exe"C:\Program Files (x86)\AppPatch\Nopqrs.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Program Files (x86)\AppPatch\Nopqrs.exe"C:\Program Files (x86)\AppPatch\Nopqrs.exe" Win72⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
868KB
MD54f1b748ea4b5b97209b85126eb89d1eb
SHA117fc1483d5aadfad83f16e5b2ec32af777db9121
SHA25650b4945478aef7db5e7cfd2681d855d0e984e3e219181edae95839353b778979
SHA5126aaa898098f7c88dc04d179cb1df3f16b109372ab6f627aef6b4f167ca0b62a924beb25ace44516d175b6b3346ada9e384f85d87e3513bc3d12d6ec75b8e2d18