Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-08-2024 17:19

General

  • Target

    0713e9742f7920fc0f1b2c062dce06041f7a0d509e2408328da8db32bb8cafdc.exe

  • Size

    3.4MB

  • MD5

    2245645176fda20e229c972cf00329cd

  • SHA1

    7c42fa190c87252db3a2d9b39932721183a0d7b5

  • SHA256

    0713e9742f7920fc0f1b2c062dce06041f7a0d509e2408328da8db32bb8cafdc

  • SHA512

    bdf3e6f553f4a8f7609bbe6401f847c3f43d559ba5e0f8ee7395c8e7449b6fa8c319f064d6a37bcab97a4fc3cf3379058b4d71ad17bb0d741946447a2a1c6247

  • SSDEEP

    49152:Zu5baCAy1uOiIELlhW3TipIdrs7A/J1PS/cAE8EFDziOshku0YQaCo:MAuuOiZzWRdrpS/JE7+Lhf0YQ6

Malware Config

Signatures

  • FatalRat

    FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

  • Fatal Rat payload 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0713e9742f7920fc0f1b2c062dce06041f7a0d509e2408328da8db32bb8cafdc.exe
    "C:\Users\Admin\AppData\Local\Temp\0713e9742f7920fc0f1b2c062dce06041f7a0d509e2408328da8db32bb8cafdc.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2620

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2620-0-0x0000000000400000-0x000000000091A000-memory.dmp

    Filesize

    5.1MB

  • memory/2620-2-0x0000000010000000-0x000000001002D000-memory.dmp

    Filesize

    180KB