Resubmissions
25-09-2024 16:41
240925-t64njsygjb 725-09-2024 13:59
240925-ranlcayfqr 1025-09-2024 13:56
240925-q853lsscqh 7Analysis
-
max time kernel
14s -
max time network
19s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
25-09-2024 13:56
Static task
static1
General
-
Target
888 Rat v1.2.6/888 Rat v1.2.6.exe
-
Size
75.0MB
-
MD5
ad33064a9ca95c5b3ed45c14b7fe2739
-
SHA1
0bd1286fa5fd936a31a4514798daffa444ce8e12
-
SHA256
5a14099abd6fe4b396094db7f9911251b25cd57893e14f97a7e7c5f44337bc98
-
SHA512
acb056e217edef4639179b24193a454f7e5aade51c1cc972e0458fc23c0ad982323161ad37050a4d849641dbf84719707efdcf4c99ecdf413381e5a752413647
-
SSDEEP
1572864:5mhnD+9mK/LnkHD1LYrXatfLllR3RboTmxXlIgU/cNruKPZiv:6nD+UozkJLYrXajR4ElIgU/c5Qv
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\aut7F09.tmp acprotect -
Loads dropped DLL 4 IoCs
Processes:
888 Rat v1.2.6.exepid process 2796 888 Rat v1.2.6.exe 2796 888 Rat v1.2.6.exe 2796 888 Rat v1.2.6.exe 2796 888 Rat v1.2.6.exe -
AutoIT Executable 10 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/2796-56-0x00000000010C0000-0x0000000005BBD000-memory.dmp autoit_exe behavioral1/memory/2796-59-0x00000000010C0000-0x0000000005BBD000-memory.dmp autoit_exe behavioral1/memory/2796-53-0x00000000010C0000-0x0000000005BBD000-memory.dmp autoit_exe behavioral1/memory/2796-51-0x00000000010C0000-0x0000000005BBD000-memory.dmp autoit_exe behavioral1/memory/2796-68-0x00000000010C0000-0x0000000005BBD000-memory.dmp autoit_exe behavioral1/memory/2796-62-0x00000000010C0000-0x0000000005BBD000-memory.dmp autoit_exe behavioral1/memory/2796-94-0x00000000010C0000-0x0000000005BBD000-memory.dmp autoit_exe behavioral1/memory/2796-104-0x00000000010C0000-0x0000000005BBD000-memory.dmp autoit_exe behavioral1/memory/2796-88-0x00000000010C0000-0x0000000005BBD000-memory.dmp autoit_exe behavioral1/memory/2796-77-0x00000000010C0000-0x0000000005BBD000-memory.dmp autoit_exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\aut7F09.tmp upx behavioral1/memory/2796-45-0x000000000DBA0000-0x000000000DC5B000-memory.dmp upx behavioral1/memory/2796-44-0x000000000DBA0000-0x000000000DC5B000-memory.dmp upx behavioral1/memory/2796-142-0x000000000DBA0000-0x000000000DC5B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
888 Rat v1.2.6.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 888 Rat v1.2.6.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
888 Rat v1.2.6.exepid process 2796 888 Rat v1.2.6.exe 2796 888 Rat v1.2.6.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
888 Rat v1.2.6.exepid process 2796 888 Rat v1.2.6.exe 2796 888 Rat v1.2.6.exe 2796 888 Rat v1.2.6.exe 2796 888 Rat v1.2.6.exe -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
888 Rat v1.2.6.exepid process 2796 888 Rat v1.2.6.exe 2796 888 Rat v1.2.6.exe 2796 888 Rat v1.2.6.exe 2796 888 Rat v1.2.6.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
888 Rat v1.2.6.exepid process 2796 888 Rat v1.2.6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\888 Rat v1.2.6\888 Rat v1.2.6.exe"C:\Users\Admin\AppData\Local\Temp\888 Rat v1.2.6\888 Rat v1.2.6.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2796
-
C:\Windows\SysWOW64\werfault.exewerfault.exe /h /shared Global\ee0ee9e198ac4460b66df3a3541e6baf /t 2108 /p 27961⤵PID:4536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
239KB
MD529e1d5770184bf45139084bced50d306
SHA176c953cd86b013c3113f8495b656bd721be55e76
SHA256794987c4069286f797631f936c73b925c663c42d552aeca821106dfc7c7ba307
SHA5127cb3d0788978b6dc5a78f65349366dac3e91b1557efa4f385984bef4940b3ea859f75cfe42c71f6fe445555138f44305531de6a89c5beff4bf9d42001b4348e8
-
Filesize
3.3MB
MD5ea5d5266b8a7bcc8788c83ebb7c8c7d5
SHA13e9ac1ab7d5d54db9b3d141e82916513e572b415
SHA25691ac4d215b8d90aef9a000900c9088d4c33d58c5f35a720a385a3f2d2299e5d1
SHA512404b35fca478a1f489ec1af7be1df897190d7deb0cd8139c2c89d68c24fa377d904cf0c5e30c09ab448d74d87a47aaa3a872bf66a9bc9c124f52798320d34e60