Malware Analysis Report

2024-10-18 23:03

Sample ID 240925-q853lsscqh
Target 888 Rat v1.2.6.7z
SHA256 4804a369c53921ce8b508b285eab8d50955418fcf95e98c43e07ce8cbdb5d43a
Tags
discovery upx
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

4804a369c53921ce8b508b285eab8d50955418fcf95e98c43e07ce8cbdb5d43a

Threat Level: Shows suspicious behavior

The file 888 Rat v1.2.6.7z was found to be: Shows suspicious behavior.

Malicious Activity Summary

discovery upx

ACProtect 1.3x - 1.4x DLL software

Loads dropped DLL

UPX packed file

AutoIT Executable

Unsigned PE

System Location Discovery: System Language Discovery

Suspicious use of FindShellTrayWindow

Suspicious use of SendNotifyMessage

Suspicious use of SetWindowsHookEx

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-09-25 13:57

Signatures

AutoIT Executable

Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-09-25 13:56

Reported

2024-09-25 13:59

Platform

win10-20240404-en

Max time kernel

14s

Max time network

19s

Command Line

"C:\Users\Admin\AppData\Local\Temp\888 Rat v1.2.6\888 Rat v1.2.6.exe"

Signatures

ACProtect 1.3x - 1.4x DLL software

Description Indicator Process Target
N/A N/A N/A N/A

AutoIT Executable

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\888 Rat v1.2.6\888 Rat v1.2.6.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\888 Rat v1.2.6\888 Rat v1.2.6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\888 Rat v1.2.6\888 Rat v1.2.6.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\888 Rat v1.2.6\888 Rat v1.2.6.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\888 Rat v1.2.6\888 Rat v1.2.6.exe

"C:\Users\Admin\AppData\Local\Temp\888 Rat v1.2.6\888 Rat v1.2.6.exe"

C:\Windows\SysWOW64\werfault.exe

werfault.exe /h /shared Global\ee0ee9e198ac4460b66df3a3541e6baf /t 2108 /p 2796

Network

N/A

Files

C:\Users\Admin\AppData\Local\Temp\aut7F09.tmp

MD5 29e1d5770184bf45139084bced50d306
SHA1 76c953cd86b013c3113f8495b656bd721be55e76
SHA256 794987c4069286f797631f936c73b925c663c42d552aeca821106dfc7c7ba307
SHA512 7cb3d0788978b6dc5a78f65349366dac3e91b1557efa4f385984bef4940b3ea859f75cfe42c71f6fe445555138f44305531de6a89c5beff4bf9d42001b4348e8

memory/2796-45-0x000000000DBA0000-0x000000000DC5B000-memory.dmp

memory/2796-44-0x000000000DBA0000-0x000000000DC5B000-memory.dmp

\Users\Admin\AppData\Local\Temp\skin.888ww.msstyles

MD5 ea5d5266b8a7bcc8788c83ebb7c8c7d5
SHA1 3e9ac1ab7d5d54db9b3d141e82916513e572b415
SHA256 91ac4d215b8d90aef9a000900c9088d4c33d58c5f35a720a385a3f2d2299e5d1
SHA512 404b35fca478a1f489ec1af7be1df897190d7deb0cd8139c2c89d68c24fa377d904cf0c5e30c09ab448d74d87a47aaa3a872bf66a9bc9c124f52798320d34e60

memory/2796-54-0x0000000075B20000-0x0000000075B97000-memory.dmp

memory/2796-55-0x0000000075B20000-0x0000000075B97000-memory.dmp

memory/2796-58-0x0000000077580000-0x00000000775A5000-memory.dmp

memory/2796-57-0x0000000075B20000-0x0000000075B97000-memory.dmp

memory/2796-52-0x0000000075B20000-0x0000000075B97000-memory.dmp

memory/2796-61-0x0000000077580000-0x00000000775A5000-memory.dmp

memory/2796-60-0x0000000075B20000-0x0000000075B97000-memory.dmp

memory/2796-65-0x00000000741D0000-0x00000000743DE000-memory.dmp

memory/2796-56-0x00000000010C0000-0x0000000005BBD000-memory.dmp

memory/2796-64-0x00000000767D0000-0x00000000768BF000-memory.dmp

memory/2796-59-0x00000000010C0000-0x0000000005BBD000-memory.dmp

memory/2796-66-0x00000000747D0000-0x0000000075B18000-memory.dmp

memory/2796-67-0x0000000076110000-0x0000000076201000-memory.dmp

memory/2796-63-0x0000000077580000-0x00000000775A5000-memory.dmp

memory/2796-53-0x00000000010C0000-0x0000000005BBD000-memory.dmp

memory/2796-51-0x00000000010C0000-0x0000000005BBD000-memory.dmp

memory/2796-70-0x00000000767D0000-0x00000000768BF000-memory.dmp

memory/2796-74-0x0000000076110000-0x0000000076201000-memory.dmp

memory/2796-76-0x00000000775B0000-0x00000000776F6000-memory.dmp

memory/2796-73-0x00000000747D0000-0x0000000075B18000-memory.dmp

memory/2796-68-0x00000000010C0000-0x0000000005BBD000-memory.dmp

memory/2796-79-0x00000000741D0000-0x00000000743DE000-memory.dmp

memory/2796-82-0x00000000767D0000-0x00000000768BF000-memory.dmp

memory/2796-78-0x00000000767D0000-0x00000000768BF000-memory.dmp

memory/2796-75-0x0000000073E00000-0x0000000073E78000-memory.dmp

memory/2796-72-0x0000000074710000-0x0000000074755000-memory.dmp

memory/2796-71-0x00000000741D0000-0x00000000743DE000-memory.dmp

memory/2796-69-0x0000000076210000-0x0000000076369000-memory.dmp

memory/2796-62-0x00000000010C0000-0x0000000005BBD000-memory.dmp

memory/2796-85-0x0000000073E00000-0x0000000073E78000-memory.dmp

memory/2796-83-0x00000000741D0000-0x00000000743DE000-memory.dmp

memory/2796-81-0x0000000073E00000-0x0000000073E78000-memory.dmp

memory/2796-87-0x00000000775B0000-0x00000000776F6000-memory.dmp

memory/2796-84-0x00000000747D0000-0x0000000075B18000-memory.dmp

memory/2796-86-0x0000000077580000-0x00000000775A5000-memory.dmp

memory/2796-80-0x00000000747D0000-0x0000000075B18000-memory.dmp

memory/2796-93-0x00000000775B0000-0x00000000776F6000-memory.dmp

memory/2796-90-0x00000000741D0000-0x00000000743DE000-memory.dmp

memory/2796-91-0x00000000747D0000-0x0000000075B18000-memory.dmp

memory/2796-89-0x00000000767D0000-0x00000000768BF000-memory.dmp

memory/2796-100-0x0000000076110000-0x0000000076201000-memory.dmp

memory/2796-103-0x0000000073D70000-0x0000000073D93000-memory.dmp

memory/2796-102-0x00000000775B0000-0x00000000776F6000-memory.dmp

memory/2796-105-0x00000000741D0000-0x00000000743DE000-memory.dmp

memory/2796-99-0x00000000747D0000-0x0000000075B18000-memory.dmp

memory/2796-94-0x00000000010C0000-0x0000000005BBD000-memory.dmp

memory/2796-111-0x00000000741D0000-0x00000000743DE000-memory.dmp

memory/2796-108-0x00000000747D0000-0x0000000075B18000-memory.dmp

memory/2796-110-0x00000000747D0000-0x0000000075B18000-memory.dmp

memory/2796-112-0x00000000747D0000-0x0000000075B18000-memory.dmp

memory/2796-104-0x00000000010C0000-0x0000000005BBD000-memory.dmp

memory/2796-113-0x00000000741D0000-0x00000000743DE000-memory.dmp

memory/2796-109-0x00000000741D0000-0x00000000743DE000-memory.dmp

memory/2796-106-0x00000000747D0000-0x0000000075B18000-memory.dmp

memory/2796-107-0x00000000741D0000-0x00000000743DE000-memory.dmp

memory/2796-88-0x00000000010C0000-0x0000000005BBD000-memory.dmp

memory/2796-101-0x0000000073E00000-0x0000000073E78000-memory.dmp

memory/2796-98-0x0000000074710000-0x0000000074755000-memory.dmp

memory/2796-97-0x00000000741D0000-0x00000000743DE000-memory.dmp

memory/2796-96-0x00000000767D0000-0x00000000768BF000-memory.dmp

memory/2796-95-0x0000000076210000-0x0000000076369000-memory.dmp

memory/2796-77-0x00000000010C0000-0x0000000005BBD000-memory.dmp

memory/2796-92-0x0000000073E00000-0x0000000073E78000-memory.dmp

memory/2796-115-0x0000000073E00000-0x0000000073E78000-memory.dmp

memory/2796-142-0x000000000DBA0000-0x000000000DC5B000-memory.dmp