Analysis Overview
SHA256
4804a369c53921ce8b508b285eab8d50955418fcf95e98c43e07ce8cbdb5d43a
Threat Level: Shows suspicious behavior
The file 888 Rat v1.2.6.7z was found to be: Shows suspicious behavior.
Malicious Activity Summary
Loads dropped DLL
ACProtect 1.3x - 1.4x DLL software
UPX packed file
AutoIT Executable
System Location Discovery: System Language Discovery
Unsigned PE
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious behavior: EnumeratesProcesses
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-09-25 16:41
Signatures
AutoIT Executable
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-09-25 16:41
Reported
2024-09-25 17:24
Platform
win11-20240802-en
Max time kernel
1800s
Max time network
1161s
Command Line
Signatures
ACProtect 1.3x - 1.4x DLL software
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\888 Rat v1.2.6\888 Rat v1.2.6.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\888 Rat v1.2.6\888 Rat v1.2.6.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\888 Rat v1.2.6\888 Rat v1.2.6.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\888 Rat v1.2.6\888 Rat v1.2.6.exe | N/A |
AutoIT Executable
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\888 Rat v1.2.6\888 Rat v1.2.6.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\888 Rat v1.2.6\888 Rat v1.2.6.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\888 Rat v1.2.6\888 Rat v1.2.6.exe | N/A |
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\888 Rat v1.2.6\888 Rat v1.2.6.exe | N/A |
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\888 Rat v1.2.6\888 Rat v1.2.6.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\888 Rat v1.2.6\888 Rat v1.2.6.exe
"C:\Users\Admin\AppData\Local\Temp\888 Rat v1.2.6\888 Rat v1.2.6.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 43.229.111.52.in-addr.arpa | udp |
Files
C:\Users\Admin\AppData\Local\Temp\autADCA.tmp
| MD5 | 29e1d5770184bf45139084bced50d306 |
| SHA1 | 76c953cd86b013c3113f8495b656bd721be55e76 |
| SHA256 | 794987c4069286f797631f936c73b925c663c42d552aeca821106dfc7c7ba307 |
| SHA512 | 7cb3d0788978b6dc5a78f65349366dac3e91b1557efa4f385984bef4940b3ea859f75cfe42c71f6fe445555138f44305531de6a89c5beff4bf9d42001b4348e8 |
C:\Users\Admin\AppData\Local\Temp\skin.888ww.msstyles
| MD5 | ea5d5266b8a7bcc8788c83ebb7c8c7d5 |
| SHA1 | 3e9ac1ab7d5d54db9b3d141e82916513e572b415 |
| SHA256 | 91ac4d215b8d90aef9a000900c9088d4c33d58c5f35a720a385a3f2d2299e5d1 |
| SHA512 | 404b35fca478a1f489ec1af7be1df897190d7deb0cd8139c2c89d68c24fa377d904cf0c5e30c09ab448d74d87a47aaa3a872bf66a9bc9c124f52798320d34e60 |
memory/2156-46-0x000000000E060000-0x000000000E11B000-memory.dmp
memory/2156-45-0x000000000E060000-0x000000000E11B000-memory.dmp
memory/2156-52-0x0000000077090000-0x000000007710C000-memory.dmp
memory/2156-55-0x0000000077090000-0x000000007710C000-memory.dmp
memory/2156-58-0x0000000076CC0000-0x0000000076CE5000-memory.dmp
memory/2156-51-0x0000000000660000-0x000000000515D000-memory.dmp
memory/2156-57-0x0000000077090000-0x000000007710C000-memory.dmp
memory/2156-54-0x0000000077090000-0x000000007710C000-memory.dmp
memory/2156-61-0x0000000076CC0000-0x0000000076CE5000-memory.dmp
memory/2156-60-0x0000000077090000-0x000000007710C000-memory.dmp
memory/2156-56-0x0000000000660000-0x000000000515D000-memory.dmp
memory/2156-53-0x0000000000660000-0x000000000515D000-memory.dmp
memory/2156-63-0x0000000076CC0000-0x0000000076CE5000-memory.dmp
memory/2156-64-0x00000000775F0000-0x00000000776AF000-memory.dmp
memory/2156-59-0x0000000000660000-0x000000000515D000-memory.dmp
memory/2156-67-0x00000000774A0000-0x00000000775ED000-memory.dmp
memory/2156-66-0x00000000759B0000-0x0000000075FB2000-memory.dmp
memory/2156-62-0x0000000000660000-0x000000000515D000-memory.dmp
memory/2156-65-0x0000000075600000-0x0000000075823000-memory.dmp
memory/2156-71-0x0000000075600000-0x0000000075823000-memory.dmp
memory/2156-74-0x00000000774A0000-0x00000000775ED000-memory.dmp
memory/2156-73-0x0000000075070000-0x00000000750F2000-memory.dmp
memory/2156-72-0x00000000759B0000-0x0000000075FB2000-memory.dmp
memory/2156-70-0x00000000775F0000-0x00000000776AF000-memory.dmp
memory/2156-69-0x0000000076D70000-0x0000000076E4F000-memory.dmp
memory/2156-83-0x0000000075070000-0x00000000750F2000-memory.dmp
memory/2156-78-0x00000000759B0000-0x0000000075FB2000-memory.dmp
memory/2156-82-0x00000000759B0000-0x0000000075FB2000-memory.dmp
memory/2156-68-0x0000000000660000-0x000000000515D000-memory.dmp
memory/2156-81-0x0000000075600000-0x0000000075823000-memory.dmp
memory/2156-86-0x0000000075600000-0x0000000075823000-memory.dmp
memory/2156-88-0x0000000075070000-0x00000000750F2000-memory.dmp
memory/2156-75-0x0000000000660000-0x000000000515D000-memory.dmp
memory/2156-87-0x00000000759B0000-0x0000000075FB2000-memory.dmp
memory/2156-94-0x0000000075070000-0x00000000750F2000-memory.dmp
memory/2156-92-0x0000000075600000-0x0000000075823000-memory.dmp
memory/2156-95-0x00000000774A0000-0x00000000775ED000-memory.dmp
memory/2156-93-0x00000000759B0000-0x0000000075FB2000-memory.dmp
memory/2156-91-0x00000000775F0000-0x00000000776AF000-memory.dmp
memory/2156-105-0x0000000075600000-0x0000000075823000-memory.dmp
memory/2156-104-0x00000000759B0000-0x0000000075FB2000-memory.dmp
memory/2156-107-0x0000000075070000-0x00000000750F2000-memory.dmp
memory/2156-89-0x0000000000660000-0x000000000515D000-memory.dmp
memory/2156-111-0x0000000075070000-0x00000000750F2000-memory.dmp
memory/2156-110-0x00000000759B0000-0x0000000075FB2000-memory.dmp
memory/2156-109-0x0000000075600000-0x0000000075823000-memory.dmp
memory/2156-106-0x00000000759B0000-0x0000000075FB2000-memory.dmp
memory/2156-103-0x0000000075600000-0x0000000075823000-memory.dmp
memory/2156-112-0x00000000759B0000-0x0000000075FB2000-memory.dmp
memory/2156-102-0x00000000759B0000-0x0000000075FB2000-memory.dmp
memory/2156-84-0x0000000000660000-0x000000000515D000-memory.dmp
memory/2156-101-0x0000000075600000-0x0000000075823000-memory.dmp
memory/2156-100-0x00000000759B0000-0x0000000075FB2000-memory.dmp
memory/2156-99-0x0000000075600000-0x0000000075823000-memory.dmp
memory/2156-98-0x00000000759B0000-0x0000000075FB2000-memory.dmp
memory/2156-97-0x0000000075600000-0x0000000075823000-memory.dmp
memory/2156-90-0x0000000076D70000-0x0000000076E4F000-memory.dmp
memory/2156-114-0x00000000775F0000-0x00000000776AF000-memory.dmp
memory/2156-85-0x00000000775F0000-0x00000000776AF000-memory.dmp
memory/2156-108-0x0000000000660000-0x000000000515D000-memory.dmp
memory/2156-115-0x0000000075600000-0x0000000075823000-memory.dmp
memory/2156-96-0x0000000000660000-0x000000000515D000-memory.dmp
memory/2156-80-0x00000000775F0000-0x00000000776AF000-memory.dmp
memory/2156-79-0x0000000075070000-0x00000000750F2000-memory.dmp
memory/2156-77-0x0000000075600000-0x0000000075823000-memory.dmp
memory/2156-76-0x00000000775F0000-0x00000000776AF000-memory.dmp
memory/2156-128-0x000000000E060000-0x000000000E11B000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\Splash8.jpg
| MD5 | a3083356947cdfb053c7c63cec79e85f |
| SHA1 | 81d71adf137d5a8dff56843250578bb68333ba9a |
| SHA256 | 3e290e256bf19f56b233c42f19397807a83bde6cc792d6ea2f6c615cfc92ec1d |
| SHA512 | 820ac1ca3472f2356c7ad3c7443a431eea3f710679e6467f47ee8918e7c206767ff99401ced14dd3d012d930b1aad3225b9f9e1a7a9ee4303a8b204f05fdf766 |
memory/2156-136-0x000000000E060000-0x000000000E11B000-memory.dmp