Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-10-2024 06:13

General

  • Target

    7c34fd3de3db1bee7a5501f51fc7a02adf36d82b047b38e545ddd55e10ee41b4.exe

  • Size

    780KB

  • MD5

    dbd7ada9754add9496e7baee7347ffd0

  • SHA1

    30569366c8158c3aa81f097ac323bd08bb8974c6

  • SHA256

    7c34fd3de3db1bee7a5501f51fc7a02adf36d82b047b38e545ddd55e10ee41b4

  • SHA512

    678190d61f0efcfbee877ab0cb50f380131ff14d2c85a084fc708a835555c004537abfc8c312a9d1c4efed4c79f24876a55949598e6e17bc757a66d38de1219b

  • SSDEEP

    6144:+Cs5XapMUkF8ixk3FaAY0RzX67xUaElqmHjSqXWFSzkPDNGEfVJBgAD:Q1apMUkuixqY2zqNUaElDHhXMykLlKi

Malware Config

Signatures

  • FatalRat

    FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

  • Fatal Rat payload 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7c34fd3de3db1bee7a5501f51fc7a02adf36d82b047b38e545ddd55e10ee41b4.exe
    "C:\Users\Admin\AppData\Local\Temp\7c34fd3de3db1bee7a5501f51fc7a02adf36d82b047b38e545ddd55e10ee41b4.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:100
  • C:\Windows\Ghijkl.exe
    C:\Windows\Ghijkl.exe
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4872
    • C:\Windows\Ghijkl.exe
      C:\Windows\Ghijkl.exe Win7
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:220

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Ghijkl.exe

    Filesize

    780KB

    MD5

    dbd7ada9754add9496e7baee7347ffd0

    SHA1

    30569366c8158c3aa81f097ac323bd08bb8974c6

    SHA256

    7c34fd3de3db1bee7a5501f51fc7a02adf36d82b047b38e545ddd55e10ee41b4

    SHA512

    678190d61f0efcfbee877ab0cb50f380131ff14d2c85a084fc708a835555c004537abfc8c312a9d1c4efed4c79f24876a55949598e6e17bc757a66d38de1219b

  • memory/100-1-0x0000000010000000-0x000000001002A000-memory.dmp

    Filesize

    168KB

  • memory/4872-8-0x0000000010000000-0x000000001002A000-memory.dmp

    Filesize

    168KB