Analysis
-
max time kernel
119s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/11/2024, 06:44
Behavioral task
behavioral1
Sample
9f2eb6fb4746d9b2d399717d75b7bda2826cf420da46e67a0e8d41048d1d8cce.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9f2eb6fb4746d9b2d399717d75b7bda2826cf420da46e67a0e8d41048d1d8cce.exe
Resource
win10v2004-20241007-en
General
-
Target
9f2eb6fb4746d9b2d399717d75b7bda2826cf420da46e67a0e8d41048d1d8cce.exe
-
Size
15.1MB
-
MD5
b2732ede2d21d21d9c0297054968f377
-
SHA1
caec13ed9863186da0ec509aeb8680237dc06133
-
SHA256
9f2eb6fb4746d9b2d399717d75b7bda2826cf420da46e67a0e8d41048d1d8cce
-
SHA512
6b3d5e0c9caaaf41e33e7b52aae0eb3c1caa93ab80c980ae1ae32eb46594be690b11dc72cced3cbeee71b9838fd2ed89aaa3bb74f88ec5d7c91a082c0fed753c
-
SSDEEP
393216:v1czy2O5JZIB4YYFT5aUniQTWSt+DT5D9q6F:vKm2O5JNVaUni4Wf/5Z7
Malware Config
Signatures
-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Fatalrat family
-
Fatal Rat payload 1 IoCs
resource yara_rule behavioral1/memory/2508-76-0x0000000010000000-0x0000000010029000-memory.dmp fatalrat -
resource yara_rule behavioral1/files/0x0008000000014bda-8.dat aspack_v212_v242 -
Deletes itself 1 IoCs
pid Process 1428 cmd.exe -
Executes dropped EXE 5 IoCs
pid Process 2088 u1.exe 2584 PTvrst.exe 2660 spolsvt.exe 2508 spolsvt.exe 2904 svcoth.exe -
Loads dropped DLL 5 IoCs
pid Process 2996 9f2eb6fb4746d9b2d399717d75b7bda2826cf420da46e67a0e8d41048d1d8cce.exe 2088 u1.exe 2584 PTvrst.exe 2660 spolsvt.exe 2660 spolsvt.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Çý¶¯ÈËÉú = "C:\\Users\\Public\\Documents\\sougou\\PTvrst.exe" u1.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA u1.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2584 set thread context of 2660 2584 PTvrst.exe 30 PID 2660 set thread context of 2508 2660 spolsvt.exe 31 PID 2660 set thread context of 2904 2660 spolsvt.exe 35 -
resource yara_rule behavioral1/memory/2996-0-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/2996-92-0x0000000000400000-0x0000000000433000-memory.dmp upx -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files (x86)\letsvpn-latest - 副本.exe 9f2eb6fb4746d9b2d399717d75b7bda2826cf420da46e67a0e8d41048d1d8cce.exe File opened for modification C:\Program Files (x86)\letsvpn-latest - 副本.exe 9f2eb6fb4746d9b2d399717d75b7bda2826cf420da46e67a0e8d41048d1d8cce.exe File created C:\Program Files (x86)\letsvpn-latest.exe 9f2eb6fb4746d9b2d399717d75b7bda2826cf420da46e67a0e8d41048d1d8cce.exe File opened for modification C:\Program Files (x86)\letsvpn-latest.exe 9f2eb6fb4746d9b2d399717d75b7bda2826cf420da46e67a0e8d41048d1d8cce.exe File created C:\Program Files (x86)\u1.exe 9f2eb6fb4746d9b2d399717d75b7bda2826cf420da46e67a0e8d41048d1d8cce.exe File opened for modification C:\Program Files (x86)\u1.exe 9f2eb6fb4746d9b2d399717d75b7bda2826cf420da46e67a0e8d41048d1d8cce.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9f2eb6fb4746d9b2d399717d75b7bda2826cf420da46e67a0e8d41048d1d8cce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language u1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PTvrst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spolsvt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spolsvt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svcoth.exe -
Suspicious behavior: EnumeratesProcesses 55 IoCs
pid Process 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe 2508 spolsvt.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2508 spolsvt.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2088 u1.exe 2088 u1.exe 2584 PTvrst.exe 2584 PTvrst.exe 2660 spolsvt.exe -
Suspicious use of WriteProcessMemory 53 IoCs
description pid Process procid_target PID 2996 wrote to memory of 2088 2996 9f2eb6fb4746d9b2d399717d75b7bda2826cf420da46e67a0e8d41048d1d8cce.exe 28 PID 2996 wrote to memory of 2088 2996 9f2eb6fb4746d9b2d399717d75b7bda2826cf420da46e67a0e8d41048d1d8cce.exe 28 PID 2996 wrote to memory of 2088 2996 9f2eb6fb4746d9b2d399717d75b7bda2826cf420da46e67a0e8d41048d1d8cce.exe 28 PID 2996 wrote to memory of 2088 2996 9f2eb6fb4746d9b2d399717d75b7bda2826cf420da46e67a0e8d41048d1d8cce.exe 28 PID 2088 wrote to memory of 2584 2088 u1.exe 29 PID 2088 wrote to memory of 2584 2088 u1.exe 29 PID 2088 wrote to memory of 2584 2088 u1.exe 29 PID 2088 wrote to memory of 2584 2088 u1.exe 29 PID 2088 wrote to memory of 2584 2088 u1.exe 29 PID 2088 wrote to memory of 2584 2088 u1.exe 29 PID 2088 wrote to memory of 2584 2088 u1.exe 29 PID 2584 wrote to memory of 2660 2584 PTvrst.exe 30 PID 2584 wrote to memory of 2660 2584 PTvrst.exe 30 PID 2584 wrote to memory of 2660 2584 PTvrst.exe 30 PID 2584 wrote to memory of 2660 2584 PTvrst.exe 30 PID 2584 wrote to memory of 2660 2584 PTvrst.exe 30 PID 2584 wrote to memory of 2660 2584 PTvrst.exe 30 PID 2584 wrote to memory of 2660 2584 PTvrst.exe 30 PID 2584 wrote to memory of 2660 2584 PTvrst.exe 30 PID 2584 wrote to memory of 2660 2584 PTvrst.exe 30 PID 2584 wrote to memory of 2660 2584 PTvrst.exe 30 PID 2584 wrote to memory of 2660 2584 PTvrst.exe 30 PID 2584 wrote to memory of 2660 2584 PTvrst.exe 30 PID 2660 wrote to memory of 2508 2660 spolsvt.exe 31 PID 2660 wrote to memory of 2508 2660 spolsvt.exe 31 PID 2660 wrote to memory of 2508 2660 spolsvt.exe 31 PID 2660 wrote to memory of 2508 2660 spolsvt.exe 31 PID 2660 wrote to memory of 2508 2660 spolsvt.exe 31 PID 2660 wrote to memory of 2508 2660 spolsvt.exe 31 PID 2660 wrote to memory of 2508 2660 spolsvt.exe 31 PID 2660 wrote to memory of 2508 2660 spolsvt.exe 31 PID 2660 wrote to memory of 2508 2660 spolsvt.exe 31 PID 2660 wrote to memory of 2508 2660 spolsvt.exe 31 PID 2660 wrote to memory of 2508 2660 spolsvt.exe 31 PID 2660 wrote to memory of 2508 2660 spolsvt.exe 31 PID 2996 wrote to memory of 1428 2996 9f2eb6fb4746d9b2d399717d75b7bda2826cf420da46e67a0e8d41048d1d8cce.exe 32 PID 2996 wrote to memory of 1428 2996 9f2eb6fb4746d9b2d399717d75b7bda2826cf420da46e67a0e8d41048d1d8cce.exe 32 PID 2996 wrote to memory of 1428 2996 9f2eb6fb4746d9b2d399717d75b7bda2826cf420da46e67a0e8d41048d1d8cce.exe 32 PID 2996 wrote to memory of 1428 2996 9f2eb6fb4746d9b2d399717d75b7bda2826cf420da46e67a0e8d41048d1d8cce.exe 32 PID 2660 wrote to memory of 2904 2660 spolsvt.exe 35 PID 2660 wrote to memory of 2904 2660 spolsvt.exe 35 PID 2660 wrote to memory of 2904 2660 spolsvt.exe 35 PID 2660 wrote to memory of 2904 2660 spolsvt.exe 35 PID 2660 wrote to memory of 2904 2660 spolsvt.exe 35 PID 2660 wrote to memory of 2904 2660 spolsvt.exe 35 PID 2660 wrote to memory of 2904 2660 spolsvt.exe 35 PID 2660 wrote to memory of 2904 2660 spolsvt.exe 35 PID 2660 wrote to memory of 2904 2660 spolsvt.exe 35 PID 2660 wrote to memory of 2904 2660 spolsvt.exe 35 PID 2660 wrote to memory of 2904 2660 spolsvt.exe 35 PID 2660 wrote to memory of 2904 2660 spolsvt.exe 35 PID 2660 wrote to memory of 2904 2660 spolsvt.exe 35 PID 2660 wrote to memory of 2904 2660 spolsvt.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f2eb6fb4746d9b2d399717d75b7bda2826cf420da46e67a0e8d41048d1d8cce.exe"C:\Users\Admin\AppData\Local\Temp\9f2eb6fb4746d9b2d399717d75b7bda2826cf420da46e67a0e8d41048d1d8cce.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Program Files (x86)\u1.exe"C:\Program Files (x86)\u1.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Public\Documents\sougou\PTvrst.exeC:\Users\Public\Documents\sougou\PTvrst.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Public\Documents\sougou\spolsvt.exeC:\Users\Public\Documents\sougou\spolsvt.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Public\Documents\dd\spolsvt.exeC:\Users\Public\Documents\dd\spolsvt.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2508
-
-
C:\Users\Public\Documents\uu\svcoth.exeC:\Users\Public\Documents\uu\svcoth.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2904
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14.5MB
MD594f6bd702b7a2e17c45d16eaf7da0d64
SHA145f8c05851bcf16416e087253ce962b320e9db8a
SHA25607f44325eab13b01d536a42e90a0247c6efecf23ccd4586309828aa814f5c776
SHA5127ffc5183d3f1fb23e38c60d55724ab9e9e1e3832c9fb09296f0635f78d81477c6894c00a28e63096fa395e1c11cbeaa1f77f910f9ff9c1f1ecf0b857aa671b3d
-
Filesize
300B
MD595cccac19caf278789307b067a6c626b
SHA108890d77e9330953c497556e82913a4a95962407
SHA256642a1b14e8778a61389476f20f5d54d1ad3777b43a64966262f67072940b25e6
SHA512e79cabdcf4d905a5ea1b727c27d1bfcc0cb593df9ddebee0d1cbe654161802aefbd62b3d32f1bff8c5b626a07048e5f291aa43761f7ae54c003fcce6b6a80c8f
-
Filesize
219KB
MD56fa8f3c5e7670094a1f66035bdce541c
SHA1122fcba8f761eb3695a948b68be2cb803a43d903
SHA256f2a8b444d6cc5d3a88d10e5d2388e91a17248a1191d8780c62761bae10574c45
SHA5129e6d3b2d764e2ad716c9246c574af62eec2a6e76f1b95db7c8ac684372e6660a43d8dd2bbcabffe66013ea99612114dea28a62caaef530add20725a230672e67
-
Filesize
9KB
MD5523d5c39f9d8d2375c3df68251fa2249
SHA1d4ed365c44bec9246fc1a65a32a7791792647a10
SHA25620e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78
SHA512526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4
-
Filesize
793KB
MD547c11aea2837b96731eda50693197aa7
SHA11b9a1d6c72c65a8353f38e6cdb604319b5529687
SHA256b0a3cd4a479ad347b34dce62debf0b1cf4f258c5689ac64419acdffbf012d096
SHA512e38fc0691ec86739da9c107c00c56165fd60d9e79ff617f4dd8416ba07f1127221731e9dd22f4eaea4d0b0f44346803964c113f1d7c42de80d229c85330a210a
-
Filesize
16KB
MD5cdce4713e784ae069d73723034a957ff
SHA19a393a6bab6568f1a774fb753353223f11367e09
SHA256b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8
SHA5120a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f