Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2024 06:44
Behavioral task
behavioral1
Sample
9f2eb6fb4746d9b2d399717d75b7bda2826cf420da46e67a0e8d41048d1d8cce.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9f2eb6fb4746d9b2d399717d75b7bda2826cf420da46e67a0e8d41048d1d8cce.exe
Resource
win10v2004-20241007-en
General
-
Target
9f2eb6fb4746d9b2d399717d75b7bda2826cf420da46e67a0e8d41048d1d8cce.exe
-
Size
15.1MB
-
MD5
b2732ede2d21d21d9c0297054968f377
-
SHA1
caec13ed9863186da0ec509aeb8680237dc06133
-
SHA256
9f2eb6fb4746d9b2d399717d75b7bda2826cf420da46e67a0e8d41048d1d8cce
-
SHA512
6b3d5e0c9caaaf41e33e7b52aae0eb3c1caa93ab80c980ae1ae32eb46594be690b11dc72cced3cbeee71b9838fd2ed89aaa3bb74f88ec5d7c91a082c0fed753c
-
SSDEEP
393216:v1czy2O5JZIB4YYFT5aUniQTWSt+DT5D9q6F:vKm2O5JNVaUni4Wf/5Z7
Malware Config
Signatures
-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Fatalrat family
-
Fatal Rat payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/5092-57-0x0000000010000000-0x0000000010029000-memory.dmp fatalrat -
Processes:
resource yara_rule behavioral2/files/0x000a000000023b8a-9.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
9f2eb6fb4746d9b2d399717d75b7bda2826cf420da46e67a0e8d41048d1d8cce.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 9f2eb6fb4746d9b2d399717d75b7bda2826cf420da46e67a0e8d41048d1d8cce.exe -
Executes dropped EXE 5 IoCs
Processes:
u1.exePTvrst.exespolsvt.exespolsvt.exesvcoth.exepid Process 1308 u1.exe 4044 PTvrst.exe 4772 spolsvt.exe 5092 spolsvt.exe 2212 svcoth.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
u1.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Çý¶¯ÈËÉú = "C:\\Users\\Public\\Documents\\sougou\\PTvrst.exe" u1.exe -
Processes:
u1.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA u1.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
PTvrst.exespolsvt.exedescription pid Process procid_target PID 4044 set thread context of 4772 4044 PTvrst.exe 84 PID 4772 set thread context of 5092 4772 spolsvt.exe 85 PID 4772 set thread context of 2212 4772 spolsvt.exe 88 -
Processes:
resource yara_rule behavioral2/memory/4996-0-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/4996-68-0x0000000000400000-0x0000000000433000-memory.dmp upx -
Drops file in Program Files directory 6 IoCs
Processes:
9f2eb6fb4746d9b2d399717d75b7bda2826cf420da46e67a0e8d41048d1d8cce.exedescription ioc Process File opened for modification C:\Program Files (x86)\u1.exe 9f2eb6fb4746d9b2d399717d75b7bda2826cf420da46e67a0e8d41048d1d8cce.exe File created C:\Program Files (x86)\letsvpn-latest - 副本.exe 9f2eb6fb4746d9b2d399717d75b7bda2826cf420da46e67a0e8d41048d1d8cce.exe File opened for modification C:\Program Files (x86)\letsvpn-latest - 副本.exe 9f2eb6fb4746d9b2d399717d75b7bda2826cf420da46e67a0e8d41048d1d8cce.exe File created C:\Program Files (x86)\letsvpn-latest.exe 9f2eb6fb4746d9b2d399717d75b7bda2826cf420da46e67a0e8d41048d1d8cce.exe File opened for modification C:\Program Files (x86)\letsvpn-latest.exe 9f2eb6fb4746d9b2d399717d75b7bda2826cf420da46e67a0e8d41048d1d8cce.exe File created C:\Program Files (x86)\u1.exe 9f2eb6fb4746d9b2d399717d75b7bda2826cf420da46e67a0e8d41048d1d8cce.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
u1.exePTvrst.exespolsvt.exespolsvt.execmd.exesvcoth.exe9f2eb6fb4746d9b2d399717d75b7bda2826cf420da46e67a0e8d41048d1d8cce.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language u1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PTvrst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spolsvt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spolsvt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svcoth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9f2eb6fb4746d9b2d399717d75b7bda2826cf420da46e67a0e8d41048d1d8cce.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
spolsvt.exepid Process 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe 5092 spolsvt.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
spolsvt.exedescription pid Process Token: SeDebugPrivilege 5092 spolsvt.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
u1.exePTvrst.exespolsvt.exepid Process 1308 u1.exe 1308 u1.exe 4044 PTvrst.exe 4044 PTvrst.exe 4772 spolsvt.exe -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
9f2eb6fb4746d9b2d399717d75b7bda2826cf420da46e67a0e8d41048d1d8cce.exeu1.exePTvrst.exespolsvt.exedescription pid Process procid_target PID 4996 wrote to memory of 1308 4996 9f2eb6fb4746d9b2d399717d75b7bda2826cf420da46e67a0e8d41048d1d8cce.exe 82 PID 4996 wrote to memory of 1308 4996 9f2eb6fb4746d9b2d399717d75b7bda2826cf420da46e67a0e8d41048d1d8cce.exe 82 PID 4996 wrote to memory of 1308 4996 9f2eb6fb4746d9b2d399717d75b7bda2826cf420da46e67a0e8d41048d1d8cce.exe 82 PID 1308 wrote to memory of 4044 1308 u1.exe 83 PID 1308 wrote to memory of 4044 1308 u1.exe 83 PID 1308 wrote to memory of 4044 1308 u1.exe 83 PID 4044 wrote to memory of 4772 4044 PTvrst.exe 84 PID 4044 wrote to memory of 4772 4044 PTvrst.exe 84 PID 4044 wrote to memory of 4772 4044 PTvrst.exe 84 PID 4044 wrote to memory of 4772 4044 PTvrst.exe 84 PID 4044 wrote to memory of 4772 4044 PTvrst.exe 84 PID 4044 wrote to memory of 4772 4044 PTvrst.exe 84 PID 4044 wrote to memory of 4772 4044 PTvrst.exe 84 PID 4044 wrote to memory of 4772 4044 PTvrst.exe 84 PID 4772 wrote to memory of 5092 4772 spolsvt.exe 85 PID 4772 wrote to memory of 5092 4772 spolsvt.exe 85 PID 4772 wrote to memory of 5092 4772 spolsvt.exe 85 PID 4772 wrote to memory of 5092 4772 spolsvt.exe 85 PID 4772 wrote to memory of 5092 4772 spolsvt.exe 85 PID 4772 wrote to memory of 5092 4772 spolsvt.exe 85 PID 4772 wrote to memory of 5092 4772 spolsvt.exe 85 PID 4772 wrote to memory of 5092 4772 spolsvt.exe 85 PID 4996 wrote to memory of 3652 4996 9f2eb6fb4746d9b2d399717d75b7bda2826cf420da46e67a0e8d41048d1d8cce.exe 86 PID 4996 wrote to memory of 3652 4996 9f2eb6fb4746d9b2d399717d75b7bda2826cf420da46e67a0e8d41048d1d8cce.exe 86 PID 4996 wrote to memory of 3652 4996 9f2eb6fb4746d9b2d399717d75b7bda2826cf420da46e67a0e8d41048d1d8cce.exe 86 PID 4772 wrote to memory of 2212 4772 spolsvt.exe 88 PID 4772 wrote to memory of 2212 4772 spolsvt.exe 88 PID 4772 wrote to memory of 2212 4772 spolsvt.exe 88 PID 4772 wrote to memory of 2212 4772 spolsvt.exe 88 PID 4772 wrote to memory of 2212 4772 spolsvt.exe 88 PID 4772 wrote to memory of 2212 4772 spolsvt.exe 88 PID 4772 wrote to memory of 2212 4772 spolsvt.exe 88 PID 4772 wrote to memory of 2212 4772 spolsvt.exe 88 PID 4772 wrote to memory of 2212 4772 spolsvt.exe 88 PID 4772 wrote to memory of 2212 4772 spolsvt.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f2eb6fb4746d9b2d399717d75b7bda2826cf420da46e67a0e8d41048d1d8cce.exe"C:\Users\Admin\AppData\Local\Temp\9f2eb6fb4746d9b2d399717d75b7bda2826cf420da46e67a0e8d41048d1d8cce.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Program Files (x86)\u1.exe"C:\Program Files (x86)\u1.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Public\Documents\sougou\PTvrst.exeC:\Users\Public\Documents\sougou\PTvrst.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Users\Public\Documents\sougou\spolsvt.exeC:\Users\Public\Documents\sougou\spolsvt.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Public\Documents\dd\spolsvt.exeC:\Users\Public\Documents\dd\spolsvt.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5092
-
-
C:\Users\Public\Documents\uu\svcoth.exeC:\Users\Public\Documents\uu\svcoth.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2212
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd" "2⤵
- System Location Discovery: System Language Discovery
PID:3652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14.5MB
MD594f6bd702b7a2e17c45d16eaf7da0d64
SHA145f8c05851bcf16416e087253ce962b320e9db8a
SHA25607f44325eab13b01d536a42e90a0247c6efecf23ccd4586309828aa814f5c776
SHA5127ffc5183d3f1fb23e38c60d55724ab9e9e1e3832c9fb09296f0635f78d81477c6894c00a28e63096fa395e1c11cbeaa1f77f910f9ff9c1f1ecf0b857aa671b3d
-
Filesize
793KB
MD547c11aea2837b96731eda50693197aa7
SHA11b9a1d6c72c65a8353f38e6cdb604319b5529687
SHA256b0a3cd4a479ad347b34dce62debf0b1cf4f258c5689ac64419acdffbf012d096
SHA512e38fc0691ec86739da9c107c00c56165fd60d9e79ff617f4dd8416ba07f1127221731e9dd22f4eaea4d0b0f44346803964c113f1d7c42de80d229c85330a210a
-
Filesize
300B
MD595cccac19caf278789307b067a6c626b
SHA108890d77e9330953c497556e82913a4a95962407
SHA256642a1b14e8778a61389476f20f5d54d1ad3777b43a64966262f67072940b25e6
SHA512e79cabdcf4d905a5ea1b727c27d1bfcc0cb593df9ddebee0d1cbe654161802aefbd62b3d32f1bff8c5b626a07048e5f291aa43761f7ae54c003fcce6b6a80c8f
-
Filesize
16KB
MD5cdce4713e784ae069d73723034a957ff
SHA19a393a6bab6568f1a774fb753353223f11367e09
SHA256b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8
SHA5120a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f
-
Filesize
219KB
MD56fa8f3c5e7670094a1f66035bdce541c
SHA1122fcba8f761eb3695a948b68be2cb803a43d903
SHA256f2a8b444d6cc5d3a88d10e5d2388e91a17248a1191d8780c62761bae10574c45
SHA5129e6d3b2d764e2ad716c9246c574af62eec2a6e76f1b95db7c8ac684372e6660a43d8dd2bbcabffe66013ea99612114dea28a62caaef530add20725a230672e67
-
Filesize
9KB
MD5523d5c39f9d8d2375c3df68251fa2249
SHA1d4ed365c44bec9246fc1a65a32a7791792647a10
SHA25620e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78
SHA512526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4