Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 06:21
Static task
static1
Behavioral task
behavioral1
Sample
ca210e068987b172434c1b99cb6f5f56fba99b3bccf5ff4c4e8cd170c7b9a8a2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ca210e068987b172434c1b99cb6f5f56fba99b3bccf5ff4c4e8cd170c7b9a8a2.exe
Resource
win10v2004-20241007-en
General
-
Target
ca210e068987b172434c1b99cb6f5f56fba99b3bccf5ff4c4e8cd170c7b9a8a2.exe
-
Size
6.1MB
-
MD5
052072ffc4f8449345ceea343fdee0a7
-
SHA1
c64f1e6fa8b7ebcbda234f4534fbf654b0a4850c
-
SHA256
ca210e068987b172434c1b99cb6f5f56fba99b3bccf5ff4c4e8cd170c7b9a8a2
-
SHA512
1703513639446cc7c72142571f3016032df27346c09b2da1a5b35e51b814f27e4f13599702338e884182f578eef7f32d90d165732238c45f26523a88f9737f97
-
SSDEEP
98304:AAymlFX/ZL1K4WIqBI4rpNBczHA65wtX5bBeNz26AG1jQiWHugB9:AAhlFRLchIqBfz82XN8N6OjQr
Malware Config
Signatures
-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Fatalrat family
-
Fatal Rat payload 1 IoCs
resource yara_rule behavioral1/memory/1668-80-0x0000000002710000-0x000000000273A000-memory.dmp fatalrat -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Macromedia-Packages.lnk VNU6sR.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Macromedia-Packages.lnk VNU6sR.exe -
Executes dropped EXE 2 IoCs
pid Process 2608 VNU6sR.exe 1668 VNU6sR.exe -
Loads dropped DLL 5 IoCs
pid Process 2504 ca210e068987b172434c1b99cb6f5f56fba99b3bccf5ff4c4e8cd170c7b9a8a2.exe 2888 cmd.exe 2888 cmd.exe 1668 VNU6sR.exe 1668 VNU6sR.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language write.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wordpad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VNU6sR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VNU6sR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ca210e068987b172434c1b99cb6f5f56fba99b3bccf5ff4c4e8cd170c7b9a8a2.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 VNU6sR.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz VNU6sR.exe -
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{6C467336-8281-4E60-8204-430CED96822D} {000214E4-0000-0000-C000-000000000046} 0xFFFF = 010000000000000020dcc2f1944bdb01 cmd.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{DFFACDC5-679F-4156-8947-C5C76BC0B67F} {ADD8BA80-002B-11D0-8F0F-00C04FD7D062} 0xFFFF = 0100000000000000803dc5f1944bdb01 cmd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ cmd.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" cmd.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" cmd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached cmd.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2608 VNU6sR.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2504 ca210e068987b172434c1b99cb6f5f56fba99b3bccf5ff4c4e8cd170c7b9a8a2.exe 2504 ca210e068987b172434c1b99cb6f5f56fba99b3bccf5ff4c4e8cd170c7b9a8a2.exe 2504 ca210e068987b172434c1b99cb6f5f56fba99b3bccf5ff4c4e8cd170c7b9a8a2.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe 1668 VNU6sR.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1668 VNU6sR.exe Token: SeDebugPrivilege 1668 VNU6sR.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2852 wordpad.exe 2852 wordpad.exe 2852 wordpad.exe 2852 wordpad.exe 2852 wordpad.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2220 2504 ca210e068987b172434c1b99cb6f5f56fba99b3bccf5ff4c4e8cd170c7b9a8a2.exe 32 PID 2504 wrote to memory of 2220 2504 ca210e068987b172434c1b99cb6f5f56fba99b3bccf5ff4c4e8cd170c7b9a8a2.exe 32 PID 2504 wrote to memory of 2220 2504 ca210e068987b172434c1b99cb6f5f56fba99b3bccf5ff4c4e8cd170c7b9a8a2.exe 32 PID 2504 wrote to memory of 2220 2504 ca210e068987b172434c1b99cb6f5f56fba99b3bccf5ff4c4e8cd170c7b9a8a2.exe 32 PID 2220 wrote to memory of 2852 2220 write.exe 34 PID 2220 wrote to memory of 2852 2220 write.exe 34 PID 2220 wrote to memory of 2852 2220 write.exe 34 PID 2220 wrote to memory of 2852 2220 write.exe 34 PID 2828 wrote to memory of 2608 2828 cmd.exe 35 PID 2828 wrote to memory of 2608 2828 cmd.exe 35 PID 2828 wrote to memory of 2608 2828 cmd.exe 35 PID 2828 wrote to memory of 2608 2828 cmd.exe 35 PID 2852 wrote to memory of 2628 2852 wordpad.exe 36 PID 2852 wrote to memory of 2628 2852 wordpad.exe 36 PID 2852 wrote to memory of 2628 2852 wordpad.exe 36 PID 2852 wrote to memory of 2628 2852 wordpad.exe 36 PID 2504 wrote to memory of 2888 2504 ca210e068987b172434c1b99cb6f5f56fba99b3bccf5ff4c4e8cd170c7b9a8a2.exe 38 PID 2504 wrote to memory of 2888 2504 ca210e068987b172434c1b99cb6f5f56fba99b3bccf5ff4c4e8cd170c7b9a8a2.exe 38 PID 2504 wrote to memory of 2888 2504 ca210e068987b172434c1b99cb6f5f56fba99b3bccf5ff4c4e8cd170c7b9a8a2.exe 38 PID 2504 wrote to memory of 2888 2504 ca210e068987b172434c1b99cb6f5f56fba99b3bccf5ff4c4e8cd170c7b9a8a2.exe 38 PID 2888 wrote to memory of 1668 2888 cmd.exe 39 PID 2888 wrote to memory of 1668 2888 cmd.exe 39 PID 2888 wrote to memory of 1668 2888 cmd.exe 39 PID 2888 wrote to memory of 1668 2888 cmd.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca210e068987b172434c1b99cb6f5f56fba99b3bccf5ff4c4e8cd170c7b9a8a2.exe"C:\Users\Admin\AppData\Local\Temp\ca210e068987b172434c1b99cb6f5f56fba99b3bccf5ff4c4e8cd170c7b9a8a2.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\write.exe"C:\Windows\System32\write.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe"C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122884⤵PID:2628
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\ProgramData\VNU6sR\VNU6sR.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\ProgramData\VNU6sR\VNU6sR.exe"C:\ProgramData\VNU6sR\VNU6sR.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1668
-
-
-
C:\Windows\system32\cmd.execmd /c start C:\Users\Admin\Desktop\VNU6.lnk1⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Roaming\VNU6sR.exe"C:\Users\Admin\AppData\Roaming\VNU6sR.exe" -n C:\Users\Admin\AppData\Roaming\VNU6s.zip -d C:\Users\Admin\AppData\Roaming2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340KB
MD586f1895ae8c5e8b17d99ece768a70732
SHA1d5502a1d00787d68f548ddeebbde1eca5e2b38ca
SHA2568094af5ee310714caebccaeee7769ffb08048503ba478b879edfef5f1a24fefe
SHA5123b7ce2b67056b6e005472b73447d2226677a8cadae70428873f7efa5ed11a3b3dbf6b1a42c5b05b1f2b1d8e06ff50dfc6532f043af8452ed87687eefbf1791da
-
Filesize
1.7MB
MD55518f1f23917af02b88dac408e358ab9
SHA1c110e288db0a65155cc6f32d7b786c3d319b4986
SHA2569efcd38d6fdd8b15f9f223d39ad2185ade41674d355f7fcbd7361c1a0271f35a
SHA51217a8e8d69a7bd5854da31d67ca198a1c42998451facc24a017b13bb8da1981fe4c4002f12e46aa3fe651723736d43925c518d0da95b41dba750ece5c470a050e
-
Filesize
1.2MB
MD57384b590bbac1439e788640bc849759c
SHA1a245fde160ae5796ae0e06b63e1448689f9b7e61
SHA256cc52cdafa4d588e382dd30148eede53ba9dd9e16b95315bdd9de626521f7a302
SHA5128fee0d97e541bb36163e7153d53cea3752dc4c0539705aaecbc3b803471990d26160478ac2bb450cf81fa3eda8ce237672f905ebf609fcd9836b948c43fb5d5b
-
Filesize
686B
MD56e1c79106a3912d45d34aee0cb5e9203
SHA17c3257d86d943de81d344296dd66670536cfa2f5
SHA25600df75b3ecc1ca7aa21e82533ad858ebfd04b674b56b66bbab049f6d25f40875
SHA512afa4768e982cdee3c74ddc8c799659ea8c61bd6e044de3cf4e6e9a170b417bf85012b75f22cdfd699f22d8194db2c879efb0aed19af87f0ec5af4b39b0b8eb35
-
Filesize
869B
MD500bc104e1918d295bc10408c6e9e046f
SHA1721fd756bda0c31a406368232d9102fd3cc7f2c9
SHA256ef0ff38e8b93f1909d9ae62f759ef86f43e362cefab16bc6ee9f0065cced7c32
SHA5127d795d789924a6a1c933b6146cb37d4101ae6f1eaf0c26aa846297f1a2962b5395ecb134bf47028f9b104891dce8b2a7ceffee4c2b5160bf9d6652f84bd8521e
-
Filesize
1KB
MD5f74dcb84428f4f471df812d28f4382ba
SHA1dbc56419f29f8fcbe2dfe9c0cbf59dd7a7f5ec96
SHA2568a016f7b8921bca5d2b4337b5714948b09a5ed0fe386b679b64cf1b1848eb121
SHA512a98fad392d70f736390d751ce55b188c952071ebb11362a7354e6ee045a70afd949bd13da190cd69dbd9f76c426ddec462e69ffa577021fdf3dba7cd6ffc007c
-
Filesize
885KB
MD59e6082e88e8ef4c1bc50bca07ed21ad4
SHA1ada9368c8a9b3430933c9df50272d4bd26831f4d
SHA256e6fd5a873ba71bfc108000d25c73e03d184955c7aa5ffa17fc33ca2d0c5fd203
SHA5123350e3dac2f8465bf966e8fa6e54a34842196dfbcc1e785b11ccef082f750d278116a6e6164ff07e3f7247039e22395186ed9fcb1c4141ba74c5e48dc8da1915
-
Filesize
220KB
MD591eb8e88965207b2023519b7da93ac2b
SHA127ab0cbfddfd2cd4eae70b8762cd9ffc9382cbb4
SHA25656efb141fc00a52e24d736cab09b966f80dacda3ce57386c1e5b1cc661c6bf4c
SHA5127c3c1116388ec0ee725950340a6af705844313cbc62fc778eda147d8b99c144b3d13c92321f40a6292c443c93dfbcc855d792a9b36be573859e8876a770b11e1