Analysis
-
max time kernel
102s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 06:13
Static task
static1
Behavioral task
behavioral1
Sample
ca210e068987b172434c1b99cb6f5f56fba99b3bccf5ff4c4e8cd170c7b9a8a2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ca210e068987b172434c1b99cb6f5f56fba99b3bccf5ff4c4e8cd170c7b9a8a2.exe
Resource
win10v2004-20241007-en
General
-
Target
ca210e068987b172434c1b99cb6f5f56fba99b3bccf5ff4c4e8cd170c7b9a8a2.exe
-
Size
6.1MB
-
MD5
052072ffc4f8449345ceea343fdee0a7
-
SHA1
c64f1e6fa8b7ebcbda234f4534fbf654b0a4850c
-
SHA256
ca210e068987b172434c1b99cb6f5f56fba99b3bccf5ff4c4e8cd170c7b9a8a2
-
SHA512
1703513639446cc7c72142571f3016032df27346c09b2da1a5b35e51b814f27e4f13599702338e884182f578eef7f32d90d165732238c45f26523a88f9737f97
-
SSDEEP
98304:AAymlFX/ZL1K4WIqBI4rpNBczHA65wtX5bBeNz26AG1jQiWHugB9:AAhlFRLchIqBfz82XN8N6OjQr
Malware Config
Signatures
-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Fatalrat family
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral2/memory/3948-52-0x00000000039A0000-0x0000000003AED000-memory.dmp family_gh0strat behavioral2/memory/3948-53-0x00000000039A0000-0x0000000003AED000-memory.dmp family_gh0strat -
Gh0strat family
-
Fatal Rat payload 1 IoCs
resource yara_rule behavioral2/memory/3948-43-0x0000000002E60000-0x0000000002E8A000-memory.dmp fatalrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation NHdVRh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Macromedia-Packages.lnk NHdVRh.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Macromedia-Packages.lnk NHdVRh.exe -
Executes dropped EXE 2 IoCs
pid Process 2432 NHdVRh.exe 3948 NHdVRh.exe -
Loads dropped DLL 2 IoCs
pid Process 3948 NHdVRh.exe 3948 NHdVRh.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
resource yara_rule behavioral2/memory/3948-52-0x00000000039A0000-0x0000000003AED000-memory.dmp upx behavioral2/memory/3948-53-0x00000000039A0000-0x0000000003AED000-memory.dmp upx behavioral2/memory/3948-49-0x00000000039A0000-0x0000000003AED000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NHdVRh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NHdVRh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ca210e068987b172434c1b99cb6f5f56fba99b3bccf5ff4c4e8cd170c7b9a8a2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language write.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wordpad.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 NHdVRh.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz NHdVRh.exe -
Modifies data under HKEY_USERS 9 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer cmd.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\SlowContextMenuEntries = 0114020000000000c0000000000000466d0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 cmd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ cmd.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" cmd.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" cmd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached cmd.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" cmd.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" cmd.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{00021401-0000-0000-C000-000000000046} {000214E4-0000-0000-C000-000000000046} 0xFFFF = 0100000000000000087d52e0934bdb01 cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3480 ca210e068987b172434c1b99cb6f5f56fba99b3bccf5ff4c4e8cd170c7b9a8a2.exe 3480 ca210e068987b172434c1b99cb6f5f56fba99b3bccf5ff4c4e8cd170c7b9a8a2.exe 3480 ca210e068987b172434c1b99cb6f5f56fba99b3bccf5ff4c4e8cd170c7b9a8a2.exe 3480 ca210e068987b172434c1b99cb6f5f56fba99b3bccf5ff4c4e8cd170c7b9a8a2.exe 3480 ca210e068987b172434c1b99cb6f5f56fba99b3bccf5ff4c4e8cd170c7b9a8a2.exe 3480 ca210e068987b172434c1b99cb6f5f56fba99b3bccf5ff4c4e8cd170c7b9a8a2.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe 3948 NHdVRh.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3948 NHdVRh.exe Token: SeDebugPrivilege 3948 NHdVRh.exe Token: SeIncBasePriorityPrivilege 3948 NHdVRh.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1924 wordpad.exe 1924 wordpad.exe 1924 wordpad.exe 1924 wordpad.exe 1924 wordpad.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3480 wrote to memory of 2376 3480 ca210e068987b172434c1b99cb6f5f56fba99b3bccf5ff4c4e8cd170c7b9a8a2.exe 85 PID 3480 wrote to memory of 2376 3480 ca210e068987b172434c1b99cb6f5f56fba99b3bccf5ff4c4e8cd170c7b9a8a2.exe 85 PID 3480 wrote to memory of 2376 3480 ca210e068987b172434c1b99cb6f5f56fba99b3bccf5ff4c4e8cd170c7b9a8a2.exe 85 PID 1004 wrote to memory of 2432 1004 cmd.exe 88 PID 1004 wrote to memory of 2432 1004 cmd.exe 88 PID 1004 wrote to memory of 2432 1004 cmd.exe 88 PID 2376 wrote to memory of 1924 2376 write.exe 87 PID 2376 wrote to memory of 1924 2376 write.exe 87 PID 2376 wrote to memory of 1924 2376 write.exe 87 PID 1924 wrote to memory of 3960 1924 wordpad.exe 91 PID 1924 wrote to memory of 3960 1924 wordpad.exe 91 PID 3480 wrote to memory of 3056 3480 ca210e068987b172434c1b99cb6f5f56fba99b3bccf5ff4c4e8cd170c7b9a8a2.exe 94 PID 3480 wrote to memory of 3056 3480 ca210e068987b172434c1b99cb6f5f56fba99b3bccf5ff4c4e8cd170c7b9a8a2.exe 94 PID 3480 wrote to memory of 3056 3480 ca210e068987b172434c1b99cb6f5f56fba99b3bccf5ff4c4e8cd170c7b9a8a2.exe 94 PID 3056 wrote to memory of 3948 3056 cmd.exe 95 PID 3056 wrote to memory of 3948 3056 cmd.exe 95 PID 3056 wrote to memory of 3948 3056 cmd.exe 95 PID 3948 wrote to memory of 1396 3948 NHdVRh.exe 104 PID 3948 wrote to memory of 1396 3948 NHdVRh.exe 104 PID 3948 wrote to memory of 1396 3948 NHdVRh.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca210e068987b172434c1b99cb6f5f56fba99b3bccf5ff4c4e8cd170c7b9a8a2.exe"C:\Users\Admin\AppData\Local\Temp\ca210e068987b172434c1b99cb6f5f56fba99b3bccf5ff4c4e8cd170c7b9a8a2.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\SysWOW64\write.exe"C:\Windows\System32\write.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe"C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122884⤵PID:3960
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\ProgramData\NHdVRh\NHdVRh.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\ProgramData\NHdVRh\NHdVRh.exe"C:\ProgramData\NHdVRh\NHdVRh.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c del /q C:\ProgramData\NHdVRh\NHdVRh.exe4⤵
- System Location Discovery: System Language Discovery
PID:1396
-
-
-
-
C:\Windows\system32\cmd.execmd /c start C:\Users\Admin\Desktop\NHdV.lnk1⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Users\Admin\AppData\Roaming\NHdVRh.exe"C:\Users\Admin\AppData\Roaming\NHdVRh.exe" -n C:\Users\Admin\AppData\Roaming\NHdVR.zip -d C:\Users\Admin\AppData\Roaming2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2432
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:1512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340KB
MD586f1895ae8c5e8b17d99ece768a70732
SHA1d5502a1d00787d68f548ddeebbde1eca5e2b38ca
SHA2568094af5ee310714caebccaeee7769ffb08048503ba478b879edfef5f1a24fefe
SHA5123b7ce2b67056b6e005472b73447d2226677a8cadae70428873f7efa5ed11a3b3dbf6b1a42c5b05b1f2b1d8e06ff50dfc6532f043af8452ed87687eefbf1791da
-
Filesize
885KB
MD59e6082e88e8ef4c1bc50bca07ed21ad4
SHA1ada9368c8a9b3430933c9df50272d4bd26831f4d
SHA256e6fd5a873ba71bfc108000d25c73e03d184955c7aa5ffa17fc33ca2d0c5fd203
SHA5123350e3dac2f8465bf966e8fa6e54a34842196dfbcc1e785b11ccef082f750d278116a6e6164ff07e3f7247039e22395186ed9fcb1c4141ba74c5e48dc8da1915
-
Filesize
1.7MB
MD55518f1f23917af02b88dac408e358ab9
SHA1c110e288db0a65155cc6f32d7b786c3d319b4986
SHA2569efcd38d6fdd8b15f9f223d39ad2185ade41674d355f7fcbd7361c1a0271f35a
SHA51217a8e8d69a7bd5854da31d67ca198a1c42998451facc24a017b13bb8da1981fe4c4002f12e46aa3fe651723736d43925c518d0da95b41dba750ece5c470a050e
-
Filesize
1.2MB
MD57384b590bbac1439e788640bc849759c
SHA1a245fde160ae5796ae0e06b63e1448689f9b7e61
SHA256cc52cdafa4d588e382dd30148eede53ba9dd9e16b95315bdd9de626521f7a302
SHA5128fee0d97e541bb36163e7153d53cea3752dc4c0539705aaecbc3b803471990d26160478ac2bb450cf81fa3eda8ce237672f905ebf609fcd9836b948c43fb5d5b
-
Filesize
653B
MD581b256f2adbfb6c962e8476bc740af6a
SHA120c62062e7131827ee0c0ac807492247591b9363
SHA2566a93dd61ae95abb6dbbaf7c22e3198ef66a4017a6e1edc5c158727f020e19923
SHA512e55b4103e4ba7d506fc47046db005c9e0bf28156d4ae3690c4427dadc59371797a6cb14e5cf65f976015c998f197f299ddd0abc065bc4210a0001776a02874bc
-
Filesize
220KB
MD591eb8e88965207b2023519b7da93ac2b
SHA127ab0cbfddfd2cd4eae70b8762cd9ffc9382cbb4
SHA25656efb141fc00a52e24d736cab09b966f80dacda3ce57386c1e5b1cc661c6bf4c
SHA5127c3c1116388ec0ee725950340a6af705844313cbc62fc778eda147d8b99c144b3d13c92321f40a6292c443c93dfbcc855d792a9b36be573859e8876a770b11e1
-
Filesize
948B
MD513151a2c75411353bb256e40fbdcda75
SHA133402c0a3622a3ccfe89e914d3bfc42752b97d80
SHA256aed84b61dcca6e62b8b6f5f9b18f9b76331114f395ba7408f83e31e2e2decc5e
SHA512abe3244c6725d3549d09637330d83ce595058cff70846899f9388fd67923eb1072decd567530074935501667c79eeae737e133c5636f9dc1032fcbb47eca937e
-
Filesize
1KB
MD5f9363042671d59a82d61493045ac0905
SHA1cd25ed53d6bc37e4824644cb509a52ac6d6633a0
SHA256f18a46c5d5b0ca9cdc8ca769489e55bf73b76a40a13e59fb5cc6f530e5199136
SHA5121cb440777fe1d1f68a3f771d368b455df8d81f12cccfeb8a721202e7758910953b393fba1b4810e1dcf452fd3530232f7a944ece94a47a76f5109b290a4d33c9