Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 05:14
Behavioral task
behavioral1
Sample
RATcontrolpanel.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
RATcontrolpanel.exe
Resource
win10v2004-20241007-en
General
-
Target
RATcontrolpanel.exe
-
Size
81.2MB
-
MD5
45dfbeb921c2ba334d5c2345974f5e37
-
SHA1
1878b30e4a2e1e8bfa1c996ba7aef3aa740c90b8
-
SHA256
0f60fb03dc45218372b8e0d174534e8295a8ded3894069162ba1c581a233eb05
-
SHA512
f57f0137a0b34837756dda6d0d487280ab54477a0ff66eeb404b54f5c18112b181dd52cc997a737d056bcbb8af263cc99205081dfe423086f88b33ffc93724ea
-
SSDEEP
1572864:1GKlXebW8smwSk8IpG7V+VPhqb+T9E7NliHiYgj+h58sMw5IRerWhH/cJFJ:UKRCbsmwSkB05awb+TwwZ5Foer4eJ
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1676 RATcontrolpanel.exe -
resource yara_rule behavioral1/files/0x00030000000209e5-1264.dat upx -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1972 chrome.exe 1972 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2284 wrote to memory of 1676 2284 RATcontrolpanel.exe 28 PID 2284 wrote to memory of 1676 2284 RATcontrolpanel.exe 28 PID 2284 wrote to memory of 1676 2284 RATcontrolpanel.exe 28 PID 1972 wrote to memory of 1964 1972 chrome.exe 34 PID 1972 wrote to memory of 1964 1972 chrome.exe 34 PID 1972 wrote to memory of 1964 1972 chrome.exe 34 PID 1972 wrote to memory of 1700 1972 chrome.exe 36 PID 1972 wrote to memory of 1700 1972 chrome.exe 36 PID 1972 wrote to memory of 1700 1972 chrome.exe 36 PID 1972 wrote to memory of 1700 1972 chrome.exe 36 PID 1972 wrote to memory of 1700 1972 chrome.exe 36 PID 1972 wrote to memory of 1700 1972 chrome.exe 36 PID 1972 wrote to memory of 1700 1972 chrome.exe 36 PID 1972 wrote to memory of 1700 1972 chrome.exe 36 PID 1972 wrote to memory of 1700 1972 chrome.exe 36 PID 1972 wrote to memory of 1700 1972 chrome.exe 36 PID 1972 wrote to memory of 1700 1972 chrome.exe 36 PID 1972 wrote to memory of 1700 1972 chrome.exe 36 PID 1972 wrote to memory of 1700 1972 chrome.exe 36 PID 1972 wrote to memory of 1700 1972 chrome.exe 36 PID 1972 wrote to memory of 1700 1972 chrome.exe 36 PID 1972 wrote to memory of 1700 1972 chrome.exe 36 PID 1972 wrote to memory of 1700 1972 chrome.exe 36 PID 1972 wrote to memory of 1700 1972 chrome.exe 36 PID 1972 wrote to memory of 1700 1972 chrome.exe 36 PID 1972 wrote to memory of 1700 1972 chrome.exe 36 PID 1972 wrote to memory of 1700 1972 chrome.exe 36 PID 1972 wrote to memory of 1700 1972 chrome.exe 36 PID 1972 wrote to memory of 1700 1972 chrome.exe 36 PID 1972 wrote to memory of 1700 1972 chrome.exe 36 PID 1972 wrote to memory of 1700 1972 chrome.exe 36 PID 1972 wrote to memory of 1700 1972 chrome.exe 36 PID 1972 wrote to memory of 1700 1972 chrome.exe 36 PID 1972 wrote to memory of 1700 1972 chrome.exe 36 PID 1972 wrote to memory of 1700 1972 chrome.exe 36 PID 1972 wrote to memory of 1700 1972 chrome.exe 36 PID 1972 wrote to memory of 1700 1972 chrome.exe 36 PID 1972 wrote to memory of 1700 1972 chrome.exe 36 PID 1972 wrote to memory of 1700 1972 chrome.exe 36 PID 1972 wrote to memory of 1700 1972 chrome.exe 36 PID 1972 wrote to memory of 1700 1972 chrome.exe 36 PID 1972 wrote to memory of 1700 1972 chrome.exe 36 PID 1972 wrote to memory of 1700 1972 chrome.exe 36 PID 1972 wrote to memory of 1700 1972 chrome.exe 36 PID 1972 wrote to memory of 1700 1972 chrome.exe 36 PID 1972 wrote to memory of 2352 1972 chrome.exe 37 PID 1972 wrote to memory of 2352 1972 chrome.exe 37 PID 1972 wrote to memory of 2352 1972 chrome.exe 37 PID 1972 wrote to memory of 2156 1972 chrome.exe 38 PID 1972 wrote to memory of 2156 1972 chrome.exe 38 PID 1972 wrote to memory of 2156 1972 chrome.exe 38 PID 1972 wrote to memory of 2156 1972 chrome.exe 38 PID 1972 wrote to memory of 2156 1972 chrome.exe 38 PID 1972 wrote to memory of 2156 1972 chrome.exe 38 PID 1972 wrote to memory of 2156 1972 chrome.exe 38 PID 1972 wrote to memory of 2156 1972 chrome.exe 38 PID 1972 wrote to memory of 2156 1972 chrome.exe 38 PID 1972 wrote to memory of 2156 1972 chrome.exe 38 PID 1972 wrote to memory of 2156 1972 chrome.exe 38 PID 1972 wrote to memory of 2156 1972 chrome.exe 38 PID 1972 wrote to memory of 2156 1972 chrome.exe 38 PID 1972 wrote to memory of 2156 1972 chrome.exe 38 PID 1972 wrote to memory of 2156 1972 chrome.exe 38 PID 1972 wrote to memory of 2156 1972 chrome.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\RATcontrolpanel.exe"C:\Users\Admin\AppData\Local\Temp\RATcontrolpanel.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\RATcontrolpanel.exe"C:\Users\Admin\AppData\Local\Temp\RATcontrolpanel.exe"2⤵
- Loads dropped DLL
PID:1676
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2824
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef5ab9758,0x7fef5ab9768,0x7fef5ab97782⤵PID:1964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1164 --field-trial-handle=1420,i,193240150631431384,6901648852470400989,131072 /prefetch:22⤵PID:1700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1548 --field-trial-handle=1420,i,193240150631431384,6901648852470400989,131072 /prefetch:82⤵PID:2352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1680 --field-trial-handle=1420,i,193240150631431384,6901648852470400989,131072 /prefetch:82⤵PID:2156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2304 --field-trial-handle=1420,i,193240150631431384,6901648852470400989,131072 /prefetch:12⤵PID:1048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2316 --field-trial-handle=1420,i,193240150631431384,6901648852470400989,131072 /prefetch:12⤵PID:2200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1440 --field-trial-handle=1420,i,193240150631431384,6901648852470400989,131072 /prefetch:22⤵PID:2644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1324 --field-trial-handle=1420,i,193240150631431384,6901648852470400989,131072 /prefetch:12⤵PID:2660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3660 --field-trial-handle=1420,i,193240150631431384,6901648852470400989,131072 /prefetch:82⤵PID:2516
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
5KB
MD5e6ad37450cdc2afc33caea543caaa310
SHA19fdb92accf6b03b818a0edcc51426503a61303cb
SHA256653cb026e7b4e82e1e4699bee342630479e0f97dd9fd62b78c7cb3ef7b3f7987
SHA51282067ce17effc6edb6d3136731dc5e33a47e635585125ebfb47d04f99681f010ceff1333f96f1024b34807f3aaeea9e181dc81cba9633663f8650f36810a548a
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
345KB
MD5eec7969d7da27c87bd339105a0036a12
SHA149b5749ac4ab4f6c8987593ab1800951569ef277
SHA25673214f9f28724acdea71075ab4978e2d5629a6c5371806893c36ab70ade3de14
SHA512afa5de52c2c677d85be4a0e0f7ba17c9346c5150c17227804c549e1cfc6f63b8813654f92ac1e98bd9ebf2ecb2aef7f233bab81a008bf9a3656559c249612778
-
Filesize
345KB
MD56fb29e7c0a5c4791b22e7b2b391331d6
SHA117af3c0ef08ccf74bafed545f79a79d0ca556411
SHA2564c50cb2a586b5131b0f4baefadfd17f786677c3cffcf97fe6ffbd2e55d9d5b3e
SHA5128bd3bc8bfc46ef9587789d15963ae9c3964d905509bebef2ce99e799478fe59d0da7f8199e83eb24800d37f64dde66120160dffafd2e1b04163239a5f85c15f5
-
Filesize
1.6MB
MD58ea69ca2292c3af9cdb46dded91bc837
SHA172de7df68b2c336720d1528c34f21ff00ed7a2ce
SHA2563512c3a7ad74af034f51eba397c0e4716f592861ea3030745e8fd4dc8f9bca49
SHA512fb317bab11c922dc183d834b770e37e382b9cf3ab1ea95e9bca8d73ed1e23cc9ef2b6aea4a20d4637eba34276c81a6eee54b00cb146f825ef554d81387ae4ddc