Analysis
-
max time kernel
23s -
max time network
22s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
30/03/2025, 04:54
Static task
static1
Behavioral task
behavioral1
Sample
Fatality.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
Fatality.exe
Resource
win10v2004-20250314-en
General
-
Target
Fatality.exe
-
Size
3.2MB
-
MD5
314375a212ba4f9038c454820d9c5cad
-
SHA1
2ce6451c052f88a9c0bddad5f23bc3253cb972bd
-
SHA256
003ace97463c139fb1d6c53909c5dac9ffd958a698330a817bc268e6131182c5
-
SHA512
31dcee114b402cded2bcc1f0589963b835e97dd9b2d173aad2ddf1afd72874e335f75bd2d08d2c14ef90334f4d7d01fe0830503479292e7b1d6938c2781eeaf8
-
SSDEEP
98304:dSSniwJ8BPhwpzMda5oyqo7UrstRTJjyPv+I:8+WwpzMw5zqo7UrsDt2PH
Malware Config
Signatures
-
Detect SalatStealer payload 4 IoCs
resource yara_rule behavioral2/memory/6068-68-0x0000000000F00000-0x0000000001A24000-memory.dmp family_salatstealer behavioral2/memory/6068-77-0x0000000000F00000-0x0000000001A24000-memory.dmp family_salatstealer behavioral2/memory/2224-83-0x0000000000B30000-0x0000000001654000-memory.dmp family_salatstealer behavioral2/memory/3272-84-0x00000000001E0000-0x0000000000D04000-memory.dmp family_salatstealer -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Salatstealer family
-
salatstealer
SalatStealer is a stealer that takes sceenshot written in Golang.
-
Executes dropped EXE 12 IoCs
pid Process 6068 fatality.exe 1220 icsys.icn.exe 4596 explorer.exe 4732 spoolsv.exe 4944 svchost.exe 5440 spoolsv.exe 3044 svchost.exe 5812 explorer.exe 1444 svchost.exe 1164 explorer.exe 3272 services.exe 2224 WmiPrvSE.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Users\\Admin\\AppData\\Local\\PeerDistRepub\\WmiPrvSE.exe" fatality.exe Set value (str) \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services = "C:\\Program Files (x86)\\WindowsPowerShell\\services.exe" fatality.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe -
resource yara_rule behavioral2/files/0x00070000000242c8-7.dat upx behavioral2/memory/6068-9-0x0000000000F00000-0x0000000001A24000-memory.dmp upx behavioral2/memory/6068-68-0x0000000000F00000-0x0000000001A24000-memory.dmp upx behavioral2/memory/6068-77-0x0000000000F00000-0x0000000001A24000-memory.dmp upx behavioral2/memory/3272-76-0x00000000001E0000-0x0000000000D04000-memory.dmp upx behavioral2/memory/2224-81-0x0000000000B30000-0x0000000001654000-memory.dmp upx behavioral2/memory/2224-83-0x0000000000B30000-0x0000000001654000-memory.dmp upx behavioral2/memory/3272-84-0x00000000001E0000-0x0000000000D04000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\WindowsPowerShell\bfac6f5e-3651-dd1a-10ed-87971d845e36 fatality.exe File created C:\Program Files (x86)\WindowsPowerShell\services.exe fatality.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe Fatality.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fatality.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WmiPrvSE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fatality.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 6136 Fatality.exe 6136 Fatality.exe 6136 Fatality.exe 6136 Fatality.exe 6136 Fatality.exe 6136 Fatality.exe 6136 Fatality.exe 6136 Fatality.exe 6136 Fatality.exe 6136 Fatality.exe 6136 Fatality.exe 6136 Fatality.exe 6136 Fatality.exe 6136 Fatality.exe 6136 Fatality.exe 6136 Fatality.exe 6136 Fatality.exe 6136 Fatality.exe 6136 Fatality.exe 6136 Fatality.exe 6136 Fatality.exe 6136 Fatality.exe 6136 Fatality.exe 6136 Fatality.exe 6136 Fatality.exe 6136 Fatality.exe 6136 Fatality.exe 6136 Fatality.exe 6136 Fatality.exe 6136 Fatality.exe 6136 Fatality.exe 6136 Fatality.exe 1220 icsys.icn.exe 1220 icsys.icn.exe 1220 icsys.icn.exe 1220 icsys.icn.exe 1220 icsys.icn.exe 1220 icsys.icn.exe 1220 icsys.icn.exe 1220 icsys.icn.exe 1220 icsys.icn.exe 1220 icsys.icn.exe 1220 icsys.icn.exe 1220 icsys.icn.exe 1220 icsys.icn.exe 1220 icsys.icn.exe 1220 icsys.icn.exe 1220 icsys.icn.exe 1220 icsys.icn.exe 1220 icsys.icn.exe 1220 icsys.icn.exe 1220 icsys.icn.exe 1220 icsys.icn.exe 1220 icsys.icn.exe 1220 icsys.icn.exe 1220 icsys.icn.exe 1220 icsys.icn.exe 1220 icsys.icn.exe 1220 icsys.icn.exe 1220 icsys.icn.exe 1220 icsys.icn.exe 1220 icsys.icn.exe 1220 icsys.icn.exe 1220 icsys.icn.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4596 explorer.exe 4944 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3272 services.exe Token: SeDebugPrivilege 3272 services.exe -
Suspicious use of SetWindowsHookEx 20 IoCs
pid Process 6136 Fatality.exe 6136 Fatality.exe 1220 icsys.icn.exe 1220 icsys.icn.exe 4596 explorer.exe 4596 explorer.exe 4732 spoolsv.exe 4732 spoolsv.exe 4944 svchost.exe 4944 svchost.exe 5440 spoolsv.exe 5440 spoolsv.exe 3044 svchost.exe 3044 svchost.exe 5812 explorer.exe 5812 explorer.exe 1444 svchost.exe 1444 svchost.exe 1164 explorer.exe 1164 explorer.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 6136 wrote to memory of 6068 6136 Fatality.exe 87 PID 6136 wrote to memory of 6068 6136 Fatality.exe 87 PID 6136 wrote to memory of 6068 6136 Fatality.exe 87 PID 6136 wrote to memory of 1220 6136 Fatality.exe 90 PID 6136 wrote to memory of 1220 6136 Fatality.exe 90 PID 6136 wrote to memory of 1220 6136 Fatality.exe 90 PID 1220 wrote to memory of 4596 1220 icsys.icn.exe 91 PID 1220 wrote to memory of 4596 1220 icsys.icn.exe 91 PID 1220 wrote to memory of 4596 1220 icsys.icn.exe 91 PID 4596 wrote to memory of 4732 4596 explorer.exe 93 PID 4596 wrote to memory of 4732 4596 explorer.exe 93 PID 4596 wrote to memory of 4732 4596 explorer.exe 93 PID 4732 wrote to memory of 4944 4732 spoolsv.exe 94 PID 4732 wrote to memory of 4944 4732 spoolsv.exe 94 PID 4732 wrote to memory of 4944 4732 spoolsv.exe 94 PID 4944 wrote to memory of 5440 4944 svchost.exe 96 PID 4944 wrote to memory of 5440 4944 svchost.exe 96 PID 4944 wrote to memory of 5440 4944 svchost.exe 96 PID 4828 wrote to memory of 3044 4828 cmd.exe 105 PID 4828 wrote to memory of 3044 4828 cmd.exe 105 PID 4828 wrote to memory of 3044 4828 cmd.exe 105 PID 4852 wrote to memory of 5812 4852 cmd.exe 106 PID 4852 wrote to memory of 5812 4852 cmd.exe 106 PID 4852 wrote to memory of 5812 4852 cmd.exe 106 PID 2028 wrote to memory of 1444 2028 cmd.exe 107 PID 2028 wrote to memory of 1444 2028 cmd.exe 107 PID 2028 wrote to memory of 1444 2028 cmd.exe 107 PID 3788 wrote to memory of 1164 3788 cmd.exe 108 PID 3788 wrote to memory of 1164 3788 cmd.exe 108 PID 3788 wrote to memory of 1164 3788 cmd.exe 108 PID 6068 wrote to memory of 3272 6068 fatality.exe 113 PID 6068 wrote to memory of 3272 6068 fatality.exe 113 PID 6068 wrote to memory of 3272 6068 fatality.exe 113 PID 4620 wrote to memory of 2224 4620 cmd.exe 114 PID 4620 wrote to memory of 2224 4620 cmd.exe 114 PID 4620 wrote to memory of 2224 4620 cmd.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fatality.exe"C:\Users\Admin\AppData\Local\Temp\Fatality.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:6136 -
\??\c:\users\admin\appdata\local\temp\fatality.exec:\users\admin\appdata\local\temp\fatality.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:6068 -
C:\Program Files (x86)\WindowsPowerShell\services.exe"C:\Program Files (x86)\WindowsPowerShell\services.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3272
-
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1220 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4596 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4732 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4944 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5440
-
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c c:\windows\resources\svchost.exe RO1⤵
- Suspicious use of WriteProcessMemory
PID:4828 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe RO2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3044
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c c:\windows\resources\themes\explorer.exe RO1⤵
- Suspicious use of WriteProcessMemory
PID:4852 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe RO2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5812
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c c:\windows\resources\themes\explorer.exe RO1⤵
- Suspicious use of WriteProcessMemory
PID:3788 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe RO2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1164
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c c:\windows\resources\svchost.exe RO1⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe RO2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1444
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\PeerDistRepub\WmiPrvSE.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\AppData\Local\PeerDistRepub\WmiPrvSE.exeC:\Users\Admin\AppData\Local\PeerDistRepub\WmiPrvSE.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2224
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Program Files (x86)\WindowsPowerShell\services.exe1⤵PID:3716
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD5c3d006e36238ccde7635fc1dff753e18
SHA1d75c29be127aafa4391ffaf17007dfe0e04841b2
SHA25636addab1b80302055acc352fd2da83de76f98432d02749ccf15d80961d9b4f27
SHA512feed68622448f75c8bafbd411e0445751d3255db57708dcf9e64ca692c66bf9ad5ba3a9b9412813af990150047d25bc4382cf646822aef8b65553607ce690a86
-
Filesize
135KB
MD569e402db7a756097b1659702b4113798
SHA1fb3538f90ffb46fa4fba8f6ce868102aa347be2c
SHA256cf4fdd355ea4decce697ebdfb37f490cb588152b8373cf8b51151e0b2742e2c2
SHA512f7e83f5306e5ee53a326760606649e99850822ff82b1cef8f5f758f067e1cc4a01b90edc6def8e536e72f2df8872e4744b74c2558187be800959fb21d9702e90
-
Filesize
135KB
MD517e0d90ebfbebf56ac506ee1a002847c
SHA1402113658d691f85cb6dbe25ac84758b4270ae5d
SHA25684af98e0d210367def7265aa7f8393e4a52253522c00919c795bd8aed2180485
SHA5120657b0d7e77cf915f6cc4bf1505f65461e38a1186f9c04fe727f6fcb510645d94bf17e38a51c079d034d42402980b076d1a19c3aea31fca466bb96d6f9aa6f3a
-
Filesize
135KB
MD55ee4e42b11202f3f7b95668adb2aedf1
SHA11e9b641e49d6b3da6766279bc276bd7f52ffa6d1
SHA2564443fa1ab1bc498cb57b6ba68785fb04bde90baba8e316ea24e22c2d3f17a4ec
SHA512368437226e258e21cf2b0954ee860795cee7fbdb604632b797628e37b5f9b23a8c2266620d1644b85bc65a18117ce78bf709939ee9ffb1ed4c973accd9a5b98b
-
Filesize
135KB
MD5c7a630e6622c08bb734a5b653615b68e
SHA1dd27f312878d7747097ad459a5ae5f8e6b819b54
SHA25627f54b09fdd15aae5fb8e9369c22fecb8e2ebaf0c4384d7bf43832af57242ee1
SHA51291c85d24a7894a04a022f5f92f6c0df6c2b222439f95d8921d682f577ac2fca1a1b70419ec1235641fdffeb034cbe6f4f58f08ff04c5c5be189dba682858df06