| File name: | 1d1c8b7a5776992e25a7600ed72d7b0059f2531cc77da2d75483d6de9dbaf042.exe |
| Full analysis: | https://app.any.run/tasks/fab3ec73-6fb1-4a93-9543-4f1801c795b1 |
| Verdict: | Malicious activity |
| Threats: | FatalRAT is a malware that gives hackers remote access and control of the system and lets them steal sensitive information like login credentials and financial data. FatalRAT has been associated with cyber espionage campaigns, particularly targeting organizations in the Asia-Pacific (APAC) region. |
| Analysis date: | April 29, 2025, 15:20:09 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections |
| MD5: | 3A7D037C586F0C3FA546A3A2CE7F6FEA |
| SHA1: | 51E6343565238DF3D5CC371B8E353F8B6776D330 |
| SHA256: | 1D1C8B7A5776992E25A7600ED72D7B0059F2531CC77DA2D75483D6DE9DBAF042 |
| SSDEEP: | 98304:OxNbfxYGmmADOogqMjr9wRToHxo8VuGL/brlfdHPlA7WmHIGtuTliI14y/0Wix6c:wlv |
| .exe | | | Win32 Executable MS Visual C++ 5.0 (44.3) |
|---|---|---|
| .exe | | | Win32 Executable MS Visual C++ (generic) (22.8) |
| .exe | | | Win64 Executable (generic) (20.2) |
| .dll | | | Win32 Dynamic Link Library (generic) (4.8) |
| .exe | | | Win32 Executable (generic) (3.2) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2024:08:18 04:19:04+00:00 |
| ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 6 |
| CodeSize: | 20480 |
| InitializedDataSize: | 364544 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x3c7b5c |
| OSVersion: | 5 |
| ImageVersion: | - |
| SubsystemVersion: | 5 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2196 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7436 | "C:\Users\admin\AppData\Local\Temp\1d1c8b7a5776992e25a7600ed72d7b0059f2531cc77da2d75483d6de9dbaf042.exe" | C:\Users\admin\AppData\Local\Temp\1d1c8b7a5776992e25a7600ed72d7b0059f2531cc77da2d75483d6de9dbaf042.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 7480 | C:\WINDOWS\system32\SppExtComObj.exe -Embedding | C:\Windows\System32\SppExtComObj.Exe | — | svchost.exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: KMS Connection Broker Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7512 | "C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEvent | C:\Windows\System32\slui.exe | — | SppExtComObj.Exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Activation Client Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (7436) 1d1c8b7a5776992e25a7600ed72d7b0059f2531cc77da2d75483d6de9dbaf042.exe | Key: | HKEY_CURRENT_USER\System\CurrentControlSet\Services |
| Operation: | write | Name: | Group |
Value: Fatal | |||
| (PID) Process: | (7436) 1d1c8b7a5776992e25a7600ed72d7b0059f2531cc77da2d75483d6de9dbaf042.exe | Key: | HKEY_CURRENT_USER\System\CurrentControlSet\Services |
| Operation: | write | Name: | InstallTime |
Value: 2025-04-29 15:20 | |||
| (PID) Process: | (7436) 1d1c8b7a5776992e25a7600ed72d7b0059f2531cc77da2d75483d6de9dbaf042.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DirectDraw\MostRecentApplication |
| Operation: | write | Name: | Name |
Value: 1d1c8b7a5776992e25a7600ed72d7b0059f2531cc77da2d75483d6de9dbaf042.exe | |||
| (PID) Process: | (7436) 1d1c8b7a5776992e25a7600ed72d7b0059f2531cc77da2d75483d6de9dbaf042.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DirectDraw\MostRecentApplication |
| Operation: | write | Name: | ID |
Value: | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5496 | MoUsoCoreWorker.exe | GET | 200 | 23.216.77.36:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 23.216.77.36:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5496 | MoUsoCoreWorker.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
6544 | svchost.exe | GET | 200 | 184.30.131.245:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
8076 | SIHClient.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
8076 | SIHClient.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
5496 | MoUsoCoreWorker.exe | 23.216.77.36:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
— | — | 23.216.77.36:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
2104 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
5496 | MoUsoCoreWorker.exe | 23.35.229.160:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
— | — | 23.35.229.160:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
7436 | 1d1c8b7a5776992e25a7600ed72d7b0059f2531cc77da2d75483d6de9dbaf042.exe | 143.92.57.125:1080 | a20.yydsnb1.top | BGPNET Global ASN | HK | malicious |
3216 | svchost.exe | 172.211.123.250:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
Domain | IP | Reputation |
|---|---|---|
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
a20.yydsnb1.top |
| unknown |
a20.nbdsnb2.top |
| unknown |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2196 | svchost.exe | Potentially Bad Traffic | ET DNS Query to a *.top domain - Likely Hostile |
7436 | 1d1c8b7a5776992e25a7600ed72d7b0059f2531cc77da2d75483d6de9dbaf042.exe | Malware Command and Control Activity Detected | ET MALWARE FatalRAT CnC Activity |
2196 | svchost.exe | Potentially Bad Traffic | ET DNS Query to a *.top domain - Likely Hostile |