| File name: | goegloe.exe.v |
| Full analysis: | https://app.any.run/tasks/ff8e95e0-9e7f-4825-8135-8d5116d08990 |
| Verdict: | Malicious activity |
| Threats: | FatalRAT is a malware that gives hackers remote access and control of the system and lets them steal sensitive information like login credentials and financial data. FatalRAT has been associated with cyber espionage campaigns, particularly targeting organizations in the Asia-Pacific (APAC) region. |
| Analysis date: | August 31, 2024, 18:10:49 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | 8ABA3995419FB90BA19B60E3FE1BEDCC |
| SHA1: | 49332352EC467432D7BD452209D69BB1AED553AA |
| SHA256: | FB48E7138F813C9B0CA49D71A97652FB1CC590138ED54996D7CA2513EDC8B4AD |
| SSDEEP: | 1572864:mWYm6reB9YDq+ZL+YaLQh/4uKKW6QfRQEe:6m6rzhZILexFQfS |
| .exe | | | Win32 Executable (generic) (52.9) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (23.5) |
| .exe | | | DOS Executable Generic (23.5) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2024:08:27 18:12:05+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 10 |
| CodeSize: | 1310720 |
| InitializedDataSize: | 93161472 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x115f26 |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1932 | C:\Users\Public\Videos\bin.exe | C:\Users\Public\Videos\bin.exe | goegloe.exe.v.exe | ||||||||||||
User: admin Company: Google LLC Integrity Level: HIGH Description: Google Update Setup Version: 1.3.36.312 Modules
| |||||||||||||||
| 2144 | C:\WINDOWS\SystemTemp\GUM282D.tmp\GoogleUpdate.exe /installsource taggedmi /install "appguid={8A69D345-D564-463C-AFF1-A69D9E530F96}&iid={798BD0C5-13EB-DE8C-E07C-A7A64270D046}&lang=zh-CN&browser=4&usagestats=1&appname=Google%20Chrome&needsadmin=prefers&ap=x64-stable-statsdef_1&installdataindex=empty" | C:\Windows\SystemTemp\GUM282D.tmp\GoogleUpdate.exe | — | bin.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: HIGH Description: Google Installer Version: 1.3.36.311 Modules
| |||||||||||||||
| 2508 | "C:\Users\admin\Desktop\goegloe.exe.v.exe" | C:\Users\admin\Desktop\goegloe.exe.v.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 3268 | "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /healthcheck | C:\Program Files (x86)\Google\Update\GoogleUpdate.exe | — | GoogleUpdate.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: HIGH Description: Google Installer Exit code: 0 Version: 1.3.36.51 Modules
| |||||||||||||||
| 4284 | C:\WINDOWS\System32\svchost.exe -k netsvcs -p -s BITS | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4708 | "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /handoff "appguid={8A69D345-D564-463C-AFF1-A69D9E530F96}&iid={798BD0C5-13EB-DE8C-E07C-A7A64270D046}&lang=zh-CN&browser=4&usagestats=1&appname=Google%20Chrome&needsadmin=prefers&ap=x64-stable-statsdef_1&installdataindex=empty" /installsource taggedmi /sessionid "{6EA5685C-FA7A-450C-8983-B61D95633441}" | C:\Program Files (x86)\Google\Update\GoogleUpdate.exe | GoogleUpdate.exe | ||||||||||||
User: admin Company: Google LLC Integrity Level: HIGH Description: Google Installer Version: 1.3.36.51 Modules
| |||||||||||||||
| 4784 | "C:\Users\admin\Desktop\goegloe.exe.v.exe" | C:\Users\admin\Desktop\goegloe.exe.v.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 3221226540 Modules
| |||||||||||||||
| 6576 | "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ping 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 | C:\Program Files (x86)\Google\Update\GoogleUpdate.exe | GoogleUpdate.exe | ||||||||||||
User: admin Company: Google LLC Integrity Level: HIGH Description: Google Installer Exit code: 0 Version: 1.3.36.51 Modules
| |||||||||||||||
| 6652 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | reg.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6656 | "C:\Windows\System32\reg.exe" add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v GoogleUpdata_Service /d "C:\programdata\Mylnk\dick.lnk" /f | C:\Windows\SysWOW64\reg.exe | goegloe.exe.v.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Registry Console Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (6880) Agghosts.exe | Key: | HKEY_CURRENT_USER\System\CurrentControlSet\Services |
| Operation: | write | Name: | Group |
Value: Fatal | |||
| (PID) Process: | (6880) Agghosts.exe | Key: | HKEY_CURRENT_USER\System\CurrentControlSet\Services |
| Operation: | write | Name: | InstallTime |
Value: 2024-08-31 18:11 | |||
| (PID) Process: | (2508) goegloe.exe.v.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer |
| Operation: | write | Name: | SlowContextMenuEntries |
Value: 6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000 | |||
| (PID) Process: | (2508) goegloe.exe.v.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer |
| Operation: | write | Name: | SlowContextMenuEntries |
Value: 6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C000000000000046670100006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000 | |||
| (PID) Process: | (2508) goegloe.exe.v.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (2508) goegloe.exe.v.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (2508) goegloe.exe.v.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (2508) goegloe.exe.v.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (6656) reg.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | GoogleUpdata_Service |
Value: C:\programdata\Mylnk\dick.lnk | |||
| (PID) Process: | (2144) GoogleUpdate.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Google\Update |
| Operation: | delete value | Name: | uid |
Value: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2508 | goegloe.exe.v.exe | C:\ppsjzg\EduWebContainer.dll | — | |
MD5:— | SHA256:— | |||
| 1932 | bin.exe | C:\Windows\SystemTemp\GUM282D.tmp\GoogleUpdateBroker.exe | executable | |
MD5:7297A6102BE82413AB0113C1C4DF8C1D | SHA256:F0EDBF9DE80FBFB3F697FDD9A7E13F2859687D74ED0E2B75AF8A440D0D1F770A | |||
| 2508 | goegloe.exe.v.exe | C:\ppsjzg\vgc.exe | executable | |
MD5:5F017D4108BCF0F142C118D351A927A0 | SHA256:6BA20DC5528412FB1AB6776EA4A264F71A692BDAE28B62F459D7FF870B819480 | |||
| 2508 | goegloe.exe.v.exe | C:\ppsjzg\Ensup.log | text | |
MD5:758C6C6B6914DCDE32734D1EA4D5FAA9 | SHA256:1EAC120FC0AF1352791B1394D9992D6D2C3679671441E36130A0F1F345DB13A2 | |||
| 1932 | bin.exe | C:\Windows\SystemTemp\GUM282D.tmp\psmachine_64.dll | executable | |
MD5:D453B46DCDC0C6057908B1C10CA8DDC4 | SHA256:086DA18BBC288E1E9B8A5354F6D4536060FF4F8E44D502979783B6AC2B671841 | |||
| 1932 | bin.exe | C:\Windows\SystemTemp\GUM282D.tmp\psuser_64.dll | executable | |
MD5:F4E30A0547429B48AFBDB9D00B9F8642 | SHA256:FBEC577CA55BB8B95B2A0CA1D13120130A979BC0D147410E903E0A2ABA8B5031 | |||
| 1932 | bin.exe | C:\Windows\SystemTemp\GUM282D.tmp\goopdateres_bn.dll | executable | |
MD5:DAFA45A82CE30CF2FD621E0A0B8C031F | SHA256:D58E5F0FA894123DE1D9B687A5B84826E095ECA128EE5DF8870F2DB74F4233A2 | |||
| 1932 | bin.exe | C:\Windows\SystemTemp\GUM282D.tmp\goopdateres_am.dll | executable | |
MD5:849BC7E364E30F8EE4C157F50D5B695E | SHA256:F1384A25A6F40E861455C62190D794415F3E9BFCA6317C214847E9535DFC3FB9 | |||
| 1932 | bin.exe | C:\Windows\SystemTemp\GUM282D.tmp\GoogleUpdateCore.exe | executable | |
MD5:AF51EA4D9828E21F72E935B0DEAE50F2 | SHA256:3575011873D0F6D49C783095DAE06E6619F8F5463DA578FBE284CA5D1D449619 | |||
| 1932 | bin.exe | C:\Windows\SystemTemp\GUM282D.tmp\goopdateres_da.dll | executable | |
MD5:9F2E018A4F9A1D278983D0B677B91218 | SHA256:D0DCDC68236EECD6B5F0B437EB92B8935741DABF1FA276A552399815AF22EDEC | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2508 | goegloe.exe.v.exe | HEAD | 200 | 103.235.47.188:80 | http://www.baidu.com/ | unknown | — | — | whitelisted |
4284 | svchost.exe | HEAD | 200 | 34.104.35.123:80 | http://edgedl.me.gvt1.com/edgedl/release2/chrome/ada5tihqeissyqywbxlbauyygcua_128.0.6613.114/128.0.6613.114_chrome_installer.exe | unknown | — | — | whitelisted |
4284 | svchost.exe | GET | — | 34.104.35.123:80 | http://edgedl.me.gvt1.com/edgedl/release2/chrome/ada5tihqeissyqywbxlbauyygcua_128.0.6613.114/128.0.6613.114_chrome_installer.exe | unknown | — | — | whitelisted |
4708 | GoogleUpdate.exe | GET | — | 34.104.35.123:80 | http://edgedl.me.gvt1.com/edgedl/release2/chrome/ada5tihqeissyqywbxlbauyygcua_128.0.6613.114/128.0.6613.114_chrome_installer.exe | unknown | — | — | whitelisted |
— | — | GET | 200 | 142.250.186.100:443 | https://dl.google.com/update2/installers/icons/%7B8A69D345-D564-463C-AFF1-A69D9E530F96%7D.bmp | unknown | image | 6.52 Kb | unknown |
— | — | POST | 200 | 142.250.181.227:443 | https://update.googleapis.com/service/update2 | unknown | xml | 233 b | unknown |
— | — | POST | 200 | 142.250.181.227:443 | https://update.googleapis.com/service/update2?cup2key=13:dqqCNXIsX74_qCTBI6LHhrynMF25vKcmDgKNsXQ_W_c&cup2hreq=98c4ae793e3936c72a7a6786e6570d0b5e28a68c113fa884c558a969fcd59c78 | unknown | xml | 675 Kb | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 51.104.136.2:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 192.168.100.255:138 | — | — | — | whitelisted |
— | — | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 239.255.255.250:1900 | — | — | — | whitelisted |
2508 | goegloe.exe.v.exe | 103.235.47.188:80 | www.baidu.com | Beijing Baidu Netcom Science and Technology Co., Ltd. | HK | whitelisted |
6880 | Agghosts.exe | 134.122.137.152:8081 | ahujmsha.cloud | BGPNET Global ASN | SG | unknown |
6576 | GoogleUpdate.exe | 142.250.185.131:443 | update.googleapis.com | GOOGLE | US | whitelisted |
4708 | GoogleUpdate.exe | 142.250.185.131:443 | update.googleapis.com | GOOGLE | US | whitelisted |
4708 | GoogleUpdate.exe | 142.250.185.78:443 | dl.google.com | GOOGLE | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
www.baidu.com |
| whitelisted |
ahujmsha.cloud |
| unknown |
update.googleapis.com |
| whitelisted |
dl.google.com |
| whitelisted |
edgedl.me.gvt1.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
6880 | Agghosts.exe | A Network Trojan was detected | AV TROJAN FatalRAT CnC Request |
6880 | Agghosts.exe | Malware Command and Control Activity Detected | ET MALWARE FatalRAT CnC Activity |
4284 | svchost.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
4284 | svchost.exe | Misc activity | ET INFO EXE - Served Attached HTTP |
4708 | GoogleUpdate.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
4708 | GoogleUpdate.exe | Misc activity | ET INFO EXE - Served Attached HTTP |
Process | Message |
|---|---|
Agghosts.exe | SVP7-Thread running...
|
Agghosts.exe | SVP7-Thread running...
|
Agghosts.exe | SVP7-Thread running...
|
Agghosts.exe | SVP7-Thread running...
|
Agghosts.exe | SVP7-Thread running...
|
Agghosts.exe | SVP7-Thread running...
|
Agghosts.exe | SVP7-Thread running...
|
Agghosts.exe | SVP7-Thread running...
|
Agghosts.exe | SVP7-Thread running...
|
Agghosts.exe | SVP7-Thread running...
|