Analysis
-
max time kernel
121s -
max time network
120s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
09-01-2021 08:28
Static task
static1
Behavioral task
behavioral1
Sample
Pliytbob.bin.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Pliytbob.bin.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
Pliytbob.bin.exe
-
Size
763KB
-
MD5
c6deefce6d5efb810c81e7a0c5bc6b1f
-
SHA1
88c68b80aa3733b6c3ced2c6b78345d823691b73
-
SHA256
0aab2dd3ec0c4ee98be1c56356c21888078d33ab2b44410e0024034284a4fb86
-
SHA512
8b5962b3183ba564d30dacc8ddd358306263608232d7f6d414e346cc09d2978ab250f87a2ef252f9fcfe53291e92b7e524f0b6f99ad73e7d80f9b671e4d86076
Score
10/10
Malware Config
Signatures
-
SectopRAT Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1384-8-0x00000000004156EE-mapping.dmp family_sectoprat behavioral1/memory/1384-7-0x0000000000400000-0x000000000041A000-memory.dmp family_sectoprat behavioral1/memory/1384-9-0x0000000000400000-0x000000000041A000-memory.dmp family_sectoprat behavioral1/memory/1384-10-0x0000000000400000-0x000000000041A000-memory.dmp family_sectoprat -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Pliytbob.bin.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\gimp = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Gimp\\gimp.exe\"" Pliytbob.bin.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Pliytbob.bin.exedescription pid process target process PID 932 set thread context of 1384 932 Pliytbob.bin.exe Pliytbob.bin.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Pliytbob.bin.exedescription pid process Token: SeDebugPrivilege 932 Pliytbob.bin.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
Pliytbob.bin.exedescription pid process target process PID 932 wrote to memory of 1384 932 Pliytbob.bin.exe Pliytbob.bin.exe PID 932 wrote to memory of 1384 932 Pliytbob.bin.exe Pliytbob.bin.exe PID 932 wrote to memory of 1384 932 Pliytbob.bin.exe Pliytbob.bin.exe PID 932 wrote to memory of 1384 932 Pliytbob.bin.exe Pliytbob.bin.exe PID 932 wrote to memory of 1384 932 Pliytbob.bin.exe Pliytbob.bin.exe PID 932 wrote to memory of 1384 932 Pliytbob.bin.exe Pliytbob.bin.exe PID 932 wrote to memory of 1384 932 Pliytbob.bin.exe Pliytbob.bin.exe PID 932 wrote to memory of 1384 932 Pliytbob.bin.exe Pliytbob.bin.exe PID 932 wrote to memory of 1384 932 Pliytbob.bin.exe Pliytbob.bin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Pliytbob.bin.exe"C:\Users\Admin\AppData\Local\Temp\Pliytbob.bin.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Users\Admin\AppData\Local\Temp\Pliytbob.bin.exe"C:\Users\Admin\AppData\Local\Temp\Pliytbob.bin.exe"2⤵PID:1384
-