Analysis
-
max time kernel
107s -
max time network
118s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
09-01-2021 08:28
Static task
static1
Behavioral task
behavioral1
Sample
Pliytbob.bin.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Pliytbob.bin.exe
Resource
win10v20201028
General
-
Target
Pliytbob.bin.exe
-
Size
763KB
-
MD5
c6deefce6d5efb810c81e7a0c5bc6b1f
-
SHA1
88c68b80aa3733b6c3ced2c6b78345d823691b73
-
SHA256
0aab2dd3ec0c4ee98be1c56356c21888078d33ab2b44410e0024034284a4fb86
-
SHA512
8b5962b3183ba564d30dacc8ddd358306263608232d7f6d414e346cc09d2978ab250f87a2ef252f9fcfe53291e92b7e524f0b6f99ad73e7d80f9b671e4d86076
Malware Config
Signatures
-
SectopRAT Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2024-8-0x0000000000400000-0x000000000041A000-memory.dmp family_sectoprat behavioral2/memory/2024-9-0x00000000004156EE-mapping.dmp family_sectoprat -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Pliytbob.bin.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\gimp = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Gimp\\gimp.exe\"" Pliytbob.bin.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Pliytbob.bin.exedescription pid process target process PID 416 set thread context of 2024 416 Pliytbob.bin.exe Pliytbob.bin.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Pliytbob.bin.exepid process 416 Pliytbob.bin.exe 416 Pliytbob.bin.exe 416 Pliytbob.bin.exe 416 Pliytbob.bin.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Pliytbob.bin.exedescription pid process Token: SeDebugPrivilege 416 Pliytbob.bin.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
Pliytbob.bin.exedescription pid process target process PID 416 wrote to memory of 2612 416 Pliytbob.bin.exe Pliytbob.bin.exe PID 416 wrote to memory of 2612 416 Pliytbob.bin.exe Pliytbob.bin.exe PID 416 wrote to memory of 2612 416 Pliytbob.bin.exe Pliytbob.bin.exe PID 416 wrote to memory of 2260 416 Pliytbob.bin.exe Pliytbob.bin.exe PID 416 wrote to memory of 2260 416 Pliytbob.bin.exe Pliytbob.bin.exe PID 416 wrote to memory of 2260 416 Pliytbob.bin.exe Pliytbob.bin.exe PID 416 wrote to memory of 2024 416 Pliytbob.bin.exe Pliytbob.bin.exe PID 416 wrote to memory of 2024 416 Pliytbob.bin.exe Pliytbob.bin.exe PID 416 wrote to memory of 2024 416 Pliytbob.bin.exe Pliytbob.bin.exe PID 416 wrote to memory of 2024 416 Pliytbob.bin.exe Pliytbob.bin.exe PID 416 wrote to memory of 2024 416 Pliytbob.bin.exe Pliytbob.bin.exe PID 416 wrote to memory of 2024 416 Pliytbob.bin.exe Pliytbob.bin.exe PID 416 wrote to memory of 2024 416 Pliytbob.bin.exe Pliytbob.bin.exe PID 416 wrote to memory of 2024 416 Pliytbob.bin.exe Pliytbob.bin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Pliytbob.bin.exe"C:\Users\Admin\AppData\Local\Temp\Pliytbob.bin.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:416 -
C:\Users\Admin\AppData\Local\Temp\Pliytbob.bin.exe"C:\Users\Admin\AppData\Local\Temp\Pliytbob.bin.exe"2⤵PID:2612
-
-
C:\Users\Admin\AppData\Local\Temp\Pliytbob.bin.exe"C:\Users\Admin\AppData\Local\Temp\Pliytbob.bin.exe"2⤵PID:2260
-
-
C:\Users\Admin\AppData\Local\Temp\Pliytbob.bin.exe"C:\Users\Admin\AppData\Local\Temp\Pliytbob.bin.exe"2⤵PID:2024
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d96cb6a55eb71b30f2e8a725ef5e6e5d
SHA1f0bef03d7f37dfee965c6dfe4f6f447e3ab34be0
SHA256253f84939770e1b5663cecd7df61bb04c1668c1a5f90a6dd2b95ea6830f8977b
SHA512e65e8ee91233d4179beff6d381c07a600a0905710feaa063d9880c48646bd296137efdf628caecb8ccecec20162c2c952e9713d1d629788a37f1afba09bf4b77