Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    10-01-2021 14:11

General

  • Target

    a57e1bcf9538738707f5f6387b72d7bc.exe

  • Size

    292KB

  • MD5

    a57e1bcf9538738707f5f6387b72d7bc

  • SHA1

    839e2f2929292b128f5c71765d15e0b67e19f922

  • SHA256

    bf802ba3e523c502a27e0c9044bc699f0db17ebb00e5b3b9c152038a13c856ed

  • SHA512

    a9a1e3c04f25280f5de47d7a8eebc684481d1b4e05e394127385d2534440f000630e34dd0a22b4ba0870f13abce578b2118fcaf9c41b9f617d920207395e21c8

Score
10/10

Malware Config

Signatures

  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT Payload 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetThreadContext 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a57e1bcf9538738707f5f6387b72d7bc.exe
    "C:\Users\Admin\AppData\Local\Temp\a57e1bcf9538738707f5f6387b72d7bc.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:648
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GEyVFfPqSbGetJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp30D.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:1924
    • C:\Users\Admin\AppData\Local\Temp\a57e1bcf9538738707f5f6387b72d7bc.exe
      "{path}"
      2⤵
        PID:1508
      • C:\Users\Admin\AppData\Local\Temp\a57e1bcf9538738707f5f6387b72d7bc.exe
        "{path}"
        2⤵
          PID:1532

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/648-2-0x00000000746F0000-0x0000000074DDE000-memory.dmp

        Filesize

        6.9MB

      • memory/648-3-0x0000000000E80000-0x0000000000E81000-memory.dmp

        Filesize

        4KB

      • memory/648-5-0x00000000004C0000-0x00000000004F8000-memory.dmp

        Filesize

        224KB

      • memory/1532-8-0x0000000000400000-0x000000000041E000-memory.dmp

        Filesize

        120KB

      • memory/1532-10-0x0000000000400000-0x000000000041E000-memory.dmp

        Filesize

        120KB

      • memory/1532-11-0x0000000000400000-0x000000000041E000-memory.dmp

        Filesize

        120KB

      • memory/1532-12-0x00000000746F0000-0x0000000074DDE000-memory.dmp

        Filesize

        6.9MB