Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    137s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/02/2023, 19:06

General

  • Target

    62ee5b95c34acf1b01e338ad370c4dda687bdd67.exe

  • Size

    248KB

  • MD5

    4ca04b351bb18652fcda67b45eed03a9

  • SHA1

    62ee5b95c34acf1b01e338ad370c4dda687bdd67

  • SHA256

    420dfb75c981fe4ab474de914e92c8171f52544d1f3a4d66bf9249e8578d729d

  • SHA512

    d462553e89b0adda35854157bdbb668dc6ac7e415f5dcf37cf65aecd19ff1d93f0aa18e8831f59be5982c21d71715dfa227958696b81d71a9cde8ec9bc79c7b6

  • SSDEEP

    6144:m8OyFY+X5tuRG9YodJ8mQccZowlFfo7qa4D64+94QIKgFLKyEs2UfaoksNzB1jpU:TFY+X5tuRG9YodJ8mQccZowlFfo7qa4U

Malware Config

Signatures

  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:2704
      • C:\Users\Admin\AppData\Local\Temp\62ee5b95c34acf1b01e338ad370c4dda687bdd67.exe
        "C:\Users\Admin\AppData\Local\Temp\62ee5b95c34acf1b01e338ad370c4dda687bdd67.exe"
        2⤵
        • Checks computer location settings
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2284
        • C:\Users\Admin\AppData\Local\Temp\tmp2A2D.tmp.exe
          "C:\Users\Admin\AppData\Local\Temp\tmp2A2D.tmp.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1556
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup ashfdjkhgwiueghfruihwjkefwe
            4⤵
              PID:640
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c cmd < 2
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:1992
              • C:\Windows\SysWOW64\cmd.exe
                cmd
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:2236
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell get-process avastui
                  6⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4888
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell get-process avgui
                  6⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2752
                • C:\Windows\SysWOW64\certutil.exe
                  certutil -decode 86 86YEO
                  6⤵
                    PID:4144
                  • C:\Windows\SysWOW64\findstr.exe
                    findstr /V /R "^QyLLuVpnCdInRQPNWfBIsgQkprGKGWkWrUJtiyFXmiJDkGqaSrgKXZxBgABegmSFyMxWuKGRJDopFhZDrhRDHAYtAoQHDCIZfrnmkrkibbwxQlV$" 86YEO
                    6⤵
                      PID:2528
                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\25031\Milf.exe.pif
                      25031\\Milf.exe.pif 25031\\d
                      6⤵
                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      • Suspicious use of WriteProcessMemory
                      PID:3792
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
                        7⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3012
                    • C:\Windows\SysWOW64\PING.EXE
                      ping localhost -n 8
                      6⤵
                      • Runs ping.exe
                      PID:3832
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\YHgsKCxQSK.url" & echo URL="C:\Users\Admin\AppData\Local\MYSMWZEvHY\VPbsOvHZF.vbs" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\YHgsKCxQSK.url"
              2⤵
              • Drops startup file
              PID:4012

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

            Filesize

            1KB

            MD5

            5315900105942deb090a358a315b06fe

            SHA1

            22fe5d2e1617c31afbafb91c117508d41ef0ce44

            SHA256

            e8bd7d8d1d0437c71aceb032f9fb08dd1147f41c048540254971cc60e95d6cd7

            SHA512

            77e8d15b8c34a1cb01dbee7147987e2cc25c747e0f80d254714a93937a6d2fe08cb5a772cf85ceb8fec56415bfa853234a003173718c4229ba8cfcf2ce6335a6

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            18KB

            MD5

            ee37fb8d038c2393df7f679fd7551a34

            SHA1

            e7276628edd2b288197c71d0dcb939dadeed1220

            SHA256

            054b5969c4eec2e27bd299c6ee03eb8eb4934162dbf545b5fc6302745abfa409

            SHA512

            357532ec988787bb1d7cfef3dc5f4187555aee3f46d27b069117a5c00b967778f440e6e68ef1550a3e649e0fab100b9c04b5dd74db7e1a0ddb2c0807431d2b8a

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2

            Filesize

            11KB

            MD5

            cf13b620804b451200c2fc35d0955c1e

            SHA1

            0b9034ce408d6bdfc2d12a5f957361df1494b564

            SHA256

            968a4e2af5aa8c0ab95e65c08eb5a5ea03d921c9220def24675a676ff3f9fe76

            SHA512

            a4c73efd6ff723b9067c95258f02ee0570cf076a1d992456bfdccdd064e1771dde530d0dd046d2dad6185cb08eb4d641484f75b94b04f0dfd384bdd60fd22f26

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\25031\Milf.exe.pif

            Filesize

            872KB

            MD5

            c56b5f0201a3b3de53e561fe76912bfd

            SHA1

            2a4062e10a5de813f5688221dbeb3f3ff33eb417

            SHA256

            237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

            SHA512

            195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\25031\Milf.exe.pif

            Filesize

            872KB

            MD5

            c56b5f0201a3b3de53e561fe76912bfd

            SHA1

            2a4062e10a5de813f5688221dbeb3f3ff33eb417

            SHA256

            237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

            SHA512

            195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6

            Filesize

            1.9MB

            MD5

            fa191eedf1fd23465aea012c60dd159f

            SHA1

            230d11121b16f1d38f31a2867c214bef83da6f22

            SHA256

            94e500c66add5eb1ee91b8de448668a7c7d26021104c9bec2c156c8dbbc9a440

            SHA512

            bee65d47a8ee4311d016dd85e3fc45d28d4133da18a15430388067b4457e542b3790344e7b9e38672c191832b56550ec0e676b5e047f8ff9ac1b9e0f339d342d

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\86

            Filesize

            1.2MB

            MD5

            3c775f771bf21af3a95b519b87d3a055

            SHA1

            796a926397a7024348db5c8790acfb69cca68227

            SHA256

            66404d8f396ba4198e14b73cea09b36567d55d93c683965e13e2f9765f0f1b6c

            SHA512

            20a2ff99e8c676a3c3ec9fdfb26a000fda8aeb36373380f764e6fe8f428f7dce42cea9dd2b66fa9e0a84c01f13c224f53f147cc420d1de3d1fc0539a670ca253

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\86YEO

            Filesize

            872KB

            MD5

            0d398b7bfb54c5e22d8b42e8545837d7

            SHA1

            c065aed432508df9bacf121e7f0ed9bc0ebcce62

            SHA256

            a80a0a728e5451c54543c9527b12e0f8938e6fa72c3ef34ac6044fdec39d505e

            SHA512

            8a9038fb3f563abd69c628bcc32211550afde710be390131f5ac4fe8d59d58e9794d0562b60fe0e13fc1bc01d4c256867035d362f24bcd52b6834c874fefd4c7

          • C:\Users\Admin\AppData\Local\Temp\tmp2A2D.tmp.exe

            Filesize

            1.3MB

            MD5

            2d48214132e5c4d808740e71ec5f6a7f

            SHA1

            f3c7534d9f139782006b5656ec0d229d8d9d356e

            SHA256

            c1fadb8e09ba1257f7656be5a1c8d44e2a0da8697e8e0a32485714949a6c29ca

            SHA512

            71b38bc31ecd199d3408e831c0cda0b0fbce6b363d5da3500767ff2a9a02fc0b3990512085d8d44e25b50e87eceaf4527e58d9c3e0a0802efbc3164af94a77a2

          • C:\Users\Admin\AppData\Local\Temp\tmp2A2D.tmp.exe

            Filesize

            1.3MB

            MD5

            2d48214132e5c4d808740e71ec5f6a7f

            SHA1

            f3c7534d9f139782006b5656ec0d229d8d9d356e

            SHA256

            c1fadb8e09ba1257f7656be5a1c8d44e2a0da8697e8e0a32485714949a6c29ca

            SHA512

            71b38bc31ecd199d3408e831c0cda0b0fbce6b363d5da3500767ff2a9a02fc0b3990512085d8d44e25b50e87eceaf4527e58d9c3e0a0802efbc3164af94a77a2

          • memory/2284-135-0x0000000004C80000-0x0000000004C8A000-memory.dmp

            Filesize

            40KB

          • memory/2284-134-0x0000000004CB0000-0x0000000004D42000-memory.dmp

            Filesize

            584KB

          • memory/2284-133-0x0000000005360000-0x0000000005904000-memory.dmp

            Filesize

            5.6MB

          • memory/2284-136-0x0000000008620000-0x0000000008686000-memory.dmp

            Filesize

            408KB

          • memory/2284-132-0x00000000002B0000-0x00000000002EE000-memory.dmp

            Filesize

            248KB

          • memory/3012-167-0x0000000000940000-0x00000000009E6000-memory.dmp

            Filesize

            664KB

          • memory/4888-150-0x0000000007870000-0x0000000007906000-memory.dmp

            Filesize

            600KB

          • memory/4888-151-0x0000000006C10000-0x0000000006C2A000-memory.dmp

            Filesize

            104KB

          • memory/4888-145-0x0000000002E00000-0x0000000002E36000-memory.dmp

            Filesize

            216KB

          • memory/4888-149-0x0000000006710000-0x000000000672E000-memory.dmp

            Filesize

            120KB

          • memory/4888-147-0x0000000005F80000-0x0000000005FA2000-memory.dmp

            Filesize

            136KB

          • memory/4888-146-0x00000000057E0000-0x0000000005E08000-memory.dmp

            Filesize

            6.2MB

          • memory/4888-148-0x0000000006030000-0x0000000006096000-memory.dmp

            Filesize

            408KB

          • memory/4888-152-0x0000000006C60000-0x0000000006C82000-memory.dmp

            Filesize

            136KB