Analysis

  • max time kernel
    104s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    21-03-2023 14:30

General

  • Target

    6ad791a223ab8bb728d8d27d371ae1f97ca419948af4bd660d4f84b1d34dc1a0.exe

  • Size

    1.9MB

  • MD5

    f473ff1ba37b4f1ecbf113e0a03979cf

  • SHA1

    9600f413fa59744941bdf3635c86faa9de7689c0

  • SHA256

    6ad791a223ab8bb728d8d27d371ae1f97ca419948af4bd660d4f84b1d34dc1a0

  • SHA512

    7541ea9a6a1b5a47d587364246f4c54fa5365e73233acc7aa6ef351cba1796dd5a610e1dab890f07a182e98d763005e12e3d91ec1b5fefcef3d506805808c511

  • SSDEEP

    12288:LQqdWF4mPTWRETEK8zukxzWBvEqQnUbz7nqIVvu+KWzbCU9aMpIhO4RlWUNNGqR+:LdQDFV3V+SdSO4m

Malware Config

Signatures

  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ad791a223ab8bb728d8d27d371ae1f97ca419948af4bd660d4f84b1d34dc1a0.exe
    "C:\Users\Admin\AppData\Local\Temp\6ad791a223ab8bb728d8d27d371ae1f97ca419948af4bd660d4f84b1d34dc1a0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1324
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1332
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c powershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:564
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1744
    • C:\Users\Admin\AppData\Local\Temp\6ad791a223ab8bb728d8d27d371ae1f97ca419948af4bd660d4f84b1d34dc1a0.exe
      C:\Users\Admin\AppData\Local\Temp\6ad791a223ab8bb728d8d27d371ae1f97ca419948af4bd660d4f84b1d34dc1a0.exe
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1576

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\PIRZEUAKFWWC39738OUO.temp

    Filesize

    7KB

    MD5

    0f1dbeb5bdf3bd6486b63b4769728565

    SHA1

    79dbe8d6068930e44ac7e7e74152e0a6b3a8349d

    SHA256

    3fd4151c475ca850fe67e83613a6bfc9d2ecbbe4be5346c9f253556f46f45e95

    SHA512

    7453d401c14bc5a5182db8ed2b1a0d308fe45e514d46a45eef24d7bf6871a4cb2eceeab38db0c2d0b9dffd77822ff5bc2b0d2bb4b4321f808e631ba27222ef52

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    0f1dbeb5bdf3bd6486b63b4769728565

    SHA1

    79dbe8d6068930e44ac7e7e74152e0a6b3a8349d

    SHA256

    3fd4151c475ca850fe67e83613a6bfc9d2ecbbe4be5346c9f253556f46f45e95

    SHA512

    7453d401c14bc5a5182db8ed2b1a0d308fe45e514d46a45eef24d7bf6871a4cb2eceeab38db0c2d0b9dffd77822ff5bc2b0d2bb4b4321f808e631ba27222ef52

  • memory/1324-54-0x0000000000FC0000-0x00000000011AC000-memory.dmp

    Filesize

    1.9MB

  • memory/1324-55-0x0000000000AE0000-0x0000000000BD8000-memory.dmp

    Filesize

    992KB

  • memory/1324-56-0x0000000000480000-0x00000000004DE000-memory.dmp

    Filesize

    376KB

  • memory/1324-57-0x0000000004CF0000-0x0000000004D30000-memory.dmp

    Filesize

    256KB

  • memory/1324-61-0x0000000004CF0000-0x0000000004D30000-memory.dmp

    Filesize

    256KB

  • memory/1332-60-0x00000000022F0000-0x0000000002330000-memory.dmp

    Filesize

    256KB

  • memory/1576-72-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1576-69-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1576-70-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1576-71-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1576-73-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1576-74-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1576-76-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1576-78-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1576-79-0x0000000004670000-0x00000000046B0000-memory.dmp

    Filesize

    256KB

  • memory/1576-80-0x0000000004670000-0x00000000046B0000-memory.dmp

    Filesize

    256KB

  • memory/1744-67-0x0000000002700000-0x0000000002740000-memory.dmp

    Filesize

    256KB