Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-08-2023 19:38

General

  • Target

    2c4ae2bb8418890dcb1418a8777ebddd.exe

  • Size

    2.9MB

  • MD5

    2c4ae2bb8418890dcb1418a8777ebddd

  • SHA1

    7553c755559dd811c4a4904203da991accf0d3d6

  • SHA256

    fb553e12381d42a612c713968078424201794a35fd13c681ae7faa77bf18e553

  • SHA512

    fd7c26de8b196288c31d1fd52a86efb0cd0a68321812715dd0a2e133f8433e1cb4f446f517d7e9edbd9ee93c83e21b37d0431cc401e87da8c1397a099a999467

  • SSDEEP

    49152:g4R1oLkfMMMMMO7hBm0ytzuItW8VxiRVw5UjSaKWdhr9GrEzpThyZfjdVWljUunW:gxkfMMMMMOtBmtou2RVw5zEVG41TqfjZ

Malware Config

Signatures

  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 1 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c4ae2bb8418890dcb1418a8777ebddd.exe
    "C:\Users\Admin\AppData\Local\Temp\2c4ae2bb8418890dcb1418a8777ebddd.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:4068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4068-133-0x0000000000400000-0x0000000000B74000-memory.dmp

    Filesize

    7.5MB

  • memory/4068-134-0x0000000075FF0000-0x00000000760E0000-memory.dmp

    Filesize

    960KB

  • memory/4068-135-0x0000000075FF0000-0x00000000760E0000-memory.dmp

    Filesize

    960KB

  • memory/4068-136-0x0000000075FF0000-0x00000000760E0000-memory.dmp

    Filesize

    960KB

  • memory/4068-137-0x0000000075FF0000-0x00000000760E0000-memory.dmp

    Filesize

    960KB

  • memory/4068-138-0x0000000077DA4000-0x0000000077DA6000-memory.dmp

    Filesize

    8KB

  • memory/4068-140-0x0000000000400000-0x0000000000B74000-memory.dmp

    Filesize

    7.5MB

  • memory/4068-141-0x0000000005290000-0x0000000005834000-memory.dmp

    Filesize

    5.6MB

  • memory/4068-142-0x00000000051E0000-0x0000000005272000-memory.dmp

    Filesize

    584KB

  • memory/4068-143-0x0000000005860000-0x0000000005A22000-memory.dmp

    Filesize

    1.8MB

  • memory/4068-144-0x0000000005A40000-0x0000000005AB6000-memory.dmp

    Filesize

    472KB

  • memory/4068-145-0x0000000005AD0000-0x0000000005B20000-memory.dmp

    Filesize

    320KB

  • memory/4068-146-0x0000000005B50000-0x0000000005BB6000-memory.dmp

    Filesize

    408KB

  • memory/4068-147-0x0000000006260000-0x000000000628E000-memory.dmp

    Filesize

    184KB

  • memory/4068-148-0x0000000006290000-0x00000000062C8000-memory.dmp

    Filesize

    224KB

  • memory/4068-149-0x0000000006820000-0x0000000006D4C000-memory.dmp

    Filesize

    5.2MB

  • memory/4068-150-0x0000000006D50000-0x0000000006D6E000-memory.dmp

    Filesize

    120KB

  • memory/4068-151-0x0000000000400000-0x0000000000B74000-memory.dmp

    Filesize

    7.5MB

  • memory/4068-152-0x0000000075FF0000-0x00000000760E0000-memory.dmp

    Filesize

    960KB

  • memory/4068-153-0x0000000075FF0000-0x00000000760E0000-memory.dmp

    Filesize

    960KB

  • memory/4068-155-0x0000000075FF0000-0x00000000760E0000-memory.dmp

    Filesize

    960KB

  • memory/4068-156-0x0000000075FF0000-0x00000000760E0000-memory.dmp

    Filesize

    960KB