Analysis

  • max time kernel
    141s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-08-2023 12:08

General

  • Target

    ffd45c2b562d30113cb9a4823025a9a162503017e9d81fd96ddb5b98e5bb89bd.exe

  • Size

    3.0MB

  • MD5

    1c7a29f48b56d6e89620c0c55d515095

  • SHA1

    6362eed3be15d632ce62400a159f483e1ffd7610

  • SHA256

    ffd45c2b562d30113cb9a4823025a9a162503017e9d81fd96ddb5b98e5bb89bd

  • SHA512

    16c1e03386e289a4a5aa24190d2c6ad05f87a657d92a210e0d6aecb5afaf5bfac1654437c780d2a4d8d9a9212c67a387d66a9f12a71756331fe0246035496b48

  • SSDEEP

    98304:v6rcWNztTkmXubthKXwkgzdXqS/jwHxMz9IPctmZS:SrLNvubthKXxCaLM+Pctq

Malware Config

Signatures

  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 1 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ffd45c2b562d30113cb9a4823025a9a162503017e9d81fd96ddb5b98e5bb89bd.exe
    "C:\Users\Admin\AppData\Local\Temp\ffd45c2b562d30113cb9a4823025a9a162503017e9d81fd96ddb5b98e5bb89bd.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:4988

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4988-133-0x0000000000400000-0x0000000000B8A000-memory.dmp

    Filesize

    7.5MB

  • memory/4988-134-0x0000000076230000-0x0000000076320000-memory.dmp

    Filesize

    960KB

  • memory/4988-135-0x0000000076230000-0x0000000076320000-memory.dmp

    Filesize

    960KB

  • memory/4988-136-0x0000000076230000-0x0000000076320000-memory.dmp

    Filesize

    960KB

  • memory/4988-137-0x0000000076230000-0x0000000076320000-memory.dmp

    Filesize

    960KB

  • memory/4988-138-0x0000000076230000-0x0000000076320000-memory.dmp

    Filesize

    960KB

  • memory/4988-139-0x0000000076230000-0x0000000076320000-memory.dmp

    Filesize

    960KB

  • memory/4988-140-0x0000000077774000-0x0000000077776000-memory.dmp

    Filesize

    8KB

  • memory/4988-142-0x0000000000400000-0x0000000000B8A000-memory.dmp

    Filesize

    7.5MB

  • memory/4988-143-0x0000000005260000-0x0000000005804000-memory.dmp

    Filesize

    5.6MB

  • memory/4988-144-0x00000000050B0000-0x0000000005142000-memory.dmp

    Filesize

    584KB

  • memory/4988-145-0x0000000005810000-0x00000000059D2000-memory.dmp

    Filesize

    1.8MB

  • memory/4988-146-0x0000000005180000-0x00000000051F6000-memory.dmp

    Filesize

    472KB

  • memory/4988-147-0x0000000005A20000-0x0000000005A70000-memory.dmp

    Filesize

    320KB

  • memory/4988-148-0x0000000005A70000-0x0000000005AD6000-memory.dmp

    Filesize

    408KB

  • memory/4988-149-0x0000000006290000-0x00000000062BE000-memory.dmp

    Filesize

    184KB

  • memory/4988-150-0x00000000062C0000-0x00000000062F8000-memory.dmp

    Filesize

    224KB

  • memory/4988-151-0x0000000006730000-0x0000000006C5C000-memory.dmp

    Filesize

    5.2MB

  • memory/4988-152-0x0000000006D60000-0x0000000006D7E000-memory.dmp

    Filesize

    120KB

  • memory/4988-153-0x0000000000400000-0x0000000000B8A000-memory.dmp

    Filesize

    7.5MB

  • memory/4988-154-0x0000000076230000-0x0000000076320000-memory.dmp

    Filesize

    960KB

  • memory/4988-155-0x0000000076230000-0x0000000076320000-memory.dmp

    Filesize

    960KB

  • memory/4988-156-0x0000000076230000-0x0000000076320000-memory.dmp

    Filesize

    960KB

  • memory/4988-157-0x0000000076230000-0x0000000076320000-memory.dmp

    Filesize

    960KB