Analysis

  • max time kernel
    287s
  • max time network
    290s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2023 04:54

General

  • Target

    a0c73f5d940754b7cc2a790a0d4f48b51b3568ce1101fb0d3df3c307ae835111.exe

  • Size

    1.8MB

  • MD5

    2ea25fcf4fec229f7dd7fc8bb32bf0ed

  • SHA1

    11da6740a2b2136812b7398711496e9392a534f9

  • SHA256

    a0c73f5d940754b7cc2a790a0d4f48b51b3568ce1101fb0d3df3c307ae835111

  • SHA512

    09b295831ecd1196ac000a3fb0dabb32280627372768d69f9df15c246a2bc06109034be60000d12b30d8f7b854bbe61e3c28210d1a6f60f3edab6fed1f74a290

  • SSDEEP

    24576:7SzVcXU1U+L6Wpu2DQ1yI3oPmh1NUwZrGLU/LbNtRvN7d2Yk7/2kd/AHy:7JyY4oUwZqe7R7232kdAy

Malware Config

Signatures

  • Detects Arechclient2 RAT 3 IoCs

    Arechclient2.

  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 4 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1204
      • C:\Users\Admin\AppData\Local\Temp\a0c73f5d940754b7cc2a790a0d4f48b51b3568ce1101fb0d3df3c307ae835111.exe
        "C:\Users\Admin\AppData\Local\Temp\a0c73f5d940754b7cc2a790a0d4f48b51b3568ce1101fb0d3df3c307ae835111.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1980
        • C:\Windows\SysWOW64\cmd.exe
          cmd /k cmd < Bali & exit
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3016
          • C:\Windows\SysWOW64\cmd.exe
            cmd
            4⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2728
            • C:\Windows\SysWOW64\tasklist.exe
              tasklist
              5⤵
              • Enumerates processes with tasklist
              • Suspicious use of AdjustPrivilegeToken
              PID:2812
            • C:\Windows\SysWOW64\findstr.exe
              findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"
              5⤵
                PID:2848
              • C:\Windows\SysWOW64\tasklist.exe
                tasklist
                5⤵
                • Enumerates processes with tasklist
                • Suspicious use of AdjustPrivilegeToken
                PID:2344
              • C:\Windows\SysWOW64\findstr.exe
                findstr /I "wrsa.exe"
                5⤵
                  PID:2816
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c mkdir 17772
                  5⤵
                    PID:2700
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c copy /b Faced + Mountains + Pix + Schedule + Consequently 17772\Consists.pif
                    5⤵
                      PID:1160
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c copy /b Rim + Hear + Dr + Rice 17772\w
                      5⤵
                        PID:3064
                      • C:\Users\Admin\AppData\Local\Temp\16006\17772\Consists.pif
                        17772\Consists.pif 17772\w
                        5⤵
                        • Suspicious use of NtCreateUserProcessOtherParentProcess
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        • Suspicious use of WriteProcessMemory
                        PID:2016
                      • C:\Windows\SysWOW64\PING.EXE
                        ping -n 5 localhost
                        5⤵
                        • Runs ping.exe
                        PID:2580
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TimeTracker.url" & echo URL="C:\Users\Admin\AppData\Local\ Tempo Efficiente Ltd\TimeTracker.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TimeTracker.url" & exit
                  2⤵
                  • Drops startup file
                  PID:2656
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c schtasks.exe /create /tn "Griffin" /tr "wscript 'C:\Users\Admin\AppData\Local\ Tempo Efficiente Ltd\TimeTracker.js'" /sc minute /mo 3 /F
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3068
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks.exe /create /tn "Griffin" /tr "wscript 'C:\Users\Admin\AppData\Local\ Tempo Efficiente Ltd\TimeTracker.js'" /sc minute /mo 3 /F
                    3⤵
                    • Creates scheduled task(s)
                    PID:2288
                • C:\Users\Admin\AppData\Local\Temp\16006\17772\jsc.exe
                  C:\Users\Admin\AppData\Local\Temp\16006\17772\jsc.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1596
              • C:\Windows\system32\taskeng.exe
                taskeng.exe {056CAE26-22C8-4DEB-A823-3B6C1EB4DE7C} S-1-5-21-2952504676-3105837840-1406404655-1000:URUOZWGF\Admin:Interactive:[1]
                1⤵
                • Suspicious use of WriteProcessMemory
                PID:572
                • C:\Windows\system32\wscript.EXE
                  C:\Windows\system32\wscript.EXE "C:\Users\Admin\AppData\Local\ Tempo Efficiente Ltd\TimeTracker.js"
                  2⤵
                    PID:2908
                    • C:\Users\Admin\AppData\Local\ Tempo Efficiente Ltd\TimeTracker.pif
                      "C:\Users\Admin\AppData\Local\ Tempo Efficiente Ltd\TimeTracker.pif" "C:\Users\Admin\AppData\Local\ Tempo Efficiente Ltd\i"
                      3⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      PID:1960

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\ Tempo Efficiente Ltd\TimeTracker.js

                  Filesize

                  181B

                  MD5

                  3969b4b908e1effb0d6d0eee0e3e87b0

                  SHA1

                  29f655251ed4af825d12c6cee25f0bcbda0e99e8

                  SHA256

                  c6ce6b620d8c917c55316b2db863b3cb382996cc454527d0c77eb084bfe8e309

                  SHA512

                  bc3cf384b2398e101cd20f6d6653d16349342e1dca049756bd005eefc1b555c581471c67e837fbef737d0a3060e85076522751605d9fb59968fd71a00d453b97

                • C:\Users\Admin\AppData\Local\ Tempo Efficiente Ltd\TimeTracker.pif

                  Filesize

                  924KB

                  MD5

                  848164d084384c49937f99d5b894253e

                  SHA1

                  3055ef803eeec4f175ebf120f94125717ee12444

                  SHA256

                  f58d3a4b2f3f7f10815c24586fae91964eeed830369e7e0701b43895b0cefbd3

                  SHA512

                  aabe1cf076f48f32542f49a92e4ca9f054b31d5a9949119991b897b9489fe775d8009896408ba49ac43ec431c87c0d385daead9dbbde7ef6309b0c97bbaf852a

                • C:\Users\Admin\AppData\Local\ Tempo Efficiente Ltd\TimeTracker.pif

                  Filesize

                  924KB

                  MD5

                  848164d084384c49937f99d5b894253e

                  SHA1

                  3055ef803eeec4f175ebf120f94125717ee12444

                  SHA256

                  f58d3a4b2f3f7f10815c24586fae91964eeed830369e7e0701b43895b0cefbd3

                  SHA512

                  aabe1cf076f48f32542f49a92e4ca9f054b31d5a9949119991b897b9489fe775d8009896408ba49ac43ec431c87c0d385daead9dbbde7ef6309b0c97bbaf852a

                • C:\Users\Admin\AppData\Local\ Tempo Efficiente Ltd\i

                  Filesize

                  1.5MB

                  MD5

                  d21fafaf0e96ec5fa817e11cdd8e8cb9

                  SHA1

                  7f6d67ba891483639cc3c6ec7b53b1427b8fae24

                  SHA256

                  f4d5cd97f56b3005bcdcad3e9abaca7fca8fce3e1d38d2f090424a4e78771419

                  SHA512

                  f85cfdb45ba732b3f1116ca6bfc797e02fb9c1c2655f40ba210afc773a052934ff98c81bef21dab92f228e413f08c5c0f1e8b7ef006b6c4f8d7fe609dcc47f8e

                • C:\Users\Admin\AppData\Local\Temp\16006\17772\Consists.pif

                  Filesize

                  924KB

                  MD5

                  848164d084384c49937f99d5b894253e

                  SHA1

                  3055ef803eeec4f175ebf120f94125717ee12444

                  SHA256

                  f58d3a4b2f3f7f10815c24586fae91964eeed830369e7e0701b43895b0cefbd3

                  SHA512

                  aabe1cf076f48f32542f49a92e4ca9f054b31d5a9949119991b897b9489fe775d8009896408ba49ac43ec431c87c0d385daead9dbbde7ef6309b0c97bbaf852a

                • C:\Users\Admin\AppData\Local\Temp\16006\17772\Consists.pif

                  Filesize

                  924KB

                  MD5

                  848164d084384c49937f99d5b894253e

                  SHA1

                  3055ef803eeec4f175ebf120f94125717ee12444

                  SHA256

                  f58d3a4b2f3f7f10815c24586fae91964eeed830369e7e0701b43895b0cefbd3

                  SHA512

                  aabe1cf076f48f32542f49a92e4ca9f054b31d5a9949119991b897b9489fe775d8009896408ba49ac43ec431c87c0d385daead9dbbde7ef6309b0c97bbaf852a

                • C:\Users\Admin\AppData\Local\Temp\16006\17772\jsc.exe

                  Filesize

                  45KB

                  MD5

                  f1feead2143c07ca411d82a29fa964af

                  SHA1

                  2198e7bf402773757bb2a25311ffd2644e5a1645

                  SHA256

                  8f2800ac8af72e8038e146b3988a30651952f20ed6cdf7be3ae4709fbb026af1

                  SHA512

                  e7e2266ec862a793da7cea01c926b7a874453cf2efb0b4b77776c26042dc2ded74f17c390fad97bd2d8c0c4971a1b9d9e6c705a13edbc9e48570922e5e6cc9df

                • C:\Users\Admin\AppData\Local\Temp\16006\17772\jsc.exe

                  Filesize

                  45KB

                  MD5

                  f1feead2143c07ca411d82a29fa964af

                  SHA1

                  2198e7bf402773757bb2a25311ffd2644e5a1645

                  SHA256

                  8f2800ac8af72e8038e146b3988a30651952f20ed6cdf7be3ae4709fbb026af1

                  SHA512

                  e7e2266ec862a793da7cea01c926b7a874453cf2efb0b4b77776c26042dc2ded74f17c390fad97bd2d8c0c4971a1b9d9e6c705a13edbc9e48570922e5e6cc9df

                • C:\Users\Admin\AppData\Local\Temp\16006\17772\w

                  Filesize

                  1.5MB

                  MD5

                  d21fafaf0e96ec5fa817e11cdd8e8cb9

                  SHA1

                  7f6d67ba891483639cc3c6ec7b53b1427b8fae24

                  SHA256

                  f4d5cd97f56b3005bcdcad3e9abaca7fca8fce3e1d38d2f090424a4e78771419

                  SHA512

                  f85cfdb45ba732b3f1116ca6bfc797e02fb9c1c2655f40ba210afc773a052934ff98c81bef21dab92f228e413f08c5c0f1e8b7ef006b6c4f8d7fe609dcc47f8e

                • C:\Users\Admin\AppData\Local\Temp\16006\Bali

                  Filesize

                  13KB

                  MD5

                  5d17c9504f5fa37c0b44086fbbcee8c2

                  SHA1

                  22192e7838ce3cfaa78f59191eefc00346a509ca

                  SHA256

                  c822774cd1f2ff33898c1c08f32497bb44781dc61ea74ec02bc5b0bc92d84021

                  SHA512

                  fabcc6e4c8b020cf343dfc2f8335612e137c96f8f6288da1840fc7de77221f662ea289b3fe2cb33df7833783c58f115c5cdfdc54bca4b8d246d55e82a76bab11

                • C:\Users\Admin\AppData\Local\Temp\16006\Consequently

                  Filesize

                  163KB

                  MD5

                  ab14d9e736fb4408cc14efa0ba12c9b7

                  SHA1

                  4cb631e45b733a3f3f294d92797de89348413a46

                  SHA256

                  db19fd9043510e9e59c956cf4d7e2b3e65251fdd502e39ecfebb00ea1c704711

                  SHA512

                  f04719aa70d87dbdd8cf87e6a10a91db57d780202583eb474c5287d4a79a9ecc3432751f8a825381708cc3035759153236cb2a73d1f413ae67f9da7dc7637a8e

                • C:\Users\Admin\AppData\Local\Temp\16006\Dr

                  Filesize

                  420KB

                  MD5

                  6ded8e340e878d9e8c66be0723bd9b9a

                  SHA1

                  6465c0cfe7a6c39c59ad46691a54ee3e823bb30d

                  SHA256

                  33b716611de65f238b0f19d9cc478ca3434694771d880c42d85c9f87a4198478

                  SHA512

                  cc2a19015557fd77f859b6b5a78b2d0164eadaa2b48d9696da432c8029c70bb1458f0ddb5e4e281fa38b949b109fb09cd07c74f36e6cade2a59f3e3dcff6043d

                • C:\Users\Admin\AppData\Local\Temp\16006\Faced

                  Filesize

                  231KB

                  MD5

                  fdc66afb5ca154d04f15ef0881244564

                  SHA1

                  0cde6ef4e3f0808d630d81a4eb644dc02d2446cd

                  SHA256

                  1cce43efe1619700434f7dca55860a5ed12b075bf8ee61b9c3e635727e748287

                  SHA512

                  6a62539fb26243c169b6336ce4c42407b560b757f1e2254571785fb86b9beb275fdb07398d107f9fd1b8d4203d11d55c1068758751ea872007ca6a9d368bd4b1

                • C:\Users\Admin\AppData\Local\Temp\16006\Hear

                  Filesize

                  444KB

                  MD5

                  4d2b01c7d2364aa503bfb6b4b00d94b1

                  SHA1

                  cce3081f69e5a40c65426e6015a509f5c25b7df8

                  SHA256

                  13264f90cad82dac08f8dfb871cd8e0194cac488db3f6f885488c48570813292

                  SHA512

                  9311f80c360fa6ca5b9010a15390778b524005daf245fc445a48f597f59a3ee3f94a48522ecd48150dfb815085453f9264870838f6eb8d59b22b6f8de5c2f486

                • C:\Users\Admin\AppData\Local\Temp\16006\Mountains

                  Filesize

                  175KB

                  MD5

                  d558960cf490ef0b1ce71e29ececa576

                  SHA1

                  43737951302a8ca03c433df069e9ea4769021d6c

                  SHA256

                  7ad68af2caa71789ec2ca2b3bc8458f037d005c6d8be7d53cb6bf8eba72052b1

                  SHA512

                  7c4383c1dc8f90a21f74eb1e03b17e9dbfd61b744542fc35441824a7fab82befc5485a4ccdf04a3fe7251dc7f11d12fe210873a4735ef97ae7f8cfa3e6960dcb

                • C:\Users\Admin\AppData\Local\Temp\16006\Pix

                  Filesize

                  225KB

                  MD5

                  7408d908102e9674e9f0547c2ba7fa4e

                  SHA1

                  3333270983551fd7331913dec04d11d1eb470914

                  SHA256

                  a30dea9847d4a4b1e2c3d55cb5a2d5fc7874f5c2d20472a8f1d1b9249863eb18

                  SHA512

                  e0e14ae40e5cc45b9778d7fa4b3396647c3c5041c6d3d4267e8c8e341cab76c388e3739ea07e69c3b09c269d22694f415ccebc65e221b8a2ea7a109f27a1bc0b

                • C:\Users\Admin\AppData\Local\Temp\16006\Rice

                  Filesize

                  244KB

                  MD5

                  d51b227f858e8f572638bdd3f9dc3719

                  SHA1

                  de531eb0085331d08326250ca7649401069aa117

                  SHA256

                  0e9029ea7e593e196f5ef389109822353976834e825d175cd1798bcdee48df44

                  SHA512

                  eac2f72b1bd96c965e8b789154bc790ff91783b1128f8293d449f67a8d9058e13d8996684fd472603808c60e0a8ebac20b7f4abeb91dfb0454f83e9e84890022

                • C:\Users\Admin\AppData\Local\Temp\16006\Rim

                  Filesize

                  448KB

                  MD5

                  ded5d51fda15bb9961b6410293447cea

                  SHA1

                  30c5a290f7e60239adc7b8355fe04f3bdbc62d64

                  SHA256

                  23ca61af849178664e7f7f4a09bebd9399eaf167c3b41e93d1cc129a841ae462

                  SHA512

                  a3ca7755dfaaaa7080225a115e81454d203ad4e5389c4d884982b30806fe344b013a6d2ecb9c928ff63e79114f6505fbd3e05fb2e5fec935ac16402792e17b2b

                • C:\Users\Admin\AppData\Local\Temp\16006\Schedule

                  Filesize

                  130KB

                  MD5

                  1dd8a6b4d93cd477aac9a521a570d6ad

                  SHA1

                  88893b0c11511702b981524f8ebd4d211b442690

                  SHA256

                  358ca0260ed91f1bcb19173cc15eba0082403132fe90aaf80bc092e1c5850407

                  SHA512

                  1fa5dea44975a18b12a02e0a2a90d66cd9d7156ec274f8da32b8a627b5e9477b0ad49b6e96608365d0616b62870eb9f1bcb567f57ed72eff914389a6a2a94af6

                • C:\Users\Admin\AppData\Local\Temp\tmpB1A5.tmp

                  Filesize

                  20KB

                  MD5

                  c9ff7748d8fcef4cf84a5501e996a641

                  SHA1

                  02867e5010f62f97ebb0cfb32cb3ede9449fe0c9

                  SHA256

                  4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988

                  SHA512

                  d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73

                • \Users\Admin\AppData\Local\Temp\16006\17772\Consists.pif

                  Filesize

                  924KB

                  MD5

                  848164d084384c49937f99d5b894253e

                  SHA1

                  3055ef803eeec4f175ebf120f94125717ee12444

                  SHA256

                  f58d3a4b2f3f7f10815c24586fae91964eeed830369e7e0701b43895b0cefbd3

                  SHA512

                  aabe1cf076f48f32542f49a92e4ca9f054b31d5a9949119991b897b9489fe775d8009896408ba49ac43ec431c87c0d385daead9dbbde7ef6309b0c97bbaf852a

                • \Users\Admin\AppData\Local\Temp\16006\17772\jsc.exe

                  Filesize

                  45KB

                  MD5

                  f1feead2143c07ca411d82a29fa964af

                  SHA1

                  2198e7bf402773757bb2a25311ffd2644e5a1645

                  SHA256

                  8f2800ac8af72e8038e146b3988a30651952f20ed6cdf7be3ae4709fbb026af1

                  SHA512

                  e7e2266ec862a793da7cea01c926b7a874453cf2efb0b4b77776c26042dc2ded74f17c390fad97bd2d8c0c4971a1b9d9e6c705a13edbc9e48570922e5e6cc9df

                • memory/1596-46-0x0000000000A80000-0x0000000000AC0000-memory.dmp

                  Filesize

                  256KB

                • memory/1596-45-0x0000000074180000-0x000000007486E000-memory.dmp

                  Filesize

                  6.9MB

                • memory/1596-43-0x00000000000F0000-0x00000000001C2000-memory.dmp

                  Filesize

                  840KB

                • memory/1596-56-0x0000000074180000-0x000000007486E000-memory.dmp

                  Filesize

                  6.9MB

                • memory/1596-57-0x0000000000A80000-0x0000000000AC0000-memory.dmp

                  Filesize

                  256KB

                • memory/1596-41-0x00000000000F0000-0x00000000001C2000-memory.dmp

                  Filesize

                  840KB

                • memory/1596-38-0x00000000000F0000-0x00000000001C2000-memory.dmp

                  Filesize

                  840KB

                • memory/1980-0-0x00000000003B0000-0x00000000003B1000-memory.dmp

                  Filesize

                  4KB

                • memory/1980-32-0x0000000000400000-0x00000000005DB000-memory.dmp

                  Filesize

                  1.9MB

                • memory/2016-34-0x00000000001B0000-0x00000000001B1000-memory.dmp

                  Filesize

                  4KB