Analysis

  • max time kernel
    137s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-01-2024 18:42

General

  • Target

    6981e1fe652aea8534bc86365b2c1eea.exe

  • Size

    3.9MB

  • MD5

    6981e1fe652aea8534bc86365b2c1eea

  • SHA1

    4df342b95bff205f57bcf1b1740f26eaee1eac75

  • SHA256

    1f8dec69b76f70a555ed82874354b58e662a6fc382b45784e2cae8ae2978398c

  • SHA512

    b72a326df5848b4b95bc8bb9ca3970fb06de4bc1217f25e3c6d70e05c9d81cbba23298599b665f7c927498fba17cc57ecca99d71e354279f006c69fbd297be13

  • SSDEEP

    98304:mkvX9nnZHBwv59qYyHGqG1A6yPLD2LpvmB2jHNlRN+yFPEJbq:mkvX9nZHBwv59qOKD2dOcjHNlRau

Malware Config

Signatures

  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6981e1fe652aea8534bc86365b2c1eea.exe
    "C:\Users\Admin\AppData\Local\Temp\6981e1fe652aea8534bc86365b2c1eea.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      2⤵
        PID:228
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        2⤵
          PID:5096
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          2⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:768
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Dynamics_in_sales_figures_in_the_report';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Dynamics_in_sales_figures_in_the_report' -Value '"C:\Users\Admin\AppData\Local\Dynamics_in_sales_figures_in_the_report\Dynamics_in_sales_figures_in_the_report.exe"' -PropertyType 'String'
          2⤵
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3304

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Protect544cd51a.dll

        Filesize

        742KB

        MD5

        544cd51a596619b78e9b54b70088307d

        SHA1

        4769ddd2dbc1dc44b758964ed0bd231b85880b65

        SHA256

        dfce2d4d06de6452998b3c5b2dc33eaa6db2bd37810d04e3d02dc931887cfddd

        SHA512

        f56d8b81022bb132d40aa78596da39b5c212d13b84b5c7d2c576bbf403924f1d22e750de3b09d1be30aea359f1b72c5043b19685fc9bf06d8040bfee16b17719

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_pupuxkce.au3.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Local\Temp\tmpC8CB.tmp

        Filesize

        20KB

        MD5

        c9ff7748d8fcef4cf84a5501e996a641

        SHA1

        02867e5010f62f97ebb0cfb32cb3ede9449fe0c9

        SHA256

        4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988

        SHA512

        d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73

      • C:\Users\Admin\AppData\Local\Temp\tmpC91C.tmp

        Filesize

        20KB

        MD5

        49693267e0adbcd119f9f5e02adf3a80

        SHA1

        3ba3d7f89b8ad195ca82c92737e960e1f2b349df

        SHA256

        d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f

        SHA512

        b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2

      • memory/768-20-0x0000000000400000-0x00000000004D4000-memory.dmp

        Filesize

        848KB

      • memory/768-50-0x00000000057A0000-0x00000000057BE000-memory.dmp

        Filesize

        120KB

      • memory/768-99-0x00000000746C0000-0x0000000074E70000-memory.dmp

        Filesize

        7.7MB

      • memory/768-44-0x0000000006600000-0x0000000006B2C000-memory.dmp

        Filesize

        5.2MB

      • memory/768-100-0x00000000051C0000-0x00000000051D0000-memory.dmp

        Filesize

        64KB

      • memory/768-37-0x0000000005250000-0x00000000052C6000-memory.dmp

        Filesize

        472KB

      • memory/768-34-0x00000000050C0000-0x0000000005110000-memory.dmp

        Filesize

        320KB

      • memory/768-33-0x00000000053A0000-0x0000000005562000-memory.dmp

        Filesize

        1.8MB

      • memory/768-31-0x00000000051C0000-0x00000000051D0000-memory.dmp

        Filesize

        64KB

      • memory/768-24-0x0000000005020000-0x00000000050B2000-memory.dmp

        Filesize

        584KB

      • memory/768-22-0x00000000746C0000-0x0000000074E70000-memory.dmp

        Filesize

        7.7MB

      • memory/2032-18-0x0000000005A40000-0x0000000005B40000-memory.dmp

        Filesize

        1024KB

      • memory/2032-12-0x0000000005540000-0x0000000005550000-memory.dmp

        Filesize

        64KB

      • memory/2032-21-0x00000000060F0000-0x0000000006694000-memory.dmp

        Filesize

        5.6MB

      • memory/2032-0-0x00000000746C0000-0x0000000074E70000-memory.dmp

        Filesize

        7.7MB

      • memory/2032-17-0x0000000005A40000-0x0000000005B40000-memory.dmp

        Filesize

        1024KB

      • memory/2032-26-0x00000000746C0000-0x0000000074E70000-memory.dmp

        Filesize

        7.7MB

      • memory/2032-1-0x0000000000370000-0x000000000075A000-memory.dmp

        Filesize

        3.9MB

      • memory/2032-2-0x0000000005100000-0x000000000519C000-memory.dmp

        Filesize

        624KB

      • memory/2032-3-0x00000000746C0000-0x0000000074E70000-memory.dmp

        Filesize

        7.7MB

      • memory/2032-4-0x0000000005540000-0x0000000005550000-memory.dmp

        Filesize

        64KB

      • memory/2032-16-0x0000000005540000-0x0000000005550000-memory.dmp

        Filesize

        64KB

      • memory/2032-19-0x0000000005A40000-0x0000000005B40000-memory.dmp

        Filesize

        1024KB

      • memory/2032-15-0x0000000005540000-0x0000000005550000-memory.dmp

        Filesize

        64KB

      • memory/2032-14-0x0000000005590000-0x00000000055A0000-memory.dmp

        Filesize

        64KB

      • memory/2032-5-0x00000000055B0000-0x0000000005742000-memory.dmp

        Filesize

        1.6MB

      • memory/2032-11-0x0000000005540000-0x0000000005550000-memory.dmp

        Filesize

        64KB

      • memory/2032-13-0x0000000005540000-0x0000000005550000-memory.dmp

        Filesize

        64KB

      • memory/3304-52-0x0000000006960000-0x00000000069AC000-memory.dmp

        Filesize

        304KB

      • memory/3304-30-0x0000000005350000-0x0000000005360000-memory.dmp

        Filesize

        64KB

      • memory/3304-36-0x0000000005890000-0x00000000058F6000-memory.dmp

        Filesize

        408KB

      • memory/3304-45-0x0000000006130000-0x0000000006484000-memory.dmp

        Filesize

        3.3MB

      • memory/3304-35-0x0000000005670000-0x0000000005692000-memory.dmp

        Filesize

        136KB

      • memory/3304-51-0x00000000067E0000-0x00000000067FE000-memory.dmp

        Filesize

        120KB

      • memory/3304-32-0x0000000005990000-0x0000000005FB8000-memory.dmp

        Filesize

        6.2MB

      • memory/3304-53-0x0000000005350000-0x0000000005360000-memory.dmp

        Filesize

        64KB

      • memory/3304-54-0x000000007FDF0000-0x000000007FE00000-memory.dmp

        Filesize

        64KB

      • memory/3304-55-0x0000000007790000-0x00000000077C2000-memory.dmp

        Filesize

        200KB

      • memory/3304-56-0x00000000703A0000-0x00000000703EC000-memory.dmp

        Filesize

        304KB

      • memory/3304-66-0x0000000006D90000-0x0000000006DAE000-memory.dmp

        Filesize

        120KB

      • memory/3304-67-0x00000000077D0000-0x0000000007873000-memory.dmp

        Filesize

        652KB

      • memory/3304-38-0x0000000005900000-0x0000000005966000-memory.dmp

        Filesize

        408KB

      • memory/3304-29-0x0000000005350000-0x0000000005360000-memory.dmp

        Filesize

        64KB

      • memory/3304-86-0x0000000008130000-0x00000000087AA000-memory.dmp

        Filesize

        6.5MB

      • memory/3304-87-0x0000000007AE0000-0x0000000007AFA000-memory.dmp

        Filesize

        104KB

      • memory/3304-88-0x0000000007B50000-0x0000000007B5A000-memory.dmp

        Filesize

        40KB

      • memory/3304-89-0x0000000007D60000-0x0000000007DF6000-memory.dmp

        Filesize

        600KB

      • memory/3304-90-0x0000000007D00000-0x0000000007D11000-memory.dmp

        Filesize

        68KB

      • memory/3304-91-0x0000000007D30000-0x0000000007D3E000-memory.dmp

        Filesize

        56KB

      • memory/3304-92-0x0000000007D40000-0x0000000007D54000-memory.dmp

        Filesize

        80KB

      • memory/3304-93-0x0000000007E30000-0x0000000007E4A000-memory.dmp

        Filesize

        104KB

      • memory/3304-94-0x0000000007E20000-0x0000000007E28000-memory.dmp

        Filesize

        32KB

      • memory/3304-95-0x0000000007E60000-0x0000000007E82000-memory.dmp

        Filesize

        136KB

      • memory/3304-98-0x00000000746C0000-0x0000000074E70000-memory.dmp

        Filesize

        7.7MB

      • memory/3304-28-0x00000000746C0000-0x0000000074E70000-memory.dmp

        Filesize

        7.7MB

      • memory/3304-27-0x0000000002E20000-0x0000000002E56000-memory.dmp

        Filesize

        216KB