Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-01-2024 03:48

General

  • Target

    eca96e3eb1fe44265acc31373a1dadb9.exe

  • Size

    3.7MB

  • MD5

    eca96e3eb1fe44265acc31373a1dadb9

  • SHA1

    3221c9a9d13cc4b0ae24b7d2cc807f18feb3ea4f

  • SHA256

    906623a415b6de1164c7798d3743a5fc06ca0ccc58ca76c8b35ef0a674991608

  • SHA512

    ce2829831d5e5bc8783dc1d871957184f48504bd2aa741456dab29dbdac72b1ad1c110964232655cae67992283dadfc96f46417bacb700b1bd55ba4b6494a6a1

  • SSDEEP

    98304:lbPH543INzdx/9yiXGBwmcFBcBL+PRao/Szic:lb/5cUxllGBgFamYF

Malware Config

Signatures

  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eca96e3eb1fe44265acc31373a1dadb9.exe
    "C:\Users\Admin\AppData\Local\Temp\eca96e3eb1fe44265acc31373a1dadb9.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3076
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4932
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Tests_for_preparation_for_the_academy';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Tests_for_preparation_for_the_academy' -Value '"C:\Users\Admin\AppData\Local\Tests_for_preparation_for_the_academy\Tests_for_preparation_for_the_academy.exe"' -PropertyType 'String'
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Protect544cd51a.dll

    Filesize

    520KB

    MD5

    159a36c55ef378100049fee7f5979bec

    SHA1

    a80bb4950cbbb13bcb245bdef879802c69a4745c

    SHA256

    d79ca832f034c1fdc1f26e847b1f94c4c4fd8ebbe43ba8f901d3dba94cdbf3f6

    SHA512

    b7786f41d756398073d0e86adddd1f95e3ed97e8cd0a1ace947d0f576e18f6bd393f6da56996f7c8af8c59264e00cce95f49ac2b294be1eca8bd5a6887c9d22b

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_znyvf3uv.yj1.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\tmpD757.tmp

    Filesize

    20KB

    MD5

    c9ff7748d8fcef4cf84a5501e996a641

    SHA1

    02867e5010f62f97ebb0cfb32cb3ede9449fe0c9

    SHA256

    4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988

    SHA512

    d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73

  • C:\Users\Admin\AppData\Local\Temp\tmpD769.tmp

    Filesize

    20KB

    MD5

    49693267e0adbcd119f9f5e02adf3a80

    SHA1

    3ba3d7f89b8ad195ca82c92737e960e1f2b349df

    SHA256

    d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f

    SHA512

    b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2

  • memory/740-55-0x0000000070E90000-0x0000000070EDC000-memory.dmp

    Filesize

    304KB

  • memory/740-68-0x0000000007AE0000-0x000000000815A000-memory.dmp

    Filesize

    6.5MB

  • memory/740-98-0x00000000751B0000-0x0000000075960000-memory.dmp

    Filesize

    7.7MB

  • memory/740-43-0x0000000005B40000-0x0000000005BA6000-memory.dmp

    Filesize

    408KB

  • memory/740-73-0x00000000076D0000-0x00000000076DE000-memory.dmp

    Filesize

    56KB

  • memory/740-75-0x00000000077E0000-0x00000000077FA000-memory.dmp

    Filesize

    104KB

  • memory/740-76-0x00000000077C0000-0x00000000077C8000-memory.dmp

    Filesize

    32KB

  • memory/740-74-0x00000000076E0000-0x00000000076F4000-memory.dmp

    Filesize

    80KB

  • memory/740-72-0x00000000076A0000-0x00000000076B1000-memory.dmp

    Filesize

    68KB

  • memory/740-71-0x0000000007720000-0x00000000077B6000-memory.dmp

    Filesize

    600KB

  • memory/740-70-0x0000000007510000-0x000000000751A000-memory.dmp

    Filesize

    40KB

  • memory/740-53-0x000000007F660000-0x000000007F670000-memory.dmp

    Filesize

    64KB

  • memory/740-54-0x0000000007130000-0x0000000007162000-memory.dmp

    Filesize

    200KB

  • memory/740-69-0x00000000074A0000-0x00000000074BA000-memory.dmp

    Filesize

    104KB

  • memory/740-66-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/740-67-0x0000000007370000-0x0000000007413000-memory.dmp

    Filesize

    652KB

  • memory/740-52-0x0000000006220000-0x000000000626C000-memory.dmp

    Filesize

    304KB

  • memory/740-28-0x0000000004BD0000-0x0000000004C06000-memory.dmp

    Filesize

    216KB

  • memory/740-51-0x0000000006170000-0x000000000618E000-memory.dmp

    Filesize

    120KB

  • memory/740-49-0x0000000005CB0000-0x0000000006004000-memory.dmp

    Filesize

    3.3MB

  • memory/740-33-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/740-65-0x0000000006710000-0x000000000672E000-memory.dmp

    Filesize

    120KB

  • memory/740-42-0x0000000005AD0000-0x0000000005B36000-memory.dmp

    Filesize

    408KB

  • memory/740-34-0x0000000005380000-0x00000000059A8000-memory.dmp

    Filesize

    6.2MB

  • memory/740-35-0x00000000052B0000-0x00000000052D2000-memory.dmp

    Filesize

    136KB

  • memory/740-95-0x0000000007800000-0x0000000007822000-memory.dmp

    Filesize

    136KB

  • memory/740-31-0x00000000751B0000-0x0000000075960000-memory.dmp

    Filesize

    7.7MB

  • memory/3076-14-0x00000000052F0000-0x0000000005300000-memory.dmp

    Filesize

    64KB

  • memory/3076-21-0x0000000006C60000-0x0000000006D60000-memory.dmp

    Filesize

    1024KB

  • memory/3076-18-0x00000000052F0000-0x0000000005300000-memory.dmp

    Filesize

    64KB

  • memory/3076-6-0x00000000068A0000-0x0000000006A32000-memory.dmp

    Filesize

    1.6MB

  • memory/3076-13-0x00000000052F0000-0x0000000005300000-memory.dmp

    Filesize

    64KB

  • memory/3076-4-0x00000000052F0000-0x0000000005300000-memory.dmp

    Filesize

    64KB

  • memory/3076-30-0x00000000751B0000-0x0000000075960000-memory.dmp

    Filesize

    7.7MB

  • memory/3076-1-0x0000000000270000-0x0000000000634000-memory.dmp

    Filesize

    3.8MB

  • memory/3076-12-0x00000000052F0000-0x0000000005300000-memory.dmp

    Filesize

    64KB

  • memory/3076-5-0x0000000005500000-0x000000000576A000-memory.dmp

    Filesize

    2.4MB

  • memory/3076-0-0x00000000751B0000-0x0000000075960000-memory.dmp

    Filesize

    7.7MB

  • memory/3076-2-0x0000000004FC0000-0x000000000505C000-memory.dmp

    Filesize

    624KB

  • memory/3076-24-0x0000000007340000-0x00000000078E4000-memory.dmp

    Filesize

    5.6MB

  • memory/3076-16-0x00000000052F0000-0x0000000005300000-memory.dmp

    Filesize

    64KB

  • memory/3076-17-0x00000000052F0000-0x0000000005300000-memory.dmp

    Filesize

    64KB

  • memory/3076-3-0x00000000751B0000-0x0000000075960000-memory.dmp

    Filesize

    7.7MB

  • memory/3076-19-0x0000000006C60000-0x0000000006D60000-memory.dmp

    Filesize

    1024KB

  • memory/3076-20-0x0000000006C60000-0x0000000006D60000-memory.dmp

    Filesize

    1024KB

  • memory/3076-15-0x0000000005260000-0x0000000005270000-memory.dmp

    Filesize

    64KB

  • memory/4932-29-0x00000000050F0000-0x00000000052B2000-memory.dmp

    Filesize

    1.8MB

  • memory/4932-22-0x0000000000400000-0x00000000004D4000-memory.dmp

    Filesize

    848KB

  • memory/4932-48-0x0000000006350000-0x000000000687C000-memory.dmp

    Filesize

    5.2MB

  • memory/4932-32-0x0000000004F10000-0x0000000004F60000-memory.dmp

    Filesize

    320KB

  • memory/4932-23-0x0000000004E20000-0x0000000004EB2000-memory.dmp

    Filesize

    584KB

  • memory/4932-36-0x0000000005060000-0x00000000050D6000-memory.dmp

    Filesize

    472KB

  • memory/4932-50-0x00000000055E0000-0x00000000055FE000-memory.dmp

    Filesize

    120KB

  • memory/4932-25-0x00000000751B0000-0x0000000075960000-memory.dmp

    Filesize

    7.7MB

  • memory/4932-99-0x00000000751B0000-0x0000000075960000-memory.dmp

    Filesize

    7.7MB