Analysis

  • max time kernel
    276s
  • max time network
    299s
  • platform
    windows10-1703_x64
  • resource
    win10-20231215-en
  • resource tags

    arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system
  • submitted
    04/02/2024, 03:42

General

  • Target

    ecde3ad92330ee31991c576ea937aee9ebba39fa9eada3e5c36e3ab245ce4fab.exe

  • Size

    5.6MB

  • MD5

    b4e0409a6822da1a960bf71ce05fba6f

  • SHA1

    1724cdf0f8c87068414fdadeca2a9562eaedc0ac

  • SHA256

    ecde3ad92330ee31991c576ea937aee9ebba39fa9eada3e5c36e3ab245ce4fab

  • SHA512

    281a3e9d8fdd6617e5d8790990b4e8bf25c7de38673d3404b5e2627221bba1005b3b7ad2c43601663ea523ff5edcbefb9b1d07800fc5001737529182f713494c

  • SSDEEP

    49152:4c/0oszNZcYNMFLlG/lvffs9zNG4Xrzb5u2/EfN8XG0PrmRqeS252B2uPrVKtzwJ:4EszNZctxsN8lTeh5u9uwE+cwL

Malware Config

Signatures

  • Detects Arechclient2 RAT 1 IoCs

    Arechclient2.

  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 2 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ecde3ad92330ee31991c576ea937aee9ebba39fa9eada3e5c36e3ab245ce4fab.exe
    "C:\Users\Admin\AppData\Local\Temp\ecde3ad92330ee31991c576ea937aee9ebba39fa9eada3e5c36e3ab245ce4fab.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4324
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4276

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\tmp34D8.tmp

          Filesize

          20KB

          MD5

          c9ff7748d8fcef4cf84a5501e996a641

          SHA1

          02867e5010f62f97ebb0cfb32cb3ede9449fe0c9

          SHA256

          4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988

          SHA512

          d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73

        • \Users\Admin\AppData\Local\Temp\Protect544cd51a.dll

          Filesize

          232KB

          MD5

          7fa516e217c5c7c6671a987d36abc46f

          SHA1

          d1e209bd29a84f6c156b04055fd3e8eddbb10265

          SHA256

          56fd62b789b0854a10d8d9823c3e7c04d48d524d6d1f9154a4886c294a7fcfb2

          SHA512

          ea55069507cfa4cad90c339776ad3ad91532e65ad92e04c9a495dabd2f14f1f10e437750e318e46fcf1d0e2caeed2f6bb7a09e9ac30484513fe8069f8dc42846

        • memory/4276-26-0x0000000005A30000-0x0000000005BF2000-memory.dmp

          Filesize

          1.8MB

        • memory/4276-37-0x0000000006F80000-0x0000000006FD0000-memory.dmp

          Filesize

          320KB

        • memory/4276-38-0x0000000007040000-0x00000000070A6000-memory.dmp

          Filesize

          408KB

        • memory/4276-36-0x0000000006850000-0x000000000686E000-memory.dmp

          Filesize

          120KB

        • memory/4276-35-0x0000000007330000-0x000000000785C000-memory.dmp

          Filesize

          5.2MB

        • memory/4276-34-0x0000000073BA0000-0x000000007428E000-memory.dmp

          Filesize

          6.9MB

        • memory/4276-21-0x0000000000400000-0x00000000004D2000-memory.dmp

          Filesize

          840KB

        • memory/4276-25-0x0000000073BA0000-0x000000007428E000-memory.dmp

          Filesize

          6.9MB

        • memory/4276-27-0x0000000005860000-0x00000000058D6000-memory.dmp

          Filesize

          472KB

        • memory/4324-7-0x0000000006580000-0x0000000006712000-memory.dmp

          Filesize

          1.6MB

        • memory/4324-15-0x0000000005E50000-0x0000000005E60000-memory.dmp

          Filesize

          64KB

        • memory/4324-20-0x0000000005E50000-0x0000000005E60000-memory.dmp

          Filesize

          64KB

        • memory/4324-16-0x0000000005E40000-0x0000000005E50000-memory.dmp

          Filesize

          64KB

        • memory/4324-23-0x0000000006D00000-0x0000000006E00000-memory.dmp

          Filesize

          1024KB

        • memory/4324-22-0x0000000006D00000-0x0000000006E00000-memory.dmp

          Filesize

          1024KB

        • memory/4324-17-0x0000000005E50000-0x0000000005E60000-memory.dmp

          Filesize

          64KB

        • memory/4324-19-0x0000000006D00000-0x0000000006E00000-memory.dmp

          Filesize

          1024KB

        • memory/4324-18-0x0000000073BA0000-0x000000007428E000-memory.dmp

          Filesize

          6.9MB

        • memory/4324-24-0x0000000005E50000-0x0000000005E60000-memory.dmp

          Filesize

          64KB

        • memory/4324-14-0x0000000005E50000-0x0000000005E60000-memory.dmp

          Filesize

          64KB

        • memory/4324-13-0x0000000005E50000-0x0000000005E60000-memory.dmp

          Filesize

          64KB

        • memory/4324-1-0x0000000000C20000-0x00000000011CC000-memory.dmp

          Filesize

          5.7MB

        • memory/4324-33-0x0000000073BA0000-0x000000007428E000-memory.dmp

          Filesize

          6.9MB

        • memory/4324-6-0x0000000005C10000-0x0000000005C1A000-memory.dmp

          Filesize

          40KB

        • memory/4324-5-0x0000000005E50000-0x0000000005E60000-memory.dmp

          Filesize

          64KB

        • memory/4324-2-0x0000000005F40000-0x000000000643E000-memory.dmp

          Filesize

          5.0MB

        • memory/4324-4-0x0000000005C80000-0x0000000005D1C000-memory.dmp

          Filesize

          624KB

        • memory/4324-3-0x0000000005A40000-0x0000000005AD2000-memory.dmp

          Filesize

          584KB

        • memory/4324-0-0x0000000073BA0000-0x000000007428E000-memory.dmp

          Filesize

          6.9MB