Analysis
-
max time kernel
142s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/02/2024, 21:22
Static task
static1
Behavioral task
behavioral1
Sample
ace2e0db8f7eead17ddf17aae5686525.exe
Resource
win7-20240221-en
5 signatures
150 seconds
General
-
Target
ace2e0db8f7eead17ddf17aae5686525.exe
-
Size
2.3MB
-
MD5
ace2e0db8f7eead17ddf17aae5686525
-
SHA1
3f54e20d3ee79935fd18c6a3dc5db5577e3618c5
-
SHA256
07a762329f21047bb6a8d75e30f915c651352d2e6b6b213c8a58d6ea475f937b
-
SHA512
fcbd38ffc15f91bc3f1cbba12c22fc711004b0a50c1ba29393677bdf81f8eeacfc4754e74ccbe5a43688b6a9e71d8da32a127f99a6302edc35b7a5a2fe37a8c9
-
SSDEEP
49152:6AkaiJGEx+MLwdd9GZo8DH3EsljHa81+YL8KgwhmrU6/9:saiJGyErsZTH0s1HSR9
Malware Config
Signatures
-
SectopRAT payload 16 IoCs
resource yara_rule behavioral1/memory/2208-3-0x0000000000170000-0x0000000000A30000-memory.dmp family_sectoprat behavioral1/memory/2208-5-0x0000000000170000-0x0000000000A30000-memory.dmp family_sectoprat behavioral1/memory/2208-6-0x0000000000170000-0x0000000000A30000-memory.dmp family_sectoprat behavioral1/memory/2208-7-0x0000000000170000-0x0000000000A30000-memory.dmp family_sectoprat behavioral1/memory/2208-11-0x0000000000170000-0x0000000000A30000-memory.dmp family_sectoprat behavioral1/memory/2208-12-0x0000000000170000-0x0000000000A30000-memory.dmp family_sectoprat behavioral1/memory/2208-13-0x0000000000170000-0x0000000000A30000-memory.dmp family_sectoprat behavioral1/memory/2208-14-0x0000000000170000-0x0000000000A30000-memory.dmp family_sectoprat behavioral1/memory/2208-15-0x0000000000170000-0x0000000000A30000-memory.dmp family_sectoprat behavioral1/memory/2208-16-0x0000000000170000-0x0000000000A30000-memory.dmp family_sectoprat behavioral1/memory/2208-17-0x0000000000170000-0x0000000000A30000-memory.dmp family_sectoprat behavioral1/memory/2208-18-0x0000000000170000-0x0000000000A30000-memory.dmp family_sectoprat behavioral1/memory/2208-19-0x0000000000170000-0x0000000000A30000-memory.dmp family_sectoprat behavioral1/memory/2208-20-0x0000000000170000-0x0000000000A30000-memory.dmp family_sectoprat behavioral1/memory/2208-21-0x0000000000170000-0x0000000000A30000-memory.dmp family_sectoprat behavioral1/memory/2208-22-0x0000000000170000-0x0000000000A30000-memory.dmp family_sectoprat -
Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
pid Process 2208 ace2e0db8f7eead17ddf17aae5686525.exe 2208 ace2e0db8f7eead17ddf17aae5686525.exe 2208 ace2e0db8f7eead17ddf17aae5686525.exe 2208 ace2e0db8f7eead17ddf17aae5686525.exe 2208 ace2e0db8f7eead17ddf17aae5686525.exe 2208 ace2e0db8f7eead17ddf17aae5686525.exe 2208 ace2e0db8f7eead17ddf17aae5686525.exe 2208 ace2e0db8f7eead17ddf17aae5686525.exe 2208 ace2e0db8f7eead17ddf17aae5686525.exe 2208 ace2e0db8f7eead17ddf17aae5686525.exe 2208 ace2e0db8f7eead17ddf17aae5686525.exe 2208 ace2e0db8f7eead17ddf17aae5686525.exe 2208 ace2e0db8f7eead17ddf17aae5686525.exe 2208 ace2e0db8f7eead17ddf17aae5686525.exe 2208 ace2e0db8f7eead17ddf17aae5686525.exe 2208 ace2e0db8f7eead17ddf17aae5686525.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2208 ace2e0db8f7eead17ddf17aae5686525.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2208 ace2e0db8f7eead17ddf17aae5686525.exe