Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
22/04/2024, 20:48
Static task
static1
Behavioral task
behavioral1
Sample
a6371d2dcf5b1652aac0bd322d479581a136ee874bfea3b907c67be7422e1ca6.exe
Resource
win10v2004-20240412-en
General
-
Target
a6371d2dcf5b1652aac0bd322d479581a136ee874bfea3b907c67be7422e1ca6.exe
-
Size
414KB
-
MD5
52c28f353ec729be591d6c1c10f03f21
-
SHA1
3067357a993f0ba851cfcce39953245d1d69c78c
-
SHA256
a6371d2dcf5b1652aac0bd322d479581a136ee874bfea3b907c67be7422e1ca6
-
SHA512
e2ff0628dc2603f5f33be82f4abf5cc81296d20bee674212132d14e2cc16a3863aa81cd5982d776a58122f46ed91b798965b4a1fbee9149cf005117506c71312
-
SSDEEP
6144:NaNt/d72DNnUJq82dyLMg4beAnnBV7i/2oor6O744r0tyRZ/ha:NaNKH8LL8Lu/MIc/ha
Malware Config
Signatures
-
SectopRAT payload 1 IoCs
resource yara_rule behavioral1/memory/2200-117-0x0000000000D00000-0x0000000000DC6000-memory.dmp family_sectoprat -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Control Panel\International\Geo\Nation a6371d2dcf5b1652aac0bd322d479581a136ee874bfea3b907c67be7422e1ca6.exe -
Executes dropped EXE 4 IoCs
pid Process 1936 u1o.0.exe 2404 Qg_Appv5.exe 2828 ptInst.exe 3400 ptInst.exe -
Loads dropped DLL 8 IoCs
pid Process 2828 ptInst.exe 2828 ptInst.exe 2828 ptInst.exe 2828 ptInst.exe 3400 ptInst.exe 3400 ptInst.exe 3400 ptInst.exe 3400 ptInst.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3400 set thread context of 3492 3400 ptInst.exe 115 PID 3492 set thread context of 2200 3492 cmd.exe 117 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4412 1936 WerFault.exe 97 -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2404 Qg_Appv5.exe 2404 Qg_Appv5.exe 2404 Qg_Appv5.exe 2404 Qg_Appv5.exe 2828 ptInst.exe 3400 ptInst.exe 3400 ptInst.exe 3400 ptInst.exe 3492 cmd.exe 3492 cmd.exe 3492 cmd.exe 3492 cmd.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 3400 ptInst.exe 3492 cmd.exe 3492 cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2200 MSBuild.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 60 wrote to memory of 1936 60 a6371d2dcf5b1652aac0bd322d479581a136ee874bfea3b907c67be7422e1ca6.exe 97 PID 60 wrote to memory of 1936 60 a6371d2dcf5b1652aac0bd322d479581a136ee874bfea3b907c67be7422e1ca6.exe 97 PID 60 wrote to memory of 1936 60 a6371d2dcf5b1652aac0bd322d479581a136ee874bfea3b907c67be7422e1ca6.exe 97 PID 60 wrote to memory of 2404 60 a6371d2dcf5b1652aac0bd322d479581a136ee874bfea3b907c67be7422e1ca6.exe 112 PID 60 wrote to memory of 2404 60 a6371d2dcf5b1652aac0bd322d479581a136ee874bfea3b907c67be7422e1ca6.exe 112 PID 60 wrote to memory of 2404 60 a6371d2dcf5b1652aac0bd322d479581a136ee874bfea3b907c67be7422e1ca6.exe 112 PID 2404 wrote to memory of 2828 2404 Qg_Appv5.exe 113 PID 2404 wrote to memory of 2828 2404 Qg_Appv5.exe 113 PID 2404 wrote to memory of 2828 2404 Qg_Appv5.exe 113 PID 2828 wrote to memory of 3400 2828 ptInst.exe 114 PID 2828 wrote to memory of 3400 2828 ptInst.exe 114 PID 2828 wrote to memory of 3400 2828 ptInst.exe 114 PID 3400 wrote to memory of 3492 3400 ptInst.exe 115 PID 3400 wrote to memory of 3492 3400 ptInst.exe 115 PID 3400 wrote to memory of 3492 3400 ptInst.exe 115 PID 3400 wrote to memory of 3492 3400 ptInst.exe 115 PID 3492 wrote to memory of 2200 3492 cmd.exe 117 PID 3492 wrote to memory of 2200 3492 cmd.exe 117 PID 3492 wrote to memory of 2200 3492 cmd.exe 117 PID 3492 wrote to memory of 2200 3492 cmd.exe 117 PID 3492 wrote to memory of 2200 3492 cmd.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6371d2dcf5b1652aac0bd322d479581a136ee874bfea3b907c67be7422e1ca6.exe"C:\Users\Admin\AppData\Local\Temp\a6371d2dcf5b1652aac0bd322d479581a136ee874bfea3b907c67be7422e1ca6.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Users\Admin\AppData\Local\Temp\u1o.0.exe"C:\Users\Admin\AppData\Local\Temp\u1o.0.exe"2⤵
- Executes dropped EXE
PID:1936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1936 -s 10203⤵
- Program crash
PID:4412
-
-
-
C:\Users\Admin\AppData\Local\Temp\Qg_Appv5.exe"C:\Users\Admin\AppData\Local\Temp\Qg_Appv5.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\ptInst.exeC:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\ptInst.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Roaming\Uninstallcheck_alpha\ptInst.exeC:\Users\Admin\AppData\Roaming\Uninstallcheck_alpha\ptInst.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe5⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe6⤵
- Suspicious use of AdjustPrivilegeToken
PID:2200
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1936 -ip 19361⤵PID:1380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5303138fb758c391b79b61a78c990b35f
SHA1adebfa5d7df5a85d67d161d5e00bbbb2a90ab9d3
SHA256634df305d093a5c708ead6c7a1c07e4cc24b1a566423104ff3f8804eba14c4d1
SHA512154724a8742d25c18f84e633f9644e300dc7f3caf6fcb691b2a26e7d4bebeb87f9716230a8021a7840a9ae37596de1bf4815b69a27229e07b082d1a7f323d995
-
Filesize
7.6MB
MD5862bf3003dca41d88ac49a6846149623
SHA1b34f1d42dd0649d6b83f9a92124a554f48df0434
SHA25650c10789db130a98c63e6e7f6e23b1c89b38c5ea4678f1e06fd1796fba25c75c
SHA512fe5ab7888633dbfecca57ecd1732360796c2f19c62fc4282e2a92e9b8b440cc01e25b7a0c6a608cf9c2e9c9e3c49a8509a08851afcaef7e1afc21c0abcc2c969
-
Filesize
81KB
MD516b26bc43943531d7d7e379632ed4e63
SHA1565287de39649e59e653a3612478c2186096d70a
SHA256346f72c9a7584c2ab6ce65cd38a616c77ebddc0bbab2274c4e89dd5e62237517
SHA512b5b7b4b8c5ab4276a34956e43f586272b1803ec3609253fee1bcc0a549aed7ba11d47404b023f7b67af701726bab95cca55738e7bd5bca272eca5ac71bb418cc
-
Filesize
590KB
MD563206e3b4f1fa4dcfbe1f2cc5d0c4e9d
SHA1fe731b2e9c296d9ecc75ed96c2d29fe46c7cd924
SHA2568f5b8645b5e5ea48acc411b21a1b3cd56d2660ac931989b9f064c8ff82039885
SHA51232bdcce9e8e7f1ebe50e114f65f762391d52f482a112515ccb16b09653b93873528ea1a7473a2512075bf8f729997a65f455bf6599482e997b85e06a2f87f3d6
-
Filesize
79KB
MD58e1bbc6d6c4d207393b59853f73945ae
SHA1b66d632eae41267175bf5332d43a785dd929d79f
SHA256b04725aaa99b27e04c02bec7d98fb4511331ea53761272325fff9c27a679e279
SHA5121b45a7be00f54498df289641745ca6ee99e11d63100fb838b96c2d9412f8b5f0ea5aa8b964f32a4f9182cd599765f5ca08b91e8e8eecd06d1c53543284a59001
-
Filesize
427KB
MD571a0aa2d05e9174cefd568347bd9c70f
SHA1cb9247a0fa59e47f72df7d1752424b33a903bbb2
SHA256fdb3d86c512adff90967cb860d02a4682850ab96727f0376e4d4836504c50e47
SHA5126e65520528facaa4058720eb16d6bfdcc7bb36923b7e8e6551f3526709f0fabafab123999e618438e6abe7efed4a1332547cfc988f2b24b0e3d91198b95a911a
-
Filesize
938KB
MD5b15bac961f62448c872e1dc6d3931016
SHA11dcb61babb08fe5db711e379cb67335357a5db82
SHA256bf1a0c67b433f52ebd304553f022baa34bfbca258c932d2b4b8b956b1467bfa5
SHA512932119f7dc6710239481c80ad8baaed5c14a2085fcc514b6522671b1a4ebbaf488e43453f11d5aaf6dcef7a245db8de44d93ff255f7cf8385b7d00f31f2cc370
-
Filesize
1.3MB
MD53bee67dd0e04559c8fdc7761336dee47
SHA1027ef9dca01fb928db79e57b418130165f06ed5f
SHA25657745aba2885cf8bf770e7e9195697c05e35333417ca23af153367bf31cbf812
SHA51235fb66f98a57b0d14c3044a91abac3e0670d516edfd691d6670df034e8454c550d3d2e702ab90cd32b70fcba8aeb2e02b7b3a07b6a340a932738968473f77dce
-
Filesize
3.8MB
MD513418f74a7ce25cdd6997c9fcb718a0e
SHA1f4c880821fee72c37c882b1e8ebf100efcafe31c
SHA256a890935a36903669f35522c85c75e296404a4595453f060398cb64c5b0d6dfd0
SHA51259017162877bbbdf823450a946e3e54e9130d8ebbf5baba24471c68a10d1fad3452be08c693cd7a78d0bf2fcfd6d3086edeec1a379f9b53fd66bb246c128d4c1
-
Filesize
20KB
MD542c395b8db48b6ce3d34c301d1eba9d5
SHA1b7cfa3de344814bec105391663c0df4a74310996
SHA2565644546ecefc6786c7be5b1a89e935e640963ccd34b130f21baab9370cb9055d
SHA5127b9214db96e9bec8745b4161a41c4c0520cdda9950f0cd3f12c7744227a25d639d07c0dd68b552cf1e032181c2e4f8297747f27bad6c7447b0f415a86bd82845
-
Filesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
Filesize
269KB
MD53333a52d032e72c31330a918a0e24f9a
SHA1bd76b5d542e57408febed788ab5abc9744ae1ab9
SHA25670213293c1f8edfe66f9fc162a7a0dbac918b8be2b4601165395db5aca7f7a01
SHA512fd85cae19869a977d4f9e7dfcf28ad292316295a0c82bc0a7da044e9c9427071a71fbbbee1a47affaa2551a0171c111f8a462a0dc5a1b8f73487d5eae190fa23