Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/04/2024, 20:48

General

  • Target

    a6371d2dcf5b1652aac0bd322d479581a136ee874bfea3b907c67be7422e1ca6.exe

  • Size

    414KB

  • MD5

    52c28f353ec729be591d6c1c10f03f21

  • SHA1

    3067357a993f0ba851cfcce39953245d1d69c78c

  • SHA256

    a6371d2dcf5b1652aac0bd322d479581a136ee874bfea3b907c67be7422e1ca6

  • SHA512

    e2ff0628dc2603f5f33be82f4abf5cc81296d20bee674212132d14e2cc16a3863aa81cd5982d776a58122f46ed91b798965b4a1fbee9149cf005117506c71312

  • SSDEEP

    6144:NaNt/d72DNnUJq82dyLMg4beAnnBV7i/2oor6O744r0tyRZ/ha:NaNKH8LL8Lu/MIc/ha

Malware Config

Signatures

  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a6371d2dcf5b1652aac0bd322d479581a136ee874bfea3b907c67be7422e1ca6.exe
    "C:\Users\Admin\AppData\Local\Temp\a6371d2dcf5b1652aac0bd322d479581a136ee874bfea3b907c67be7422e1ca6.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:60
    • C:\Users\Admin\AppData\Local\Temp\u1o.0.exe
      "C:\Users\Admin\AppData\Local\Temp\u1o.0.exe"
      2⤵
      • Executes dropped EXE
      PID:1936
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1936 -s 1020
        3⤵
        • Program crash
        PID:4412
    • C:\Users\Admin\AppData\Local\Temp\Qg_Appv5.exe
      "C:\Users\Admin\AppData\Local\Temp\Qg_Appv5.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2404
      • C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\ptInst.exe
        C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\ptInst.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2828
        • C:\Users\Admin\AppData\Roaming\Uninstallcheck_alpha\ptInst.exe
          C:\Users\Admin\AppData\Roaming\Uninstallcheck_alpha\ptInst.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:3400
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\SysWOW64\cmd.exe
            5⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:3492
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              6⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:2200
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1936 -ip 1936
    1⤵
      PID:1380

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\590807a

      Filesize

      1.4MB

      MD5

      303138fb758c391b79b61a78c990b35f

      SHA1

      adebfa5d7df5a85d67d161d5e00bbbb2a90ab9d3

      SHA256

      634df305d093a5c708ead6c7a1c07e4cc24b1a566423104ff3f8804eba14c4d1

      SHA512

      154724a8742d25c18f84e633f9644e300dc7f3caf6fcb691b2a26e7d4bebeb87f9716230a8021a7840a9ae37596de1bf4815b69a27229e07b082d1a7f323d995

    • C:\Users\Admin\AppData\Local\Temp\Qg_Appv5.exe

      Filesize

      7.6MB

      MD5

      862bf3003dca41d88ac49a6846149623

      SHA1

      b34f1d42dd0649d6b83f9a92124a554f48df0434

      SHA256

      50c10789db130a98c63e6e7f6e23b1c89b38c5ea4678f1e06fd1796fba25c75c

      SHA512

      fe5ab7888633dbfecca57ecd1732360796c2f19c62fc4282e2a92e9b8b440cc01e25b7a0c6a608cf9c2e9c9e3c49a8509a08851afcaef7e1afc21c0abcc2c969

    • C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\VCRUNTIME140.dll

      Filesize

      81KB

      MD5

      16b26bc43943531d7d7e379632ed4e63

      SHA1

      565287de39649e59e653a3612478c2186096d70a

      SHA256

      346f72c9a7584c2ab6ce65cd38a616c77ebddc0bbab2274c4e89dd5e62237517

      SHA512

      b5b7b4b8c5ab4276a34956e43f586272b1803ec3609253fee1bcc0a549aed7ba11d47404b023f7b67af701726bab95cca55738e7bd5bca272eca5ac71bb418cc

    • C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\WCLDll.dll

      Filesize

      590KB

      MD5

      63206e3b4f1fa4dcfbe1f2cc5d0c4e9d

      SHA1

      fe731b2e9c296d9ecc75ed96c2d29fe46c7cd924

      SHA256

      8f5b8645b5e5ea48acc411b21a1b3cd56d2660ac931989b9f064c8ff82039885

      SHA512

      32bdcce9e8e7f1ebe50e114f65f762391d52f482a112515ccb16b09653b93873528ea1a7473a2512075bf8f729997a65f455bf6599482e997b85e06a2f87f3d6

    • C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\cosmetician.mpeg

      Filesize

      79KB

      MD5

      8e1bbc6d6c4d207393b59853f73945ae

      SHA1

      b66d632eae41267175bf5332d43a785dd929d79f

      SHA256

      b04725aaa99b27e04c02bec7d98fb4511331ea53761272325fff9c27a679e279

      SHA512

      1b45a7be00f54498df289641745ca6ee99e11d63100fb838b96c2d9412f8b5f0ea5aa8b964f32a4f9182cd599765f5ca08b91e8e8eecd06d1c53543284a59001

    • C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\msvcp140.dll

      Filesize

      427KB

      MD5

      71a0aa2d05e9174cefd568347bd9c70f

      SHA1

      cb9247a0fa59e47f72df7d1752424b33a903bbb2

      SHA256

      fdb3d86c512adff90967cb860d02a4682850ab96727f0376e4d4836504c50e47

      SHA512

      6e65520528facaa4058720eb16d6bfdcc7bb36923b7e8e6551f3526709f0fabafab123999e618438e6abe7efed4a1332547cfc988f2b24b0e3d91198b95a911a

    • C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\ptInst.exe

      Filesize

      938KB

      MD5

      b15bac961f62448c872e1dc6d3931016

      SHA1

      1dcb61babb08fe5db711e379cb67335357a5db82

      SHA256

      bf1a0c67b433f52ebd304553f022baa34bfbca258c932d2b4b8b956b1467bfa5

      SHA512

      932119f7dc6710239481c80ad8baaed5c14a2085fcc514b6522671b1a4ebbaf488e43453f11d5aaf6dcef7a245db8de44d93ff255f7cf8385b7d00f31f2cc370

    • C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\quersprung.vhd

      Filesize

      1.3MB

      MD5

      3bee67dd0e04559c8fdc7761336dee47

      SHA1

      027ef9dca01fb928db79e57b418130165f06ed5f

      SHA256

      57745aba2885cf8bf770e7e9195697c05e35333417ca23af153367bf31cbf812

      SHA512

      35fb66f98a57b0d14c3044a91abac3e0670d516edfd691d6670df034e8454c550d3d2e702ab90cd32b70fcba8aeb2e02b7b3a07b6a340a932738968473f77dce

    • C:\Users\Admin\AppData\Local\Temp\f611aac9

      Filesize

      3.8MB

      MD5

      13418f74a7ce25cdd6997c9fcb718a0e

      SHA1

      f4c880821fee72c37c882b1e8ebf100efcafe31c

      SHA256

      a890935a36903669f35522c85c75e296404a4595453f060398cb64c5b0d6dfd0

      SHA512

      59017162877bbbdf823450a946e3e54e9130d8ebbf5baba24471c68a10d1fad3452be08c693cd7a78d0bf2fcfd6d3086edeec1a379f9b53fd66bb246c128d4c1

    • C:\Users\Admin\AppData\Local\Temp\tmp4F12.tmp

      Filesize

      20KB

      MD5

      42c395b8db48b6ce3d34c301d1eba9d5

      SHA1

      b7cfa3de344814bec105391663c0df4a74310996

      SHA256

      5644546ecefc6786c7be5b1a89e935e640963ccd34b130f21baab9370cb9055d

      SHA512

      7b9214db96e9bec8745b4161a41c4c0520cdda9950f0cd3f12c7744227a25d639d07c0dd68b552cf1e032181c2e4f8297747f27bad6c7447b0f415a86bd82845

    • C:\Users\Admin\AppData\Local\Temp\tmp4F35.tmp

      Filesize

      20KB

      MD5

      49693267e0adbcd119f9f5e02adf3a80

      SHA1

      3ba3d7f89b8ad195ca82c92737e960e1f2b349df

      SHA256

      d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f

      SHA512

      b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2

    • C:\Users\Admin\AppData\Local\Temp\u1o.0.exe

      Filesize

      269KB

      MD5

      3333a52d032e72c31330a918a0e24f9a

      SHA1

      bd76b5d542e57408febed788ab5abc9744ae1ab9

      SHA256

      70213293c1f8edfe66f9fc162a7a0dbac918b8be2b4601165395db5aca7f7a01

      SHA512

      fd85cae19869a977d4f9e7dfcf28ad292316295a0c82bc0a7da044e9c9427071a71fbbbee1a47affaa2551a0171c111f8a462a0dc5a1b8f73487d5eae190fa23

    • memory/60-3-0x0000000000400000-0x0000000002C4A000-memory.dmp

      Filesize

      40.3MB

    • memory/60-2-0x0000000002DD0000-0x0000000002E3E000-memory.dmp

      Filesize

      440KB

    • memory/60-22-0x0000000000400000-0x0000000002C4A000-memory.dmp

      Filesize

      40.3MB

    • memory/60-7-0x0000000002DD0000-0x0000000002E3E000-memory.dmp

      Filesize

      440KB

    • memory/60-5-0x0000000002E80000-0x0000000002F80000-memory.dmp

      Filesize

      1024KB

    • memory/60-99-0x0000000000400000-0x0000000002C4A000-memory.dmp

      Filesize

      40.3MB

    • memory/60-1-0x0000000002E80000-0x0000000002F80000-memory.dmp

      Filesize

      1024KB

    • memory/60-4-0x0000000000400000-0x0000000002C4A000-memory.dmp

      Filesize

      40.3MB

    • memory/1936-18-0x0000000002DE0000-0x0000000002EE0000-memory.dmp

      Filesize

      1024KB

    • memory/1936-19-0x0000000002DA0000-0x0000000002DC7000-memory.dmp

      Filesize

      156KB

    • memory/1936-20-0x0000000000400000-0x0000000002C26000-memory.dmp

      Filesize

      40.1MB

    • memory/1936-21-0x0000000000400000-0x0000000002C26000-memory.dmp

      Filesize

      40.1MB

    • memory/2200-126-0x0000000006100000-0x000000000611E000-memory.dmp

      Filesize

      120KB

    • memory/2200-124-0x00000000055C0000-0x0000000005636000-memory.dmp

      Filesize

      472KB

    • memory/2200-125-0x00000000065E0000-0x0000000006B0C000-memory.dmp

      Filesize

      5.2MB

    • memory/2200-123-0x0000000005470000-0x00000000054C0000-memory.dmp

      Filesize

      320KB

    • memory/2200-122-0x0000000005710000-0x00000000058D2000-memory.dmp

      Filesize

      1.8MB

    • memory/2200-121-0x0000000005530000-0x0000000005540000-memory.dmp

      Filesize

      64KB

    • memory/2200-120-0x0000000005A00000-0x0000000005FA4000-memory.dmp

      Filesize

      5.6MB

    • memory/2200-119-0x00000000053B0000-0x0000000005442000-memory.dmp

      Filesize

      584KB

    • memory/2200-127-0x0000000006210000-0x0000000006276000-memory.dmp

      Filesize

      408KB

    • memory/2200-118-0x0000000073480000-0x0000000073C30000-memory.dmp

      Filesize

      7.7MB

    • memory/2200-117-0x0000000000D00000-0x0000000000DC6000-memory.dmp

      Filesize

      792KB

    • memory/2200-113-0x00000000717B0000-0x0000000072A04000-memory.dmp

      Filesize

      18.3MB

    • memory/2404-40-0x0000000000400000-0x0000000000BEB000-memory.dmp

      Filesize

      7.9MB

    • memory/2404-41-0x0000000004260000-0x0000000004261000-memory.dmp

      Filesize

      4KB

    • memory/2404-47-0x0000000072E20000-0x0000000072F9B000-memory.dmp

      Filesize

      1.5MB

    • memory/2404-48-0x00007FF8B9650000-0x00007FF8B9845000-memory.dmp

      Filesize

      2.0MB

    • memory/2404-51-0x0000000072E20000-0x0000000072F9B000-memory.dmp

      Filesize

      1.5MB

    • memory/2404-58-0x0000000072E20000-0x0000000072F9B000-memory.dmp

      Filesize

      1.5MB

    • memory/2404-101-0x0000000000400000-0x0000000000BEB000-memory.dmp

      Filesize

      7.9MB

    • memory/2404-100-0x0000000072E20000-0x0000000072F9B000-memory.dmp

      Filesize

      1.5MB

    • memory/2404-64-0x0000000072E20000-0x0000000072F9B000-memory.dmp

      Filesize

      1.5MB

    • memory/2828-77-0x00007FF8B9650000-0x00007FF8B9845000-memory.dmp

      Filesize

      2.0MB

    • memory/2828-76-0x0000000072E20000-0x0000000072F9B000-memory.dmp

      Filesize

      1.5MB

    • memory/3400-98-0x0000000072E20000-0x0000000072F9B000-memory.dmp

      Filesize

      1.5MB

    • memory/3400-96-0x0000000072E20000-0x0000000072F9B000-memory.dmp

      Filesize

      1.5MB

    • memory/3400-97-0x00007FF8B9650000-0x00007FF8B9845000-memory.dmp

      Filesize

      2.0MB

    • memory/3400-102-0x0000000072E20000-0x0000000072F9B000-memory.dmp

      Filesize

      1.5MB

    • memory/3492-104-0x0000000072E20000-0x0000000072F9B000-memory.dmp

      Filesize

      1.5MB

    • memory/3492-114-0x0000000072E20000-0x0000000072F9B000-memory.dmp

      Filesize

      1.5MB

    • memory/3492-110-0x0000000072E20000-0x0000000072F9B000-memory.dmp

      Filesize

      1.5MB

    • memory/3492-109-0x0000000072E20000-0x0000000072F9B000-memory.dmp

      Filesize

      1.5MB

    • memory/3492-106-0x00007FF8B9650000-0x00007FF8B9845000-memory.dmp

      Filesize

      2.0MB