Resubmissions
Analysis
-
max time kernel
299s -
max time network
204s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2024 18:40
Behavioral task
behavioral1
Sample
sheet rat v2.6/Server.exe
Resource
win10v2004-20240426-en
General
-
Target
sheet rat v2.6/Server.exe
-
Size
1.3MB
-
MD5
dd6667db55acaefa2d7e99dcf5d97a26
-
SHA1
c1b281ef573df4da584294c61b5322edfed589ad
-
SHA256
ce8fd5ec0b2ee4e5d87d35622eeaa022ee971801c97bcb3726ca6ebe4b576238
-
SHA512
916c8b63400c0a8e495fc59d8e348499a6f04421e79599803c7ac4cd828c82f389bfd733471de27cc1643c03723429f8544446d9adc69082e6a5032139a1f1f1
-
SSDEEP
24576:RIVMEFyWLoQJV+fLmomlEkmmsEnE7E7E7EUmemmmmmmIDmeIjwnaKk:RWMEMWlVILmomSkmmtEQQQUmemmmmmm7
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
Processes:
Server.exepid process 1524 Server.exe 1524 Server.exe 1524 Server.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Modifies registry class 1 IoCs
Processes:
taskmgr.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000_Classes\Local Settings taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
taskmgr.exepid process 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
Server.exetaskmgr.exesvchost.exedescription pid process Token: SeDebugPrivilege 1524 Server.exe Token: SeDebugPrivilege 5104 taskmgr.exe Token: SeSystemProfilePrivilege 5104 taskmgr.exe Token: SeCreateGlobalPrivilege 5104 taskmgr.exe Token: SeBackupPrivilege 1440 svchost.exe Token: SeRestorePrivilege 1440 svchost.exe Token: SeSecurityPrivilege 1440 svchost.exe Token: SeTakeOwnershipPrivilege 1440 svchost.exe Token: 35 1440 svchost.exe Token: 33 5104 taskmgr.exe Token: SeIncBasePriorityPrivilege 5104 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
Server.exetaskmgr.exepid process 1524 Server.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exepid process 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe 5104 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\sheet rat v2.6\Server.exe"C:\Users\Admin\AppData\Local\Temp\sheet rat v2.6\Server.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SDRSVC1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\GMap.NET\DllCache\SQLite_v98_NET4_x86\System.Data.SQLite.DLLFilesize
1.3MB
MD514393eb908e072fa3164597414bb0a75
SHA15e04e084ec44a0b29196d0c21213201240f11ba0
SHA25659b9d95ae42e35525fc63f93168fe304409463ee070a3cf21a427a2833564b80
SHA512f5fc3d9e98cca1fbbbe026707086a71f801016348d2355541d630879ad51a850f49eb4a5f7a94e12a844d7a7108d69fa6d762ee19f4805d6aafef16259b4330b
-
C:\Users\Admin\AppData\Local\Server\Server.exe_Url_021lj33rcddyjphptsucz0cmlfgti4gg\1.0.0.0\lt0pgh22.newcfgFilesize
561B
MD52e8ab7cdc2081c09a98f6c5593909409
SHA1282769c943f8ab0429315869466d042a99de95f4
SHA25617eee8708a1bbc35422e6ad9b6eff3bec4f8a8b8a87cce8e6cc0da2d94c9b3ae
SHA512b815e0deaea5348d5ec68cdba3e4b5018e6224299f170859181f90961831b7d14deda144b32d64b11f8da7f4cbdb0b86a8d253b0ee179df68baac274a363ef2a
-
C:\Users\Admin\AppData\Local\Server\Server.exe_Url_021lj33rcddyjphptsucz0cmlfgti4gg\1.0.0.0\user.configFilesize
311B
MD5a35bc67d130a4fb76c2c2831cbdddd55
SHA166502423bba03870522e50608212b6ee27ebf4c5
SHA256e94a97e512fbc8ed9f5691d921fdeddbff4cc16b024c5335adf66bff3a7a8192
SHA5124401b234d7914afa860e356be1667cc5f44402255f7cc6cc3d8df80883167f6b55463e62156df57be697ee501897fac61a71f97911c6fdb6630272341ac8a07e
-
C:\Users\Admin\AppData\Local\Server\Server.exe_Url_021lj33rcddyjphptsucz0cmlfgti4gg\1.0.0.0\user.configFilesize
434B
MD5cfcf8e91857f364e002065c52ff8f91c
SHA18407ecb3c33a1f3fcf18a723e6884acf7e5a0f4a
SHA256572dda8c7f211dc6a4efc7aecb4a54cb4e0ced1e4c9a4b9f96bb329c983c64e6
SHA512364fecac3a051441b4fefcebb2cc9e38632f99dd04593cd5d9b148986afb09b195e88cdbfa2e778b8934564b76d04fe053f919f0a60769b023f2f753ede06d1e
-
C:\Users\Admin\AppData\Local\Server\Server.exe_Url_021lj33rcddyjphptsucz0cmlfgti4gg\1.0.0.0\user.configFilesize
687B
MD5b18785caae8834f89e34cde89b93cafc
SHA1cee194149b484295ddba88111a251986bdc0c7af
SHA256105971bbe15f24f50dad97d466b55222e52dfdb4a71b1b3a6452cfba28a10811
SHA512fb108e2997a0ea7bce21113118997f358d73a43a40e2b4b9962738cd88dc6d9dfc17e17e63c8ba8c5a5504e5775fbe9e8084ee8e6086cf0eab709335ed8b282c
-
memory/1524-10-0x0000000008E70000-0x0000000008E9C000-memory.dmpFilesize
176KB
-
memory/1524-80-0x000000000E9A0000-0x000000000EA52000-memory.dmpFilesize
712KB
-
memory/1524-7-0x00000000750F0000-0x00000000758A0000-memory.dmpFilesize
7.7MB
-
memory/1524-8-0x0000000008170000-0x000000000821A000-memory.dmpFilesize
680KB
-
memory/1524-9-0x00000000750F0000-0x00000000758A0000-memory.dmpFilesize
7.7MB
-
memory/1524-0-0x00000000750FE000-0x00000000750FF000-memory.dmpFilesize
4KB
-
memory/1524-11-0x0000000009190000-0x0000000009472000-memory.dmpFilesize
2.9MB
-
memory/1524-12-0x0000000009760000-0x0000000009AB4000-memory.dmpFilesize
3.3MB
-
memory/1524-13-0x0000000008F00000-0x0000000008F22000-memory.dmpFilesize
136KB
-
memory/1524-5-0x0000000005F80000-0x00000000061D2000-memory.dmpFilesize
2.3MB
-
memory/1524-18-0x0000000008F40000-0x000000000908B000-memory.dmpFilesize
1.3MB
-
memory/1524-30-0x00000000090A0000-0x00000000090EC000-memory.dmpFilesize
304KB
-
memory/1524-31-0x00000000750F0000-0x00000000758A0000-memory.dmpFilesize
7.7MB
-
memory/1524-4-0x0000000005430000-0x00000000054C2000-memory.dmpFilesize
584KB
-
memory/1524-3-0x0000000004FF0000-0x000000000504C000-memory.dmpFilesize
368KB
-
memory/1524-2-0x00000000055A0000-0x0000000005B44000-memory.dmpFilesize
5.6MB
-
memory/1524-1-0x00000000004C0000-0x0000000000608000-memory.dmpFilesize
1.3MB
-
memory/1524-69-0x00000000096C0000-0x00000000096FC000-memory.dmpFilesize
240KB
-
memory/1524-70-0x0000000009680000-0x00000000096A1000-memory.dmpFilesize
132KB
-
memory/1524-6-0x0000000005410000-0x000000000541A000-memory.dmpFilesize
40KB
-
memory/1524-81-0x00000000750FE000-0x00000000750FF000-memory.dmpFilesize
4KB
-
memory/1524-82-0x00000000750F0000-0x00000000758A0000-memory.dmpFilesize
7.7MB
-
memory/1524-83-0x00000000750F0000-0x00000000758A0000-memory.dmpFilesize
7.7MB
-
memory/1524-84-0x00000000750F0000-0x00000000758A0000-memory.dmpFilesize
7.7MB
-
memory/1524-85-0x00000000750F0000-0x00000000758A0000-memory.dmpFilesize
7.7MB
-
memory/1524-86-0x00000000750F0000-0x00000000758A0000-memory.dmpFilesize
7.7MB
-
memory/1524-101-0x000000000AF50000-0x000000000B072000-memory.dmpFilesize
1.1MB
-
memory/5104-87-0x00000180EAA90000-0x00000180EAA91000-memory.dmpFilesize
4KB
-
memory/5104-88-0x00000180EAA90000-0x00000180EAA91000-memory.dmpFilesize
4KB
-
memory/5104-99-0x00000180EAA90000-0x00000180EAA91000-memory.dmpFilesize
4KB
-
memory/5104-98-0x00000180EAA90000-0x00000180EAA91000-memory.dmpFilesize
4KB
-
memory/5104-97-0x00000180EAA90000-0x00000180EAA91000-memory.dmpFilesize
4KB
-
memory/5104-96-0x00000180EAA90000-0x00000180EAA91000-memory.dmpFilesize
4KB
-
memory/5104-95-0x00000180EAA90000-0x00000180EAA91000-memory.dmpFilesize
4KB
-
memory/5104-94-0x00000180EAA90000-0x00000180EAA91000-memory.dmpFilesize
4KB
-
memory/5104-93-0x00000180EAA90000-0x00000180EAA91000-memory.dmpFilesize
4KB
-
memory/5104-89-0x00000180EAA90000-0x00000180EAA91000-memory.dmpFilesize
4KB