Analysis
-
max time kernel
133s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
21-07-2024 13:43
Static task
static1
Behavioral task
behavioral1
Sample
SendBugReportNew.exe
Resource
win7-20240705-en
General
-
Target
SendBugReportNew.exe
-
Size
1.3MB
-
MD5
58717509c1521eacfcc7cda39e6bd45c
-
SHA1
5102dc3a82e8a2710ac67521f85f43f5296b5045
-
SHA256
d76d0650b630fdb70756a446e0a43672b5da1c2a74014118b02133923305da9a
-
SHA512
c637c2960b8a0bc111b408af05a0879d9a10f05d802ee7b8b9f115cb54606f76f4475375cecfa9fdb0518be0340b2c5bd23f8fe100dc21db88287a9227c0e69f
-
SSDEEP
24576:NpzWZ5CkBgB9IxAr7BptfYfG1inqCi2BZbqvWmAUlddWdBMTvNisj273HY:85CkyBbr7vbgHi2HAYwT1H274
Malware Config
Signatures
-
SectopRAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/236-90-0x0000000000400000-0x00000000004C6000-memory.dmp family_sectoprat -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
SendBugReportNew.execmd.exedescription pid process target process PID 1932 set thread context of 2380 1932 SendBugReportNew.exe cmd.exe PID 2380 set thread context of 236 2380 cmd.exe MSBuild.exe -
Executes dropped EXE 1 IoCs
Processes:
SendBugReportNew.exepid process 1932 SendBugReportNew.exe -
Loads dropped DLL 5 IoCs
Processes:
SendBugReportNew.exeSendBugReportNew.execmd.exepid process 2416 SendBugReportNew.exe 1932 SendBugReportNew.exe 1932 SendBugReportNew.exe 1932 SendBugReportNew.exe 2380 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
SendBugReportNew.exeSendBugReportNew.execmd.exeMSBuild.exepid process 2416 SendBugReportNew.exe 1932 SendBugReportNew.exe 1932 SendBugReportNew.exe 2380 cmd.exe 2380 cmd.exe 236 MSBuild.exe 236 MSBuild.exe 236 MSBuild.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
SendBugReportNew.execmd.exepid process 1932 SendBugReportNew.exe 2380 cmd.exe 2380 cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
MSBuild.exedescription pid process Token: SeDebugPrivilege 236 MSBuild.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
MSBuild.exepid process 236 MSBuild.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
SendBugReportNew.exeSendBugReportNew.execmd.exedescription pid process target process PID 2416 wrote to memory of 1932 2416 SendBugReportNew.exe SendBugReportNew.exe PID 2416 wrote to memory of 1932 2416 SendBugReportNew.exe SendBugReportNew.exe PID 2416 wrote to memory of 1932 2416 SendBugReportNew.exe SendBugReportNew.exe PID 2416 wrote to memory of 1932 2416 SendBugReportNew.exe SendBugReportNew.exe PID 2416 wrote to memory of 1932 2416 SendBugReportNew.exe SendBugReportNew.exe PID 2416 wrote to memory of 1932 2416 SendBugReportNew.exe SendBugReportNew.exe PID 2416 wrote to memory of 1932 2416 SendBugReportNew.exe SendBugReportNew.exe PID 1932 wrote to memory of 2380 1932 SendBugReportNew.exe cmd.exe PID 1932 wrote to memory of 2380 1932 SendBugReportNew.exe cmd.exe PID 1932 wrote to memory of 2380 1932 SendBugReportNew.exe cmd.exe PID 1932 wrote to memory of 2380 1932 SendBugReportNew.exe cmd.exe PID 1932 wrote to memory of 2380 1932 SendBugReportNew.exe cmd.exe PID 2380 wrote to memory of 236 2380 cmd.exe MSBuild.exe PID 2380 wrote to memory of 236 2380 cmd.exe MSBuild.exe PID 2380 wrote to memory of 236 2380 cmd.exe MSBuild.exe PID 2380 wrote to memory of 236 2380 cmd.exe MSBuild.exe PID 2380 wrote to memory of 236 2380 cmd.exe MSBuild.exe PID 2380 wrote to memory of 236 2380 cmd.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SendBugReportNew.exe"C:\Users\Admin\AppData\Local\Temp\SendBugReportNew.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Roaming\Aprsvc_dbg\SendBugReportNew.exeC:\Users\Admin\AppData\Roaming\Aprsvc_dbg\SendBugReportNew.exe2⤵
- Suspicious use of SetThreadContext
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe3⤵
- Suspicious use of SetThreadContext
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD59ad16c0cef31d1dc960f827994734297
SHA176d25eda9401aeb7a60c088ff5481174087b313c
SHA25668f3353fe82c333a4dfaf73be05c539ee4d46d92bc786fc97b6129a1e5aef9cb
SHA5128c41269f1d22043c3d0efc4aa4d53039b36da5069b7981219fbfc8d7ac1fe4af57d33d82999b568c5b4f724c47869968105c0c3c0a0675d9654762c7e3a76f84
-
Filesize
20KB
MD5c9ff7748d8fcef4cf84a5501e996a641
SHA102867e5010f62f97ebb0cfb32cb3ede9449fe0c9
SHA2564d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988
SHA512d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73
-
Filesize
1.3MB
MD558717509c1521eacfcc7cda39e6bd45c
SHA15102dc3a82e8a2710ac67521f85f43f5296b5045
SHA256d76d0650b630fdb70756a446e0a43672b5da1c2a74014118b02133923305da9a
SHA512c637c2960b8a0bc111b408af05a0879d9a10f05d802ee7b8b9f115cb54606f76f4475375cecfa9fdb0518be0340b2c5bd23f8fe100dc21db88287a9227c0e69f
-
Filesize
24KB
MD5dc8b747af5a4a6f530933d0d204306cc
SHA10577922289562a05082ea5ff5ddc0169c4174615
SHA256d8f4dd80780a30fc288f02bae15bec50056b9becd3bf7e0973b65360828938f6
SHA5125665d922e44dad98764cb72911830ee89687a801564c5349b7fcda1b5423413c0e5740381e0f998cf23bbe60a9bbeda6606d5c2bc660d84bd74260439960ec50
-
Filesize
1.2MB
MD563f2bc904f3f7ce92603300cebc3d2fa
SHA13aaeca63b2a4a3d559c7222e618dcf5f97912713
SHA256b74bb36aff597e53ad3ab3f5ac11ba2f25ff9b4bef8c3ea82f528bb44d34f16c
SHA51265d342f422f17f021e481d4e6262980a03a533a5b98b0c8be6791b9cdcbfc977dee71ab8b5f4a2532f084e8c18adac3b4ea75a5fd501603fcab2ab62ae4ee45b
-
Filesize
1.1MB
MD5e71e48e31ac728a6de7c020645f0c32f
SHA17f86eadd1b7a0ab87b7ce7c2029bdef3d6fe1d8d
SHA25640a1d1a2f276738f568700ddccac99cdcd35b973fc8be86ab826c0d1abc9d6ff
SHA5125e41dbe7efac8a042a14c2f976d1afcd45e3f7531fb60daab61ac17ffd339d34e1c6746fce9e4b591b026598a89e38f36c6d24e33e2de0b39d81806259f9be2a
-
Filesize
223KB
MD58aaa3926885b3fa7ae0448f5e700cb79
SHA147bd7d281ddde5ebef8599482212743bf2f7e67b
SHA25647396c301fbe78bfaf9e344936a0f7a4e6d174c096f847e160d822e48012162d
SHA51286d395ca89ec2a988f035ecb32640ddac99247e2568673246388fe310e8c3a44807049e8f3482fae86c453d5e3529a8f2daf8614a1086b6d979e64fd917bbe3a
-
Filesize
1.9MB
MD5a71bbdfc5c36bdd147abd55a778a63b6
SHA17416783dce8fe1963e20fd527c1b8e1ab30ef83c
SHA2568c6ff2c73cb991db66ecab6de2214f39c1ae1e8138bde88168daa04be077ef48
SHA512193fef09a77711d6f38ff52b4316948b274c4484c6f4556e55a13db32cee79549ff71cbb59965ccd560f81c43295625016e9bdcefe8f6ac5554746e021d3f66f