Analysis

  • max time kernel
    136s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/10/2024, 02:37

General

  • Target

    8ae2402f1925ee78bdf48ce3cf3e7eebecaaf26c4a45ccc105d6beb735657f31.exe

  • Size

    1.6MB

  • MD5

    2223a0c17bc8ec63cd6d3647995978e9

  • SHA1

    c58e7e26863a557c820515a0eaa5fd5c9d56d0dc

  • SHA256

    8ae2402f1925ee78bdf48ce3cf3e7eebecaaf26c4a45ccc105d6beb735657f31

  • SHA512

    9028d4ff22e59be9d16e3ebd4b3e3a9c1a22a4d272a7840aae55fb3614b3e008409684e9d229ac979244db0212e768255c0e7202f6f0e6fbf49ec92d2a31ea1a

  • SSDEEP

    49152:4IGLOBaxpDPkpx+8dV7YrrofrpR44cGwNPz6CL:JGLOBa3DspZokf1e49wNn

Malware Config

Signatures

  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3464
      • C:\Users\Admin\AppData\Local\Temp\8ae2402f1925ee78bdf48ce3cf3e7eebecaaf26c4a45ccc105d6beb735657f31.exe
        "C:\Users\Admin\AppData\Local\Temp\8ae2402f1925ee78bdf48ce3cf3e7eebecaaf26c4a45ccc105d6beb735657f31.exe"
        2⤵
        • Checks computer location settings
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1248
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c copy Trunk Trunk.bat & Trunk.bat
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3276
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:2932
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "wrsa opssvc"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:876
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:1936
          • C:\Windows\SysWOW64\findstr.exe
            findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:5024
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c md 32532
            4⤵
            • System Location Discovery: System Language Discovery
            PID:4868
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V "CLOCKCLERKINVOICETOUCHED" Circuits
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1432
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c copy /b ..\Oman + ..\Website + ..\Wallace + ..\Aspnet + ..\Throughout + ..\Sell + ..\Seminar + ..\Whatever + ..\Sold + ..\Fragrances + ..\Dell + ..\European + ..\Ons + ..\Bleeding Q
            4⤵
            • System Location Discovery: System Language Discovery
            PID:4528
          • C:\Users\Admin\AppData\Local\Temp\32532\Roll.pif
            Roll.pif Q
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:212
            • C:\Users\Admin\AppData\Local\Temp\32532\RegAsm.exe
              C:\Users\Admin\AppData\Local\Temp\32532\RegAsm.exe
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:3612
          • C:\Windows\SysWOW64\choice.exe
            choice /d y /t 5
            4⤵
            • System Location Discovery: System Language Discovery
            PID:4068
      • C:\Windows\SysWOW64\cmd.exe
        cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Finestitch.url" & echo URL="C:\Users\Admin\AppData\Local\StitchCraft Studios Co\Finestitch.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Finestitch.url" & exit
        2⤵
        • Drops startup file
        • System Location Discovery: System Language Discovery
        PID:4220

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\32532\Q

      Filesize

      1.0MB

      MD5

      5480fc219eccd0b8b4bf09943c7847eb

      SHA1

      b67357550a3519cb871d7e634986b28c8dcab00e

      SHA256

      dcc000d89c76c655d20184e9cd4d6af56621a25f876569b518634fae1e371b9b

      SHA512

      733ee994cd3609f58a16d130bbb685a93dfdda4e5a096679d023d7d5d174d7c87f336da3d2f7d7633d6292babbaf862107f3d0ff8aa7225029745ec2c30fd5d7

    • C:\Users\Admin\AppData\Local\Temp\32532\RegAsm.exe

      Filesize

      63KB

      MD5

      0d5df43af2916f47d00c1573797c1a13

      SHA1

      230ab5559e806574d26b4c20847c368ed55483b0

      SHA256

      c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc

      SHA512

      f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2

    • C:\Users\Admin\AppData\Local\Temp\32532\Roll.pif

      Filesize

      872KB

      MD5

      18ce19b57f43ce0a5af149c96aecc685

      SHA1

      1bd5ca29fc35fc8ac346f23b155337c5b28bbc36

      SHA256

      d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd

      SHA512

      a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558

    • C:\Users\Admin\AppData\Local\Temp\Aspnet

      Filesize

      67KB

      MD5

      fe434652b460c55ce1d0b5779837949a

      SHA1

      21d08a61e1c37a95d85cb1d8f8a3b0af69f3c497

      SHA256

      895fb6905acc8dc012aef7cea7eb8da70f2e5c18551b3a2483d14f5c6f463162

      SHA512

      d14aac52dc6515da01a0eda1f57a3ed8e5e53ebda64f94695a322264fbe83d5a7f8dafaa52db6c4c6598e0315499254b2952f88a78b18b67f8be74681597b5a7

    • C:\Users\Admin\AppData\Local\Temp\Bleeding

      Filesize

      9KB

      MD5

      49d8897654e0aa5fca771920893d8fde

      SHA1

      216ec1a49c310518474d6ae01d165e0964349568

      SHA256

      63c99a200bf8ed5074d7cd7c05e81cbb181155221f1b039c6c8c29ebc4e7ceaa

      SHA512

      fee1443ba44b85d61a9399a0df596c4708c1991b35c9963c2c081796f463e4c04ea1e457cf1197e4865015deadbbedae859281e80b7da401229392999062e0f9

    • C:\Users\Admin\AppData\Local\Temp\Circuits

      Filesize

      6KB

      MD5

      5b654b7a9f0d473fedcad739b57e9cab

      SHA1

      b1f5e75885c13ee8eefe37dc72626bd95b14b97a

      SHA256

      497a2bfc82406f8c5a202b44ee9db49c07198e17818f33594522bfd8900e2ca7

      SHA512

      73ebc11d1665c4839aaba67c8b081550701c5664eadf1a4a5c9412180e36354dec967856e3e952bf405dd5c3da962bfaf1b379afc086829fec93ef9b9139201a

    • C:\Users\Admin\AppData\Local\Temp\Dell

      Filesize

      61KB

      MD5

      5dd7820ed939fc1fbe869093cdfa91e6

      SHA1

      de119754858a2e3eac528a1ff00e620f5a630249

      SHA256

      fd6c58944be09672bd2b6ae98533d166604fc36ede596420cf3a02bfb7d75e53

      SHA512

      81700cbb347b0e6d4ae6837113d3b8f1081f890d70cb98823e43491c861da02ca09319afff93abe4f5b7c90bf7846d924b24ebc0d66bb569253bd1d3d2ab72c4

    • C:\Users\Admin\AppData\Local\Temp\European

      Filesize

      63KB

      MD5

      a8117bb93e7acca6e0cc3c0030a9d720

      SHA1

      9bfde33c8a2bbcd24c1016f2638bb42641dc709a

      SHA256

      e887d12050cbc33ca3c6bc37a57350c5637fb6e536c6bd711259f0332bd506f5

      SHA512

      a26a73f9bf9c531f798489ac89e1ba0c1bbed57c4581beaa55f282e880dcad68d4c1b13e93ac1be4db409b2509584f0ac67dcadc58c7f26c6b9d8db6418ecac0

    • C:\Users\Admin\AppData\Local\Temp\Fragrances

      Filesize

      79KB

      MD5

      f89797c5e269dbe4992495accbe23de5

      SHA1

      84e2ed229135c5b175d92143277217e68b9410d4

      SHA256

      241c6a7e7b669c51c47317a6aaa5c0edd622380c30ee24d33e46bd674a1842d8

      SHA512

      524f90d008f007126de7d3ad09fccaad9be1cacd85f27f2e97af01e8585014e2b74798f72bb127b6276f8d21f9153d090c0f6d4db248020dd49d99794a37b623

    • C:\Users\Admin\AppData\Local\Temp\Hacker

      Filesize

      865KB

      MD5

      065cf0decfa83093496850d42f51e15b

      SHA1

      6e48c54aa7ff58e4ddf2ca3f352c6ec2d4cc9bdb

      SHA256

      accb2c5c0ffd1a41829912221368fe1563e074a75d133547c4b9d4f349d4c3de

      SHA512

      3d329ca31b85068a5c86c1f3a944ab67e80f0805cc3a3702979853eba33d213fccd8d16058a20ef42b6099bdd9e9faeb36427538f021fb523bb6a0a6862da12d

    • C:\Users\Admin\AppData\Local\Temp\Oman

      Filesize

      99KB

      MD5

      8689ebddc13430c0d8bc5164f329e774

      SHA1

      bab95927c3ff22e0637780738c716aeb731d3889

      SHA256

      16219af735612ff079539d3b2757a03b120133db70d8fc8d7bf9b74011c1c509

      SHA512

      108985043dfd83a05c2720b66d6688ba2f3f3a833cefa3c88d788e06fc0254000334a6cc322e22e5bfeedde448f3ef32f15cc687229b2e97d74cfadfe9f83572

    • C:\Users\Admin\AppData\Local\Temp\Ons

      Filesize

      87KB

      MD5

      41e73b1d736694b9d434ba06f27e2b4a

      SHA1

      86c94c5259b0dc7291bf08a781f8675dd2f1d9fe

      SHA256

      74afffc304c92079da323752d97e97d6993e6c9f87762dbfc64dbc14c7c70645

      SHA512

      778f2594be738f38eb413bf06473a4a15515858840d01e81f41c53bbe2219cbd9603147b5bcc1efc8564fca34beeddba24b730a24b061ff41395415972e73968

    • C:\Users\Admin\AppData\Local\Temp\Sell

      Filesize

      87KB

      MD5

      f2ff309d7773f5d776f9498f80dacf10

      SHA1

      01e02553fe49276dc9724b6101d94f9cf2512b72

      SHA256

      8d3b741bf68415eea211217201c6e56802f79d84377010a2792f784cc41bdbb6

      SHA512

      9b73b85f5a80ee47c066ce793a383648601846b6d535a833bd7833c7376fcf1ae058e088abed9ab92a2c4c872eb0e7e561ea836e9ddba60d206b291bab647924

    • C:\Users\Admin\AppData\Local\Temp\Seminar

      Filesize

      52KB

      MD5

      e9f5cf7928356e2bbbe40e3e63207626

      SHA1

      dc76ae9eb6b3fae5c2b2945938b60175246c2b0f

      SHA256

      ea5f2c0d3953c3dc822bc66599c2f90cee2c96a120c57be97b8cb26d450c19a5

      SHA512

      1a45fa8afb8803dea58bd66a4b29cf78159de4b001663da8461b242eddf4795ac5b233c8991330fbf443ffd14f1d6efdac428ce90eafc08b8d9b2e09b5f380b1

    • C:\Users\Admin\AppData\Local\Temp\Sold

      Filesize

      91KB

      MD5

      f20a31a2bee03b49051a063d2208478a

      SHA1

      15a504f1dc1b17f042bbaa182347fac0142f5f93

      SHA256

      93ca8e1afc36279625983493ab5bafd52eaab7a3381d7d0c2c4e63e4851ae52b

      SHA512

      871f6ccac5c2be4772ab3b3ff2418e2ff1cf9d69c21affe83c648466aeca7e131e19b11cd15b4ed71a8f6c97b94366ed5aa0e716036a4c262a90ff76d4d4aa7a

    • C:\Users\Admin\AppData\Local\Temp\Throughout

      Filesize

      85KB

      MD5

      2988b4582ac09e7f11b4c91f2f3d8064

      SHA1

      00da7a9c5d840b93db895320ef5225910411f187

      SHA256

      330a65bb44cff97d581a3b741cce47d9d5623d7180ae4dad8b90f44ea5e6ead5

      SHA512

      a882f8e2cf1e842f2aa81b72f598944e51ff0bade0d50f812795d7289e577b6c95f4fdbcf897e331b64de8ca020be67218a35979f1b7e1383efa9b1b8b1a38e3

    • C:\Users\Admin\AppData\Local\Temp\Trunk

      Filesize

      25KB

      MD5

      af09f1d877f2dbad84150c67ba685288

      SHA1

      aca51c54116c7ad0563134850417af64e558aef1

      SHA256

      cb16639b2b71d4aec6c3573fd89052e67b1a04e4e057a2700c8599aee62378c4

      SHA512

      caca23179ffb18f9d57c008ece768a13be53ef242f360bada08a0b50f819cce8b594a85ecfed04a408e589897862d3a833d5c6910463742297ece1a517e5ac01

    • C:\Users\Admin\AppData\Local\Temp\Wallace

      Filesize

      93KB

      MD5

      e1b524e847b352d02a91a75ecc84223c

      SHA1

      f19626afee43213beb6c3e703b0e9d04734b2da1

      SHA256

      8151d592dc5652bd7244e99cef3a0f0cc36e25628df32cb668c7b77f3fd3b7a4

      SHA512

      8660b8af4cbbe63662676d30c5e2bc17c50351feab2fa14c4626aac6aed8f8308142df9173c0eb05163a6adf45e9ff14913e46832683be92f4cc2290e8dd1ff0

    • C:\Users\Admin\AppData\Local\Temp\Website

      Filesize

      72KB

      MD5

      c90f3243b0bbd19ff55615e5be87fbac

      SHA1

      6fe63da2fe9a8dfc8cbc5304f7856f2029483faf

      SHA256

      3bad31816930479fa783ec5667825ff2106021354a3bd2dea8237b5d1022bafe

      SHA512

      7e51f3ac1d897a53d4850e27b28b376197a3b2e63044fa6b6ec0f634adedf22d9fca77961fc9e150a305061d2059da735098ed8cd9fa238838896b8342aaa439

    • C:\Users\Admin\AppData\Local\Temp\Whatever

      Filesize

      96KB

      MD5

      9cb8c495aec970db6e5a9a1645f7b431

      SHA1

      723bcc4f7f482fbaab5cf2c7162e35a70e38896c

      SHA256

      40400a8fda7389758b15f16a48694af07a3195d1d48e2fc64dfca4d80d0f0a6e

      SHA512

      34c9b2cfbf2fd8b71095be34b00a58dbf3b2f46d5d3874f2aee1b07458642487e05416880275db971fc9627e55d3876473fab5afb5e2a54d95efbc6ea67e703c

    • memory/3612-583-0x0000000000600000-0x00000000006C6000-memory.dmp

      Filesize

      792KB

    • memory/3612-586-0x0000000004BA0000-0x0000000004C32000-memory.dmp

      Filesize

      584KB

    • memory/3612-587-0x00000000051F0000-0x0000000005794000-memory.dmp

      Filesize

      5.6MB

    • memory/3612-588-0x0000000004E20000-0x0000000004FE2000-memory.dmp

      Filesize

      1.8MB

    • memory/3612-589-0x0000000004CC0000-0x0000000004D36000-memory.dmp

      Filesize

      472KB

    • memory/3612-590-0x0000000004D90000-0x0000000004DE0000-memory.dmp

      Filesize

      320KB