Analysis
-
max time kernel
136s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27/10/2024, 02:37
Static task
static1
Behavioral task
behavioral1
Sample
8ae2402f1925ee78bdf48ce3cf3e7eebecaaf26c4a45ccc105d6beb735657f31.exe
Resource
win7-20241010-en
General
-
Target
8ae2402f1925ee78bdf48ce3cf3e7eebecaaf26c4a45ccc105d6beb735657f31.exe
-
Size
1.6MB
-
MD5
2223a0c17bc8ec63cd6d3647995978e9
-
SHA1
c58e7e26863a557c820515a0eaa5fd5c9d56d0dc
-
SHA256
8ae2402f1925ee78bdf48ce3cf3e7eebecaaf26c4a45ccc105d6beb735657f31
-
SHA512
9028d4ff22e59be9d16e3ebd4b3e3a9c1a22a4d272a7840aae55fb3614b3e008409684e9d229ac979244db0212e768255c0e7202f6f0e6fbf49ec92d2a31ea1a
-
SSDEEP
49152:4IGLOBaxpDPkpx+8dV7YrrofrpR44cGwNPz6CL:JGLOBa3DspZokf1e49wNn
Malware Config
Signatures
-
SectopRAT payload 1 IoCs
resource yara_rule behavioral2/memory/3612-583-0x0000000000600000-0x00000000006C6000-memory.dmp family_sectoprat -
Sectoprat family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 212 created 3464 212 Roll.pif 56 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 8ae2402f1925ee78bdf48ce3cf3e7eebecaaf26c4a45ccc105d6beb735657f31.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Finestitch.url cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Finestitch.url cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 212 Roll.pif 3612 RegAsm.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 41 pastebin.com 42 pastebin.com -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2932 tasklist.exe 1936 tasklist.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File opened for modification C:\Windows\DepartmentalToken 8ae2402f1925ee78bdf48ce3cf3e7eebecaaf26c4a45ccc105d6beb735657f31.exe File opened for modification C:\Windows\PartnerMpg 8ae2402f1925ee78bdf48ce3cf3e7eebecaaf26c4a45ccc105d6beb735657f31.exe File opened for modification C:\Windows\TampaJonathan 8ae2402f1925ee78bdf48ce3cf3e7eebecaaf26c4a45ccc105d6beb735657f31.exe File opened for modification C:\Windows\MechanismsHighs 8ae2402f1925ee78bdf48ce3cf3e7eebecaaf26c4a45ccc105d6beb735657f31.exe File opened for modification C:\Windows\CoolWarranty 8ae2402f1925ee78bdf48ce3cf3e7eebecaaf26c4a45ccc105d6beb735657f31.exe File opened for modification C:\Windows\AtlantaItaly 8ae2402f1925ee78bdf48ce3cf3e7eebecaaf26c4a45ccc105d6beb735657f31.exe File opened for modification C:\Windows\LeafCombined 8ae2402f1925ee78bdf48ce3cf3e7eebecaaf26c4a45ccc105d6beb735657f31.exe File opened for modification C:\Windows\KeenLaboratories 8ae2402f1925ee78bdf48ce3cf3e7eebecaaf26c4a45ccc105d6beb735657f31.exe File opened for modification C:\Windows\SwiftReproduction 8ae2402f1925ee78bdf48ce3cf3e7eebecaaf26c4a45ccc105d6beb735657f31.exe File opened for modification C:\Windows\FactorAdvocate 8ae2402f1925ee78bdf48ce3cf3e7eebecaaf26c4a45ccc105d6beb735657f31.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8ae2402f1925ee78bdf48ce3cf3e7eebecaaf26c4a45ccc105d6beb735657f31.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Roll.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 212 Roll.pif 212 Roll.pif 212 Roll.pif 212 Roll.pif 212 Roll.pif 212 Roll.pif 212 Roll.pif 212 Roll.pif 212 Roll.pif 212 Roll.pif 212 Roll.pif 212 Roll.pif 212 Roll.pif 212 Roll.pif 212 Roll.pif 212 Roll.pif 212 Roll.pif 212 Roll.pif 212 Roll.pif 212 Roll.pif 212 Roll.pif 212 Roll.pif 212 Roll.pif 212 Roll.pif 212 Roll.pif 212 Roll.pif 212 Roll.pif 212 Roll.pif 212 Roll.pif 212 Roll.pif 212 Roll.pif 212 Roll.pif -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2932 tasklist.exe Token: SeDebugPrivilege 1936 tasklist.exe Token: SeDebugPrivilege 3612 RegAsm.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 212 Roll.pif 212 Roll.pif 212 Roll.pif -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 212 Roll.pif 212 Roll.pif 212 Roll.pif -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1248 wrote to memory of 3276 1248 8ae2402f1925ee78bdf48ce3cf3e7eebecaaf26c4a45ccc105d6beb735657f31.exe 85 PID 1248 wrote to memory of 3276 1248 8ae2402f1925ee78bdf48ce3cf3e7eebecaaf26c4a45ccc105d6beb735657f31.exe 85 PID 1248 wrote to memory of 3276 1248 8ae2402f1925ee78bdf48ce3cf3e7eebecaaf26c4a45ccc105d6beb735657f31.exe 85 PID 3276 wrote to memory of 2932 3276 cmd.exe 92 PID 3276 wrote to memory of 2932 3276 cmd.exe 92 PID 3276 wrote to memory of 2932 3276 cmd.exe 92 PID 3276 wrote to memory of 876 3276 cmd.exe 93 PID 3276 wrote to memory of 876 3276 cmd.exe 93 PID 3276 wrote to memory of 876 3276 cmd.exe 93 PID 3276 wrote to memory of 1936 3276 cmd.exe 96 PID 3276 wrote to memory of 1936 3276 cmd.exe 96 PID 3276 wrote to memory of 1936 3276 cmd.exe 96 PID 3276 wrote to memory of 5024 3276 cmd.exe 97 PID 3276 wrote to memory of 5024 3276 cmd.exe 97 PID 3276 wrote to memory of 5024 3276 cmd.exe 97 PID 3276 wrote to memory of 4868 3276 cmd.exe 98 PID 3276 wrote to memory of 4868 3276 cmd.exe 98 PID 3276 wrote to memory of 4868 3276 cmd.exe 98 PID 3276 wrote to memory of 1432 3276 cmd.exe 99 PID 3276 wrote to memory of 1432 3276 cmd.exe 99 PID 3276 wrote to memory of 1432 3276 cmd.exe 99 PID 3276 wrote to memory of 4528 3276 cmd.exe 100 PID 3276 wrote to memory of 4528 3276 cmd.exe 100 PID 3276 wrote to memory of 4528 3276 cmd.exe 100 PID 3276 wrote to memory of 212 3276 cmd.exe 101 PID 3276 wrote to memory of 212 3276 cmd.exe 101 PID 3276 wrote to memory of 212 3276 cmd.exe 101 PID 3276 wrote to memory of 4068 3276 cmd.exe 102 PID 3276 wrote to memory of 4068 3276 cmd.exe 102 PID 3276 wrote to memory of 4068 3276 cmd.exe 102 PID 212 wrote to memory of 4220 212 Roll.pif 103 PID 212 wrote to memory of 4220 212 Roll.pif 103 PID 212 wrote to memory of 4220 212 Roll.pif 103 PID 212 wrote to memory of 3612 212 Roll.pif 111 PID 212 wrote to memory of 3612 212 Roll.pif 111 PID 212 wrote to memory of 3612 212 Roll.pif 111 PID 212 wrote to memory of 3612 212 Roll.pif 111 PID 212 wrote to memory of 3612 212 Roll.pif 111
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3464
-
C:\Users\Admin\AppData\Local\Temp\8ae2402f1925ee78bdf48ce3cf3e7eebecaaf26c4a45ccc105d6beb735657f31.exe"C:\Users\Admin\AppData\Local\Temp\8ae2402f1925ee78bdf48ce3cf3e7eebecaaf26c4a45ccc105d6beb735657f31.exe"2⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Trunk Trunk.bat & Trunk.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2932
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"4⤵
- System Location Discovery: System Language Discovery
PID:876
-
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1936
-
-
C:\Windows\SysWOW64\findstr.exefindstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"4⤵
- System Location Discovery: System Language Discovery
PID:5024
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 325324⤵
- System Location Discovery: System Language Discovery
PID:4868
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "CLOCKCLERKINVOICETOUCHED" Circuits4⤵
- System Location Discovery: System Language Discovery
PID:1432
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Oman + ..\Website + ..\Wallace + ..\Aspnet + ..\Throughout + ..\Sell + ..\Seminar + ..\Whatever + ..\Sold + ..\Fragrances + ..\Dell + ..\European + ..\Ons + ..\Bleeding Q4⤵
- System Location Discovery: System Language Discovery
PID:4528
-
-
C:\Users\Admin\AppData\Local\Temp\32532\Roll.pifRoll.pif Q4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Local\Temp\32532\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\32532\RegAsm.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3612
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 54⤵
- System Location Discovery: System Language Discovery
PID:4068
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Finestitch.url" & echo URL="C:\Users\Admin\AppData\Local\StitchCraft Studios Co\Finestitch.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Finestitch.url" & exit2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:4220
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD55480fc219eccd0b8b4bf09943c7847eb
SHA1b67357550a3519cb871d7e634986b28c8dcab00e
SHA256dcc000d89c76c655d20184e9cd4d6af56621a25f876569b518634fae1e371b9b
SHA512733ee994cd3609f58a16d130bbb685a93dfdda4e5a096679d023d7d5d174d7c87f336da3d2f7d7633d6292babbaf862107f3d0ff8aa7225029745ec2c30fd5d7
-
Filesize
63KB
MD50d5df43af2916f47d00c1573797c1a13
SHA1230ab5559e806574d26b4c20847c368ed55483b0
SHA256c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc
SHA512f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2
-
Filesize
872KB
MD518ce19b57f43ce0a5af149c96aecc685
SHA11bd5ca29fc35fc8ac346f23b155337c5b28bbc36
SHA256d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd
SHA512a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558
-
Filesize
67KB
MD5fe434652b460c55ce1d0b5779837949a
SHA121d08a61e1c37a95d85cb1d8f8a3b0af69f3c497
SHA256895fb6905acc8dc012aef7cea7eb8da70f2e5c18551b3a2483d14f5c6f463162
SHA512d14aac52dc6515da01a0eda1f57a3ed8e5e53ebda64f94695a322264fbe83d5a7f8dafaa52db6c4c6598e0315499254b2952f88a78b18b67f8be74681597b5a7
-
Filesize
9KB
MD549d8897654e0aa5fca771920893d8fde
SHA1216ec1a49c310518474d6ae01d165e0964349568
SHA25663c99a200bf8ed5074d7cd7c05e81cbb181155221f1b039c6c8c29ebc4e7ceaa
SHA512fee1443ba44b85d61a9399a0df596c4708c1991b35c9963c2c081796f463e4c04ea1e457cf1197e4865015deadbbedae859281e80b7da401229392999062e0f9
-
Filesize
6KB
MD55b654b7a9f0d473fedcad739b57e9cab
SHA1b1f5e75885c13ee8eefe37dc72626bd95b14b97a
SHA256497a2bfc82406f8c5a202b44ee9db49c07198e17818f33594522bfd8900e2ca7
SHA51273ebc11d1665c4839aaba67c8b081550701c5664eadf1a4a5c9412180e36354dec967856e3e952bf405dd5c3da962bfaf1b379afc086829fec93ef9b9139201a
-
Filesize
61KB
MD55dd7820ed939fc1fbe869093cdfa91e6
SHA1de119754858a2e3eac528a1ff00e620f5a630249
SHA256fd6c58944be09672bd2b6ae98533d166604fc36ede596420cf3a02bfb7d75e53
SHA51281700cbb347b0e6d4ae6837113d3b8f1081f890d70cb98823e43491c861da02ca09319afff93abe4f5b7c90bf7846d924b24ebc0d66bb569253bd1d3d2ab72c4
-
Filesize
63KB
MD5a8117bb93e7acca6e0cc3c0030a9d720
SHA19bfde33c8a2bbcd24c1016f2638bb42641dc709a
SHA256e887d12050cbc33ca3c6bc37a57350c5637fb6e536c6bd711259f0332bd506f5
SHA512a26a73f9bf9c531f798489ac89e1ba0c1bbed57c4581beaa55f282e880dcad68d4c1b13e93ac1be4db409b2509584f0ac67dcadc58c7f26c6b9d8db6418ecac0
-
Filesize
79KB
MD5f89797c5e269dbe4992495accbe23de5
SHA184e2ed229135c5b175d92143277217e68b9410d4
SHA256241c6a7e7b669c51c47317a6aaa5c0edd622380c30ee24d33e46bd674a1842d8
SHA512524f90d008f007126de7d3ad09fccaad9be1cacd85f27f2e97af01e8585014e2b74798f72bb127b6276f8d21f9153d090c0f6d4db248020dd49d99794a37b623
-
Filesize
865KB
MD5065cf0decfa83093496850d42f51e15b
SHA16e48c54aa7ff58e4ddf2ca3f352c6ec2d4cc9bdb
SHA256accb2c5c0ffd1a41829912221368fe1563e074a75d133547c4b9d4f349d4c3de
SHA5123d329ca31b85068a5c86c1f3a944ab67e80f0805cc3a3702979853eba33d213fccd8d16058a20ef42b6099bdd9e9faeb36427538f021fb523bb6a0a6862da12d
-
Filesize
99KB
MD58689ebddc13430c0d8bc5164f329e774
SHA1bab95927c3ff22e0637780738c716aeb731d3889
SHA25616219af735612ff079539d3b2757a03b120133db70d8fc8d7bf9b74011c1c509
SHA512108985043dfd83a05c2720b66d6688ba2f3f3a833cefa3c88d788e06fc0254000334a6cc322e22e5bfeedde448f3ef32f15cc687229b2e97d74cfadfe9f83572
-
Filesize
87KB
MD541e73b1d736694b9d434ba06f27e2b4a
SHA186c94c5259b0dc7291bf08a781f8675dd2f1d9fe
SHA25674afffc304c92079da323752d97e97d6993e6c9f87762dbfc64dbc14c7c70645
SHA512778f2594be738f38eb413bf06473a4a15515858840d01e81f41c53bbe2219cbd9603147b5bcc1efc8564fca34beeddba24b730a24b061ff41395415972e73968
-
Filesize
87KB
MD5f2ff309d7773f5d776f9498f80dacf10
SHA101e02553fe49276dc9724b6101d94f9cf2512b72
SHA2568d3b741bf68415eea211217201c6e56802f79d84377010a2792f784cc41bdbb6
SHA5129b73b85f5a80ee47c066ce793a383648601846b6d535a833bd7833c7376fcf1ae058e088abed9ab92a2c4c872eb0e7e561ea836e9ddba60d206b291bab647924
-
Filesize
52KB
MD5e9f5cf7928356e2bbbe40e3e63207626
SHA1dc76ae9eb6b3fae5c2b2945938b60175246c2b0f
SHA256ea5f2c0d3953c3dc822bc66599c2f90cee2c96a120c57be97b8cb26d450c19a5
SHA5121a45fa8afb8803dea58bd66a4b29cf78159de4b001663da8461b242eddf4795ac5b233c8991330fbf443ffd14f1d6efdac428ce90eafc08b8d9b2e09b5f380b1
-
Filesize
91KB
MD5f20a31a2bee03b49051a063d2208478a
SHA115a504f1dc1b17f042bbaa182347fac0142f5f93
SHA25693ca8e1afc36279625983493ab5bafd52eaab7a3381d7d0c2c4e63e4851ae52b
SHA512871f6ccac5c2be4772ab3b3ff2418e2ff1cf9d69c21affe83c648466aeca7e131e19b11cd15b4ed71a8f6c97b94366ed5aa0e716036a4c262a90ff76d4d4aa7a
-
Filesize
85KB
MD52988b4582ac09e7f11b4c91f2f3d8064
SHA100da7a9c5d840b93db895320ef5225910411f187
SHA256330a65bb44cff97d581a3b741cce47d9d5623d7180ae4dad8b90f44ea5e6ead5
SHA512a882f8e2cf1e842f2aa81b72f598944e51ff0bade0d50f812795d7289e577b6c95f4fdbcf897e331b64de8ca020be67218a35979f1b7e1383efa9b1b8b1a38e3
-
Filesize
25KB
MD5af09f1d877f2dbad84150c67ba685288
SHA1aca51c54116c7ad0563134850417af64e558aef1
SHA256cb16639b2b71d4aec6c3573fd89052e67b1a04e4e057a2700c8599aee62378c4
SHA512caca23179ffb18f9d57c008ece768a13be53ef242f360bada08a0b50f819cce8b594a85ecfed04a408e589897862d3a833d5c6910463742297ece1a517e5ac01
-
Filesize
93KB
MD5e1b524e847b352d02a91a75ecc84223c
SHA1f19626afee43213beb6c3e703b0e9d04734b2da1
SHA2568151d592dc5652bd7244e99cef3a0f0cc36e25628df32cb668c7b77f3fd3b7a4
SHA5128660b8af4cbbe63662676d30c5e2bc17c50351feab2fa14c4626aac6aed8f8308142df9173c0eb05163a6adf45e9ff14913e46832683be92f4cc2290e8dd1ff0
-
Filesize
72KB
MD5c90f3243b0bbd19ff55615e5be87fbac
SHA16fe63da2fe9a8dfc8cbc5304f7856f2029483faf
SHA2563bad31816930479fa783ec5667825ff2106021354a3bd2dea8237b5d1022bafe
SHA5127e51f3ac1d897a53d4850e27b28b376197a3b2e63044fa6b6ec0f634adedf22d9fca77961fc9e150a305061d2059da735098ed8cd9fa238838896b8342aaa439
-
Filesize
96KB
MD59cb8c495aec970db6e5a9a1645f7b431
SHA1723bcc4f7f482fbaab5cf2c7162e35a70e38896c
SHA25640400a8fda7389758b15f16a48694af07a3195d1d48e2fc64dfca4d80d0f0a6e
SHA51234c9b2cfbf2fd8b71095be34b00a58dbf3b2f46d5d3874f2aee1b07458642487e05416880275db971fc9627e55d3876473fab5afb5e2a54d95efbc6ea67e703c