Analysis

  • max time kernel
    135s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2024 07:31

General

  • Target

    somes.exe

  • Size

    23.5MB

  • MD5

    a40675ca8d440353611fd6ba578fec1a

  • SHA1

    ede5d2c3bc31f35ce9161bbf40518abb3dd91d51

  • SHA256

    fe40afb158e24c1896776fe3bdef33d2bb85ae67cf7b115f309d2535fc2a6afd

  • SHA512

    2a874d280966ab80ff864db89abf42f7d1fc5a7caefe3a66eb747f36c8155724d72fd0e4a289313950492cd16c62104d37831462b6b8fcd35621961285c3667f

  • SSDEEP

    393216:KnV+F7Z799sXdJdcKq5wCvSmFR1szWjpE2y7PMo+LXY8s:KnUr77sXBq9b1szWd1y7koV8s

Malware Config

Signatures

  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\somes.exe
    "C:\Users\Admin\AppData\Local\Temp\somes.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2860
    • C:\Windows\SysWOW64\more.com
      C:\Windows\SysWOW64\more.com
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2744
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\2299ed9a

    Filesize

    1.4MB

    MD5

    a04db4e845401058d7097260f7a905d2

    SHA1

    dee9fd5c2bac2443b4af24d6e04f897340ae87f9

    SHA256

    016961e06393d3dd47f8e18676b314337285680f696736ce9fbc659c0fb87ccc

    SHA512

    6a634ff1bea9b197fc5ec5e63e85644200830ae5614d331072e0b52e673525a52c2cdb8170aaee06fcc185c39738e2b6fb09dc5099c40409cdd03832790c799f

  • C:\Users\Admin\AppData\Local\Temp\22c9ad71

    Filesize

    1.4MB

    MD5

    c077e6cf9d0f37270eb8a11d21d13880

    SHA1

    2e5cd30be6c41cc8a69331ae990d91d14942312a

    SHA256

    2bbae001c74ffe3c8c568c3c5a76e4f1c9ef5012792e1fef1eaeaf5e8ace01fe

    SHA512

    25e65cd9a37de3fefb7c98889b33d9639493cd946057e1e30c6df8d81ad58fa4cd6dba21aacb2e5916249debf06ae05de222f73dc140d5fb4f585b531b63bbd7

  • memory/2688-23-0x0000000000400000-0x00000000004C6000-memory.dmp

    Filesize

    792KB

  • memory/2688-19-0x0000000074690000-0x000000007514A000-memory.dmp

    Filesize

    10.7MB

  • memory/2688-22-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2688-21-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2744-16-0x000000007679E000-0x00000000767A0000-memory.dmp

    Filesize

    8KB

  • memory/2744-13-0x0000000077BD0000-0x0000000077D79000-memory.dmp

    Filesize

    1.7MB

  • memory/2744-17-0x0000000076790000-0x00000000773DA000-memory.dmp

    Filesize

    12.3MB

  • memory/2744-15-0x0000000076790000-0x00000000773DA000-memory.dmp

    Filesize

    12.3MB

  • memory/2744-20-0x0000000076790000-0x00000000773DA000-memory.dmp

    Filesize

    12.3MB

  • memory/2860-0-0x0000000140000000-0x00000001406E7000-memory.dmp

    Filesize

    6.9MB

  • memory/2860-12-0x000007FEFE170000-0x000007FEFEEF8000-memory.dmp

    Filesize

    13.5MB

  • memory/2860-8-0x000007FEFE170000-0x000007FEFEEF8000-memory.dmp

    Filesize

    13.5MB

  • memory/2860-7-0x000007FEFE189000-0x000007FEFE18A000-memory.dmp

    Filesize

    4KB

  • memory/2860-6-0x000007FEFE170000-0x000007FEFEEF8000-memory.dmp

    Filesize

    13.5MB