Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2024 07:31

General

  • Target

    somes.exe

  • Size

    23.5MB

  • MD5

    a40675ca8d440353611fd6ba578fec1a

  • SHA1

    ede5d2c3bc31f35ce9161bbf40518abb3dd91d51

  • SHA256

    fe40afb158e24c1896776fe3bdef33d2bb85ae67cf7b115f309d2535fc2a6afd

  • SHA512

    2a874d280966ab80ff864db89abf42f7d1fc5a7caefe3a66eb747f36c8155724d72fd0e4a289313950492cd16c62104d37831462b6b8fcd35621961285c3667f

  • SSDEEP

    393216:KnV+F7Z799sXdJdcKq5wCvSmFR1szWjpE2y7PMo+LXY8s:KnUr77sXBq9b1szWd1y7koV8s

Malware Config

Signatures

  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\somes.exe
    "C:\Users\Admin\AppData\Local\Temp\somes.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Windows\SysWOW64\more.com
      C:\Windows\SysWOW64\more.com
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:4552
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\49e69a02

    Filesize

    1.4MB

    MD5

    a04db4e845401058d7097260f7a905d2

    SHA1

    dee9fd5c2bac2443b4af24d6e04f897340ae87f9

    SHA256

    016961e06393d3dd47f8e18676b314337285680f696736ce9fbc659c0fb87ccc

    SHA512

    6a634ff1bea9b197fc5ec5e63e85644200830ae5614d331072e0b52e673525a52c2cdb8170aaee06fcc185c39738e2b6fb09dc5099c40409cdd03832790c799f

  • C:\Users\Admin\AppData\Local\Temp\4d9a15e5

    Filesize

    1.4MB

    MD5

    4919d4b46e08c69c88147fc219da59df

    SHA1

    245981f57ff3a1c8d6115039ae80acdd8cde3e53

    SHA256

    6f6c155b4b278f7991ea0b69e1ba8fa896dc70f3f96c9dbbd1930690d59f34eb

    SHA512

    fcb7d469360c7a8e9b342b7425e77d08dfd01c254cda67706787e1ef62d49c0a6380c7dbfb09c3188a7cff55be7f7811597953805befbb3a42d356237cffe84a

  • C:\Users\Admin\AppData\Local\Temp\tmp3065.tmp

    Filesize

    20KB

    MD5

    49693267e0adbcd119f9f5e02adf3a80

    SHA1

    3ba3d7f89b8ad195ca82c92737e960e1f2b349df

    SHA256

    d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f

    SHA512

    b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2

  • memory/2512-33-0x0000000005F10000-0x000000000643C000-memory.dmp

    Filesize

    5.2MB

  • memory/2512-34-0x0000000005A30000-0x0000000005A4E000-memory.dmp

    Filesize

    120KB

  • memory/2512-27-0x0000000005330000-0x00000000058D4000-memory.dmp

    Filesize

    5.6MB

  • memory/2512-26-0x0000000004CE0000-0x0000000004D72000-memory.dmp

    Filesize

    584KB

  • memory/2512-57-0x0000000004F60000-0x0000000004F72000-memory.dmp

    Filesize

    72KB

  • memory/2512-56-0x00000000739D0000-0x0000000074180000-memory.dmp

    Filesize

    7.7MB

  • memory/2512-55-0x00000000739DE000-0x00000000739DF000-memory.dmp

    Filesize

    4KB

  • memory/2512-53-0x0000000007A30000-0x0000000007A3A000-memory.dmp

    Filesize

    40KB

  • memory/2512-35-0x0000000005B20000-0x0000000005B86000-memory.dmp

    Filesize

    408KB

  • memory/2512-30-0x0000000004DA0000-0x0000000004DF0000-memory.dmp

    Filesize

    320KB

  • memory/2512-19-0x0000000074290000-0x00000000748BF000-memory.dmp

    Filesize

    6.2MB

  • memory/2512-32-0x0000000004C90000-0x0000000004C9A000-memory.dmp

    Filesize

    40KB

  • memory/2512-24-0x00000000739DE000-0x00000000739DF000-memory.dmp

    Filesize

    4KB

  • memory/2512-25-0x0000000000710000-0x00000000007D6000-memory.dmp

    Filesize

    792KB

  • memory/2512-58-0x0000000005000000-0x000000000503C000-memory.dmp

    Filesize

    240KB

  • memory/2512-31-0x00000000739D0000-0x0000000074180000-memory.dmp

    Filesize

    7.7MB

  • memory/2512-28-0x0000000005090000-0x0000000005252000-memory.dmp

    Filesize

    1.8MB

  • memory/2512-29-0x0000000004E00000-0x0000000004E76000-memory.dmp

    Filesize

    472KB

  • memory/3016-9-0x00007FFAC9610000-0x00007FFAC9D4F000-memory.dmp

    Filesize

    7.2MB

  • memory/3016-8-0x00007FFAC9610000-0x00007FFAC9D4F000-memory.dmp

    Filesize

    7.2MB

  • memory/3016-0-0x00007FF6FA520000-0x00007FF6FAC07000-memory.dmp

    Filesize

    6.9MB

  • memory/3016-6-0x00007FFAC9610000-0x00007FFAC9D4F000-memory.dmp

    Filesize

    7.2MB

  • memory/3016-7-0x00007FFAC9629000-0x00007FFAC962A000-memory.dmp

    Filesize

    4KB

  • memory/4552-23-0x0000000003D70000-0x0000000004323000-memory.dmp

    Filesize

    5.7MB

  • memory/4552-20-0x0000000075D10000-0x00000000762C3000-memory.dmp

    Filesize

    5.7MB

  • memory/4552-15-0x0000000075D10000-0x00000000762C3000-memory.dmp

    Filesize

    5.7MB

  • memory/4552-17-0x0000000075D10000-0x00000000762C3000-memory.dmp

    Filesize

    5.7MB

  • memory/4552-16-0x0000000075D1E000-0x0000000075D20000-memory.dmp

    Filesize

    8KB

  • memory/4552-14-0x0000000003D70000-0x0000000004323000-memory.dmp

    Filesize

    5.7MB

  • memory/4552-12-0x00007FFACA290000-0x00007FFACA485000-memory.dmp

    Filesize

    2.0MB