Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2024 11:45

General

  • Target

    rebuilderUI.exe

  • Size

    23.5MB

  • MD5

    a40675ca8d440353611fd6ba578fec1a

  • SHA1

    ede5d2c3bc31f35ce9161bbf40518abb3dd91d51

  • SHA256

    fe40afb158e24c1896776fe3bdef33d2bb85ae67cf7b115f309d2535fc2a6afd

  • SHA512

    2a874d280966ab80ff864db89abf42f7d1fc5a7caefe3a66eb747f36c8155724d72fd0e4a289313950492cd16c62104d37831462b6b8fcd35621961285c3667f

  • SSDEEP

    393216:KnV+F7Z799sXdJdcKq5wCvSmFR1szWjpE2y7PMo+LXY8s:KnUr77sXBq9b1szWd1y7koV8s

Malware Config

Signatures

  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ rebuilderUI.exe
    "C:\Users\Admin\AppData\Local\Temp\ rebuilderUI.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2620
    • C:\Windows\SysWOW64\more.com
      C:\Windows\SysWOW64\more.com
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2784
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\8390d76b

    Filesize

    1.4MB

    MD5

    a04db4e845401058d7097260f7a905d2

    SHA1

    dee9fd5c2bac2443b4af24d6e04f897340ae87f9

    SHA256

    016961e06393d3dd47f8e18676b314337285680f696736ce9fbc659c0fb87ccc

    SHA512

    6a634ff1bea9b197fc5ec5e63e85644200830ae5614d331072e0b52e673525a52c2cdb8170aaee06fcc185c39738e2b6fb09dc5099c40409cdd03832790c799f

  • C:\Users\Admin\AppData\Local\Temp\87312ad1

    Filesize

    1.4MB

    MD5

    78024da96204f4145b2ab284d1be93f5

    SHA1

    f038400d986a9db7aca626aa72bcff13b475864e

    SHA256

    1a1b598ccde4827e62c8ff50782d4c5a066231d44e09a20a5f4140c3949e0c5e

    SHA512

    c325f1602350807a2cb41733f0bab6fb57f9c2c8e88e44484743bf2ba842f5f84267cbd5aedb53d0aeddee7cef96de7a2fcf97deb7c1d2772f020fb8850d08eb

  • C:\Users\Admin\AppData\Local\Temp\tmpBDD5.tmp

    Filesize

    20KB

    MD5

    c9ff7748d8fcef4cf84a5501e996a641

    SHA1

    02867e5010f62f97ebb0cfb32cb3ede9449fe0c9

    SHA256

    4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988

    SHA512

    d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73

  • memory/2620-0-0x0000000140000000-0x00000001406E7000-memory.dmp

    Filesize

    6.9MB

  • memory/2620-6-0x000007FEFE740000-0x000007FEFF4C8000-memory.dmp

    Filesize

    13.5MB

  • memory/2620-7-0x000007FEFE759000-0x000007FEFE75A000-memory.dmp

    Filesize

    4KB

  • memory/2620-8-0x000007FEFE740000-0x000007FEFF4C8000-memory.dmp

    Filesize

    13.5MB

  • memory/2620-12-0x000007FEFE740000-0x000007FEFF4C8000-memory.dmp

    Filesize

    13.5MB

  • memory/2664-21-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2664-22-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2664-19-0x0000000073F60000-0x0000000074A1A000-memory.dmp

    Filesize

    10.7MB

  • memory/2664-23-0x0000000000400000-0x00000000004C6000-memory.dmp

    Filesize

    792KB

  • memory/2784-15-0x0000000075100000-0x0000000075D4A000-memory.dmp

    Filesize

    12.3MB

  • memory/2784-17-0x0000000075100000-0x0000000075D4A000-memory.dmp

    Filesize

    12.3MB

  • memory/2784-20-0x0000000075100000-0x0000000075D4A000-memory.dmp

    Filesize

    12.3MB

  • memory/2784-16-0x000000007510E000-0x0000000075110000-memory.dmp

    Filesize

    8KB

  • memory/2784-13-0x00000000774A0000-0x0000000077649000-memory.dmp

    Filesize

    1.7MB