Analysis
-
max time kernel
135s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2024 08:51
Static task
static1
Behavioral task
behavioral1
Sample
a91b4875630c4f702ab63f94ed633da4.exe
Resource
win7-20240903-en
General
-
Target
a91b4875630c4f702ab63f94ed633da4.exe
-
Size
83.6MB
-
MD5
a91b4875630c4f702ab63f94ed633da4
-
SHA1
d485e90a501aa11f89f684063e5fbe235937f0bf
-
SHA256
d864a359e3a19182e72109fe75408d21b10215938e8be4098c4dbbc8ce0b7c7c
-
SHA512
43e4a19efcb814ae3b418177679fb52d257fd9046b6ac4baaea2fdfecb8627bc80ecdfc8288139d669e639c748f63c043d5b6997147b580d64bab3518524b460
-
SSDEEP
1572864:ZyM8TruaFhFBQ4aidylq1RFVKl8J/1BbAYqnmy2QPz2Pt0BQGRClJygc:ZyMAeiTFny2ezE0QGiJygc
Malware Config
Signatures
-
SectopRAT payload 1 IoCs
resource yara_rule behavioral2/memory/1964-265-0x0000000001300000-0x00000000013C6000-memory.dmp family_sectoprat -
Sectoprat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation a91b4875630c4f702ab63f94ed633da4.tmp -
Executes dropped EXE 2 IoCs
pid Process 3480 a91b4875630c4f702ab63f94ed633da4.tmp 3960 dobi.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3960 set thread context of 3388 3960 dobi.exe 104 PID 3388 set thread context of 1964 3388 more.com 111 -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Canva\is-565GF.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-U7R4V.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-LV6CL.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-S41GL.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-TEOMG.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-2ALDS.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-THJ48.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-KU0Q5.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\is-4GDUV.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\is-DIMPG.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\is-A45AH.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-6B79I.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-1SBQ1.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-ORV29.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-T23J9.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-OMBQL.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-9K599.tmp a91b4875630c4f702ab63f94ed633da4.tmp File opened for modification C:\Program Files (x86)\Canva\unins000.dat a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-77E7M.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-6OH2R.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\is-C3EGO.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\is-JEQUL.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\is-5L8P1.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\is-V9BD9.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-LM8UI.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-H0JN4.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-9NBN3.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-AHOEF.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\resources\is-19MAV.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-TH3P1.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-ATDRV.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\unins000.dat a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\is-O7LRP.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-7ATF8.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-EDK45.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-SARC0.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-7ABI9.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-PP2IA.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\is-0UK4N.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-HA640.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-EO0IR.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-TKU42.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-7D3U9.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-F3K3B.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\is-N98SO.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\is-9MSOL.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-36MQ7.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\resources\is-R6NFQ.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\is-RQJS9.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-QGCRV.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\is-SDO0K.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-J638B.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-SPJ9E.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-IRQHF.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\is-5LNP0.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\is-GG461.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-7FPB3.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-UTR97.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-MS9FS.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-TB9TP.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-JBVLF.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-KU0JV.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-SE05C.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-QD68I.tmp a91b4875630c4f702ab63f94ed633da4.tmp -
pid Process 4744 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language more.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a91b4875630c4f702ab63f94ed633da4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a91b4875630c4f702ab63f94ed633da4.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4744 powershell.exe 4744 powershell.exe 3960 dobi.exe 3960 dobi.exe 3388 more.com 3388 more.com 1964 MSBuild.exe 1964 MSBuild.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 3960 dobi.exe 3388 more.com 3388 more.com -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4744 powershell.exe Token: SeDebugPrivilege 1964 MSBuild.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3480 a91b4875630c4f702ab63f94ed633da4.tmp -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1964 MSBuild.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2536 wrote to memory of 3480 2536 a91b4875630c4f702ab63f94ed633da4.exe 83 PID 2536 wrote to memory of 3480 2536 a91b4875630c4f702ab63f94ed633da4.exe 83 PID 2536 wrote to memory of 3480 2536 a91b4875630c4f702ab63f94ed633da4.exe 83 PID 3480 wrote to memory of 4744 3480 a91b4875630c4f702ab63f94ed633da4.tmp 100 PID 3480 wrote to memory of 4744 3480 a91b4875630c4f702ab63f94ed633da4.tmp 100 PID 3480 wrote to memory of 4744 3480 a91b4875630c4f702ab63f94ed633da4.tmp 100 PID 4744 wrote to memory of 3960 4744 powershell.exe 103 PID 4744 wrote to memory of 3960 4744 powershell.exe 103 PID 3960 wrote to memory of 3388 3960 dobi.exe 104 PID 3960 wrote to memory of 3388 3960 dobi.exe 104 PID 3960 wrote to memory of 3388 3960 dobi.exe 104 PID 3960 wrote to memory of 3388 3960 dobi.exe 104 PID 3388 wrote to memory of 1964 3388 more.com 111 PID 3388 wrote to memory of 1964 3388 more.com 111 PID 3388 wrote to memory of 1964 3388 more.com 111 PID 3388 wrote to memory of 1964 3388 more.com 111 PID 3388 wrote to memory of 1964 3388 more.com 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\a91b4875630c4f702ab63f94ed633da4.exe"C:\Users\Admin\AppData\Local\Temp\a91b4875630c4f702ab63f94ed633da4.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\is-HEAFR.tmp\a91b4875630c4f702ab63f94ed633da4.tmp"C:\Users\Admin\AppData\Local\Temp\is-HEAFR.tmp\a91b4875630c4f702ab63f94ed633da4.tmp" /SL5="$5026E,81954756,1209856,C:\Users\Admin\AppData\Local\Temp\a91b4875630c4f702ab63f94ed633da4.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\is-T854P.tmp\ExtractedContent.ps1"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Users\Admin\AppData\Roaming\SystemUtil\dobi.exe"C:\Users\Admin\AppData\Roaming\SystemUtil\dobi.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\SysWOW64\more.comC:\Windows\SysWOW64\more.com5⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe6⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1964
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD59e31991a93a6c781884e89a8572f5ea0
SHA14b83364234b879525ce91bbaa5226e91749491ed
SHA256ecb718af37ec5b9c8b6a1f5aa535df409cad971852b01da72dfa3950dd51693a
SHA5121d8da914fe1f7a164696b52b4d1fab12bb4defe0e09c94f862edad3e2bd7727a5004df362280ca47b7cc8a1ca6c8d3ec39a6b4d90e77779ce609c35e004e436f
-
Filesize
1.4MB
MD5db824f0e0deb72ed65bc264a8ec9f71c
SHA11d0cecebffee9662102597fc5bf05ba83d4ddf5d
SHA256d0e7d15d33044622ddb8acdb04bc01f69529f2caef03ed73cdf1e15fbbd70355
SHA512d1db139db495668c89495cec3a7816535137317a062906dfe6bb8ae84df7ff5812bcee2b9c1933f24728997721eec636227a7102645b49321c690578f6cce73b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3.5MB
MD56ab2af20157d2f440e8b22982f6247c5
SHA153c0da8de2ee2c50b79913a876edcd7078897566
SHA256c95f668ab97a0c6650381e0fc1a93aa043e3f899eef09dd7a3b0837a4298838e
SHA5125ed8b96a65c44f7cab604440f21b5e2f331c38d2e7ca3ebb26a9c1750ae5e5690225ec0f6530e6c65589dc639fcbcbf9afa80e85881b6f731118d0089559cb6d
-
Filesize
5.5MB
MD5f7e2624867775590018ce9586ac1d4a8
SHA16e2e80d1bde207734647b48d71dc483ff56a29a1
SHA2560547b50b9070c88c19d054d1d2f084f72fe3717be07265af0ea4ce87ffd8ebc5
SHA512fa8312dbac3b24f3d8d09576084f04e7289f2878bd5b4157328fc51259ca918a8874fa1e60b0f095634abe2f86a64941c74f702ffb52ed80c0310d8622297c2e
-
Filesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
Filesize
9.6MB
MD5a439025e40533f6e78c74fe8e9ce9875
SHA16ae40c35d089fd05b521affda29c205effdf9928
SHA256a15ddd90e6ad35fc8896d7d613d0d178bdc29a9353128e6b5b4e177abcb8195f
SHA512a2e22c32a1b6c50cfef234a7fe9581df516d3b7129645d64ffb16652a4dc757294aa5ccdae2a3c1a530c71251abeeb73356ca4f6b33b73fdd7cac2161a16d84b