Analysis
-
max time kernel
127s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2024 08:54
Static task
static1
Behavioral task
behavioral1
Sample
a91b4875630c4f702ab63f94ed633da4.exe
Resource
win7-20240903-en
General
-
Target
a91b4875630c4f702ab63f94ed633da4.exe
-
Size
83.6MB
-
MD5
a91b4875630c4f702ab63f94ed633da4
-
SHA1
d485e90a501aa11f89f684063e5fbe235937f0bf
-
SHA256
d864a359e3a19182e72109fe75408d21b10215938e8be4098c4dbbc8ce0b7c7c
-
SHA512
43e4a19efcb814ae3b418177679fb52d257fd9046b6ac4baaea2fdfecb8627bc80ecdfc8288139d669e639c748f63c043d5b6997147b580d64bab3518524b460
-
SSDEEP
1572864:ZyM8TruaFhFBQ4aidylq1RFVKl8J/1BbAYqnmy2QPz2Pt0BQGRClJygc:ZyMAeiTFny2ezE0QGiJygc
Malware Config
Signatures
-
SectopRAT payload 1 IoCs
resource yara_rule behavioral2/memory/1952-267-0x0000000000900000-0x00000000009C6000-memory.dmp family_sectoprat -
Sectoprat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation a91b4875630c4f702ab63f94ed633da4.tmp -
Executes dropped EXE 2 IoCs
pid Process 4828 a91b4875630c4f702ab63f94ed633da4.tmp 4484 dobi.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4484 set thread context of 1452 4484 dobi.exe 96 PID 1452 set thread context of 1952 1452 more.com 99 -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Canva\locales\is-M92DI.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-19S62.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-63K8Q.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-562MC.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-F1DMH.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-4P2RQ.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-PC6Q6.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-IMTKP.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-MRKVU.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\is-26QDL.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-ME1AU.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-18C2A.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-32L2D.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-P0C38.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\is-FC13E.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\is-TETR8.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-C3609.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\is-M96ME.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\is-J3LCU.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-8O44I.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\resources\is-NA9HM.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\is-15F1H.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\is-2TAF5.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-VU68L.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-IJ42Q.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-PJAFO.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-0R5QK.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\is-3F7KE.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-05GK5.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-DB54P.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-NJK6G.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-NF7N9.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\is-GC80I.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-JDTMO.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-I988B.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-SS7AI.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-8FLN9.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-TVG73.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-CRTD2.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-NCF4J.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-VQAFP.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-SBGVN.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-PU0MT.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\is-94KRC.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\is-3UTAU.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\is-GJ982.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-9TLEO.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-EOSH9.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-99SCK.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\is-FEH12.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\is-BQL4T.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-1F2AL.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-190GF.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-Q3BVA.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\is-M3MRT.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-GS8V4.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-0O2R4.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-V8DEO.tmp a91b4875630c4f702ab63f94ed633da4.tmp File opened for modification C:\Program Files (x86)\Canva\unins000.dat a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\is-4FOT1.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\is-1K1MG.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-EBPKS.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-5EB56.tmp a91b4875630c4f702ab63f94ed633da4.tmp File created C:\Program Files (x86)\Canva\locales\is-K046K.tmp a91b4875630c4f702ab63f94ed633da4.tmp -
pid Process 1060 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a91b4875630c4f702ab63f94ed633da4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a91b4875630c4f702ab63f94ed633da4.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language more.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1060 powershell.exe 1060 powershell.exe 4484 dobi.exe 4484 dobi.exe 1452 more.com 1452 more.com 1952 MSBuild.exe 1952 MSBuild.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 4484 dobi.exe 1452 more.com 1452 more.com -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1060 powershell.exe Token: SeDebugPrivilege 1952 MSBuild.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4828 a91b4875630c4f702ab63f94ed633da4.tmp -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1952 MSBuild.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2428 wrote to memory of 4828 2428 a91b4875630c4f702ab63f94ed633da4.exe 82 PID 2428 wrote to memory of 4828 2428 a91b4875630c4f702ab63f94ed633da4.exe 82 PID 2428 wrote to memory of 4828 2428 a91b4875630c4f702ab63f94ed633da4.exe 82 PID 4828 wrote to memory of 1060 4828 a91b4875630c4f702ab63f94ed633da4.tmp 92 PID 4828 wrote to memory of 1060 4828 a91b4875630c4f702ab63f94ed633da4.tmp 92 PID 4828 wrote to memory of 1060 4828 a91b4875630c4f702ab63f94ed633da4.tmp 92 PID 1060 wrote to memory of 4484 1060 powershell.exe 95 PID 1060 wrote to memory of 4484 1060 powershell.exe 95 PID 4484 wrote to memory of 1452 4484 dobi.exe 96 PID 4484 wrote to memory of 1452 4484 dobi.exe 96 PID 4484 wrote to memory of 1452 4484 dobi.exe 96 PID 4484 wrote to memory of 1452 4484 dobi.exe 96 PID 1452 wrote to memory of 1952 1452 more.com 99 PID 1452 wrote to memory of 1952 1452 more.com 99 PID 1452 wrote to memory of 1952 1452 more.com 99 PID 1452 wrote to memory of 1952 1452 more.com 99 PID 1452 wrote to memory of 1952 1452 more.com 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\a91b4875630c4f702ab63f94ed633da4.exe"C:\Users\Admin\AppData\Local\Temp\a91b4875630c4f702ab63f94ed633da4.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\is-IV5VG.tmp\a91b4875630c4f702ab63f94ed633da4.tmp"C:\Users\Admin\AppData\Local\Temp\is-IV5VG.tmp\a91b4875630c4f702ab63f94ed633da4.tmp" /SL5="$8029E,81954756,1209856,C:\Users\Admin\AppData\Local\Temp\a91b4875630c4f702ab63f94ed633da4.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\is-RFVVE.tmp\ExtractedContent.ps1"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Users\Admin\AppData\Roaming\SystemUtil\dobi.exe"C:\Users\Admin\AppData\Roaming\SystemUtil\dobi.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\SysWOW64\more.comC:\Windows\SysWOW64\more.com5⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe6⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1952
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD59e31991a93a6c781884e89a8572f5ea0
SHA14b83364234b879525ce91bbaa5226e91749491ed
SHA256ecb718af37ec5b9c8b6a1f5aa535df409cad971852b01da72dfa3950dd51693a
SHA5121d8da914fe1f7a164696b52b4d1fab12bb4defe0e09c94f862edad3e2bd7727a5004df362280ca47b7cc8a1ca6c8d3ec39a6b4d90e77779ce609c35e004e436f
-
Filesize
1.4MB
MD513d3acbe2a3afb39c0fccbdf4773e846
SHA18b394552b23b0a9d80ce4b8438c5bca897dd322c
SHA2568f251affa6016f3102bae76087e7360f8970735aad2e6b565e5d7a40850f385e
SHA51282419fcd9c98e6f021ec7d897e523ab4f4a7292e9ba7e5501a019378d9fdbce79134ae9bd5b25c40f728f71421245aa58538c752dc70f0705d540d6ce7e17572
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3.5MB
MD56ab2af20157d2f440e8b22982f6247c5
SHA153c0da8de2ee2c50b79913a876edcd7078897566
SHA256c95f668ab97a0c6650381e0fc1a93aa043e3f899eef09dd7a3b0837a4298838e
SHA5125ed8b96a65c44f7cab604440f21b5e2f331c38d2e7ca3ebb26a9c1750ae5e5690225ec0f6530e6c65589dc639fcbcbf9afa80e85881b6f731118d0089559cb6d
-
Filesize
5.5MB
MD5f7e2624867775590018ce9586ac1d4a8
SHA16e2e80d1bde207734647b48d71dc483ff56a29a1
SHA2560547b50b9070c88c19d054d1d2f084f72fe3717be07265af0ea4ce87ffd8ebc5
SHA512fa8312dbac3b24f3d8d09576084f04e7289f2878bd5b4157328fc51259ca918a8874fa1e60b0f095634abe2f86a64941c74f702ffb52ed80c0310d8622297c2e
-
Filesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
Filesize
9.6MB
MD5a439025e40533f6e78c74fe8e9ce9875
SHA16ae40c35d089fd05b521affda29c205effdf9928
SHA256a15ddd90e6ad35fc8896d7d613d0d178bdc29a9353128e6b5b4e177abcb8195f
SHA512a2e22c32a1b6c50cfef234a7fe9581df516d3b7129645d64ffb16652a4dc757294aa5ccdae2a3c1a530c71251abeeb73356ca4f6b33b73fdd7cac2161a16d84b