Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2024 17:11
Static task
static1
Behavioral task
behavioral1
Sample
Advanced_IP_Scanner_3.2.2048.0.exe
Resource
win7-20240903-en
General
-
Target
Advanced_IP_Scanner_3.2.2048.0.exe
-
Size
23.8MB
-
MD5
ecc581297b2c637c187c5b8f2455d0a9
-
SHA1
3f07a6c4f13e193631f21db3950aa9393a5824b1
-
SHA256
5cbe2ec3c59b2cffd0ff87d7931f3f406985cbeb5648f9afcd36475552e96cc1
-
SHA512
a2271103092085798d4cdc47aec4c6cf685cfd5a4c6ea5d6116c2053649dd4f6c3c9e2c555485c708a0a2aed78b610009e1a0aa0413d1d4b491bfb5abd21da68
-
SSDEEP
393216:d8jU2t/X9E3JMUNccjPql0NbgVunl22V5v+6m8FavWoB+Ysjuvk:CjU2p9EZvNdjP6Kbaunldv+6mLZ+YAuc
Malware Config
Signatures
-
SectopRAT payload 1 IoCs
resource yara_rule behavioral2/memory/3740-392-0x0000000000A00000-0x0000000000AC6000-memory.dmp family_sectoprat -
Sectoprat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation Advanced_IP_Scanner_3.2.2048.0.tmp -
Executes dropped EXE 2 IoCs
pid Process 3620 Advanced_IP_Scanner_3.2.2048.0.tmp 2192 Simple.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2192 set thread context of 2912 2192 Simple.exe 96 PID 2912 set thread context of 3740 2912 more.com 99 -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Advanced IP Scanner\is-ELFSU.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-6PSGS.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-SMK2D.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-R9J9I.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-1IU4K.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-2GHJC.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-43TNM.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-1R2GM.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\unins000.dat Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-U8F57.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-GI50E.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-7PM2L.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-OPV4O.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-KK484.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-3RNRG.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-733AM.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-GMU6N.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-PI1S7.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-8ISBE.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-FELB9.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-C48K0.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-DTVDF.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-IO9B8.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-COVA3.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-JPDLR.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-N9IA3.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-4NFUO.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-T4M9L.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-MNA2U.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-1IMP6.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-KJ2V6.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-1JJ36.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-N3930.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-DQ4FI.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-D6NNB.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-87HD4.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-G9RLN.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-82CN6.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-I64KD.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-FMRBA.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-VLDSF.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-I646A.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-T8GAU.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-GF234.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-183GC.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-9L3SN.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-62I2N.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-GGUBE.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-B1BCT.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-O57JT.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-30G3G.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-O32TA.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-0DC4R.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-B9BKO.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-GOL6M.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-407NA.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-8VAQN.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-7HKBC.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-4IJGF.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-O1VUN.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-MDDR5.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-B6PRA.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-AELHI.tmp Advanced_IP_Scanner_3.2.2048.0.tmp File created C:\Program Files (x86)\Advanced IP Scanner\is-S0CJT.tmp Advanced_IP_Scanner_3.2.2048.0.tmp -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Storage Technology Management Service.job more.com -
pid Process 4384 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Simple.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language more.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Advanced_IP_Scanner_3.2.2048.0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Advanced_IP_Scanner_3.2.2048.0.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4384 powershell.exe 4384 powershell.exe 2192 Simple.exe 2192 Simple.exe 2912 more.com 2912 more.com 3740 MSBuild.exe 3740 MSBuild.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 2192 Simple.exe 2912 more.com 2912 more.com -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4384 powershell.exe Token: SeDebugPrivilege 3740 MSBuild.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3620 Advanced_IP_Scanner_3.2.2048.0.tmp -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3740 MSBuild.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3852 wrote to memory of 3620 3852 Advanced_IP_Scanner_3.2.2048.0.exe 82 PID 3852 wrote to memory of 3620 3852 Advanced_IP_Scanner_3.2.2048.0.exe 82 PID 3852 wrote to memory of 3620 3852 Advanced_IP_Scanner_3.2.2048.0.exe 82 PID 3620 wrote to memory of 4384 3620 Advanced_IP_Scanner_3.2.2048.0.tmp 91 PID 3620 wrote to memory of 4384 3620 Advanced_IP_Scanner_3.2.2048.0.tmp 91 PID 3620 wrote to memory of 4384 3620 Advanced_IP_Scanner_3.2.2048.0.tmp 91 PID 4384 wrote to memory of 2192 4384 powershell.exe 95 PID 4384 wrote to memory of 2192 4384 powershell.exe 95 PID 4384 wrote to memory of 2192 4384 powershell.exe 95 PID 2192 wrote to memory of 2912 2192 Simple.exe 96 PID 2192 wrote to memory of 2912 2192 Simple.exe 96 PID 2192 wrote to memory of 2912 2192 Simple.exe 96 PID 2192 wrote to memory of 2912 2192 Simple.exe 96 PID 2912 wrote to memory of 3740 2912 more.com 99 PID 2912 wrote to memory of 3740 2912 more.com 99 PID 2912 wrote to memory of 3740 2912 more.com 99 PID 2912 wrote to memory of 3740 2912 more.com 99 PID 2912 wrote to memory of 3740 2912 more.com 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\Advanced_IP_Scanner_3.2.2048.0.exe"C:\Users\Admin\AppData\Local\Temp\Advanced_IP_Scanner_3.2.2048.0.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\is-3T9J8.tmp\Advanced_IP_Scanner_3.2.2048.0.tmp"C:\Users\Admin\AppData\Local\Temp\is-3T9J8.tmp\Advanced_IP_Scanner_3.2.2048.0.tmp" /SL5="$60238,18032967,815616,C:\Users\Admin\AppData\Local\Temp\Advanced_IP_Scanner_3.2.2048.0.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\is-TAOQA.tmp\ExtractedContent.ps1"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Users\Admin\AppData\Roaming\SystemUtil\Simple.exe"C:\Users\Admin\AppData\Roaming\SystemUtil\Simple.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\more.comC:\Windows\SysWOW64\more.com5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe6⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3740
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD588b009ccacf0eb1b4a141470d3f160c4
SHA1ee0d1a44562ccdedbcde92d232fa541f53826b4b
SHA256d2254ed99166a12ce00f93379142acfcbf9a49af3fb8789e8215b0c1cccb4587
SHA512d07c7b90a12e7e48a90bf450a57e4479ae5bb130efe9950a316d9a7ab9063d94af0f35942925aca41a7c2c149a0f31a075c38dd0b34821f88bd81588660d0be1
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.6MB
MD5503141a46b747128cd364f4ec7d30585
SHA144f3c3869dead2d6e2ce13e7e134175f66424658
SHA256f69ee4ec3c9c36d8b32904dd769568c875176e1f8c0583efd0173da706b5d3c7
SHA51257b5d8d1a54c3943a27e5445a05f5fdf5a0d4ae32ee0c77e9ce1a4724bc3b3bed028a52daa83d6afd35f29ee6c72efc22d20e419aad4e6008fbce49ad5920bb1
-
Filesize
1.4MB
MD5b6db43c0f84dcb0a47663ad9d5c1ccec
SHA1c308be5b1193809a3cf3762fb743525b96991c49
SHA2560b364125e57fc6358a8e6b07133f38b6cc997cf5facb78e48fca789249794658
SHA51270a99a54fa0eaaf35fafaa609c8852737fc0b631aea146d722ae75049218db1f6b634580da369beb28a1c211457af0d40939eeb5d463ef45d25651d1a13a08ff
-
Filesize
3.2MB
MD577264dbcb409de0c426bd5088b0fbe09
SHA111c02946ea15eea615ede3ed5597ed223d3879cf
SHA25685c71bb847f0b29db1d790c631d586167942ffceae96605f5673438fe3c8dd1a
SHA5125604a2fee723cea3238aca10dd44e1b1a4d5316a1e2c860619e34b9076fee501e9a9fc22c7e3e3dad1fdc7690f1992a57778b74b40fe6f3307085549ccfc6a83
-
Filesize
7.1MB
MD51e7e0d839739d361a490f6816de30dd7
SHA1982f175e8585b0ffef8203095cbb7cf4a4fc708f
SHA256a0a3a16453e9c8b9b529f8e5a1631ce7a0c67b60295033efdf06a76092d70d2d
SHA5127c85f8248920e3d3d94e907fcc48b06621b5b3e0cca3b9d88b18d3eb948a834897fe64f949d5af4208c15fd56048e8bb03317718db39f7487fc614e66361dd7e
-
Filesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
Filesize
10.5MB
MD54e4b37708a5780e19101a3c081b0992a
SHA1df5a5e50017c759906cb3dd31e564c54bdf7d844
SHA2561201aaef87fbd2be3b27b325e7fb99ef4edf5d38150846f94622c385b473e6f6
SHA512baf71393027412d62ec070b01f85e141e29ee6f31399e5021c66809bfc505840ec1c1ce706dce99164331f93711a86349ecec23fa344b151dc1b2b941021d413