Analysis

  • max time kernel
    145s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28-11-2024 20:17

General

  • Target

    4350899d04502f9fb9ea63fda1820c5aea1d575f7893ef7edde5c661c5495b6b.exe

  • Size

    1.6MB

  • MD5

    4fabe26b8e5aafb4335ab4834eb83fbd

  • SHA1

    f310621024ffaab61fb03bde7d63bb4c0c376ebb

  • SHA256

    4350899d04502f9fb9ea63fda1820c5aea1d575f7893ef7edde5c661c5495b6b

  • SHA512

    624863fabc15bd8846639a8524a01e9ef30d146e348cfee808cfe298e8c9e8ff61c57fb86e0f017623d27e413fdcd132c78df3308b35b2d5176430d556795b48

  • SSDEEP

    24576:6C6SxJ8tzEnpouKAa3R3UGI2416CTLTrSPQt3jBoPCKMuLwYsRLoGBpuk:MdEnqAaR7IvTPrSAlKMvhJV

Malware Config

Signatures

  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 3 IoCs
  • Sectoprat family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 15 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1172
      • C:\Users\Admin\AppData\Local\Temp\4350899d04502f9fb9ea63fda1820c5aea1d575f7893ef7edde5c661c5495b6b.exe
        "C:\Users\Admin\AppData\Local\Temp\4350899d04502f9fb9ea63fda1820c5aea1d575f7893ef7edde5c661c5495b6b.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3008
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c copy Chapter Chapter.bat & Chapter.bat
          3⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1316
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:1572
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "wrsa opssvc"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1556
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:1988
          • C:\Windows\SysWOW64\findstr.exe
            findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1564
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c md 769621
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2144
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V "DivingDonorUsefulGeorge" Broker
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3012
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c copy /b ..\Appreciation + ..\Para + ..\Hourly + ..\Ratio + ..\Codes + ..\Director + ..\Pipeline + ..\Mr + ..\Avg + ..\Calculate + ..\Bathroom + ..\Stock + ..\Bags + ..\Human H
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1224
          • C:\Users\Admin\AppData\Local\Temp\769621\Shore.pif
            Shore.pif H
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:1300
            • C:\Users\Admin\AppData\Local\Temp\769621\RegAsm.exe
              C:\Users\Admin\AppData\Local\Temp\769621\RegAsm.exe
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:1508
          • C:\Windows\SysWOW64\choice.exe
            choice /d y /t 5
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2544
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c schtasks.exe /create /tn "Usa" /tr "wscript //B 'C:\Users\Admin\AppData\Local\NexaSoft Scanners\NexaScan.js'" /sc minute /mo 5 /F
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3056
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /create /tn "Usa" /tr "wscript //B 'C:\Users\Admin\AppData\Local\NexaSoft Scanners\NexaScan.js'" /sc minute /mo 5 /F
          3⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:1544
      • C:\Windows\SysWOW64\cmd.exe
        cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NexaScan.url" & echo URL="C:\Users\Admin\AppData\Local\NexaSoft Scanners\NexaScan.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NexaScan.url" & exit
        2⤵
        • Drops startup file
        • System Location Discovery: System Language Discovery
        PID:2292

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\769621\H

      Filesize

      1.0MB

      MD5

      37ccc3ad22fbce5ece083f71524edbe4

      SHA1

      8ae7e109a6d632baf975cc0636fea6c38a5c7e26

      SHA256

      b3b36f30304c2961af004ab7bb804346429bab668a26178387bdaa8e0d8abddf

      SHA512

      6e2f7632bf2f82f5af41333d4677d76a0a7c6c3b860fe38569d9e3dc7f8a9fde3da0c52a4aff02dc6264aa76978a579adcc11f3e2026dc4a9f8f74b3712c546d

    • C:\Users\Admin\AppData\Local\Temp\Appreciation

      Filesize

      51KB

      MD5

      01907d2aba629cb93a97869d41acf8cb

      SHA1

      dd6233011392360b95bbf0b305d7035ff629dc1b

      SHA256

      e43d5b9eebe7866f6591065cb320fe1fa42caff29c580517c635d36c69c3d096

      SHA512

      56c156d59014376c56e6272421830e442dd16c521675f70b9c8527b95f23e71374fa5910ead9a2f44e3ff62494d9e1fe5189c7d2f9e6375a529476b57d5739f6

    • C:\Users\Admin\AppData\Local\Temp\Avg

      Filesize

      79KB

      MD5

      5041177b05855b7714f8d57f7195108f

      SHA1

      fa9dd5334ca6c1e6c52f86ae585c8b4991f03a84

      SHA256

      2c1c4bcc565dae24f012f0a838f4f1e0374c8373fcf18d53e05cb35bb7922c47

      SHA512

      1d17838d0143b738951e9d1b58dbd1b8a07a5a5bf051b30fe7d9e67f2d3c7d315452d14455341f03aa755216fc15654dc07743c276e55d95ed0853f5c936f401

    • C:\Users\Admin\AppData\Local\Temp\Bags

      Filesize

      79KB

      MD5

      e675c77569ff3cd135967d14bb761d18

      SHA1

      edc6baac1be50cd797f78dcf5bc72e32cf615778

      SHA256

      8224d7fb548d1b7b9522fa16f5431b5716e62d73f933db442cd6354e7e0910de

      SHA512

      7afb9bca993b2e7892d7bbdc93c0bfb5985b0de2ef7b986d8c12f159383237e23d0451e8dd9096099ce17f49d85fd2fafc4dc2e49baa95d8527abfbb0e390d07

    • C:\Users\Admin\AppData\Local\Temp\Bathroom

      Filesize

      90KB

      MD5

      44b27f4609f0b3e9d80404d22e4540bc

      SHA1

      28d001b55d0e6a4f24d65102cf82be66f74894d6

      SHA256

      a5020e23f3e56db8f6a1ce3537bf0610cd8480f2bea03a8238db573b928d651d

      SHA512

      732b41def52ca6b9f0128775b5e9d4264fd0c95cfd96d3c65c6999dcfbde8baf47a39411809c6a9258533608d890fe9377f698ec9f923311cef799e19bc5a626

    • C:\Users\Admin\AppData\Local\Temp\Broker

      Filesize

      5KB

      MD5

      92dd17df90cf401da0b85792f0b4dbd8

      SHA1

      366b4f6415a6bc6152717384ad38cbf5165cb0b9

      SHA256

      6f4db52f73906600363d076d3200b50b689f15a82d9888bf786eb35e391447ff

      SHA512

      c6cff3043a2a5de3a96df8297e4cede397ae17872d6d0b43ad815abd2b66f3100ce8ab79ea9d717e250be844b1ba6205a0207699821945049bcba59266c0f408

    • C:\Users\Admin\AppData\Local\Temp\Calculate

      Filesize

      90KB

      MD5

      40f4545087574a7a9b32505fb8b43eb4

      SHA1

      a793e3e4142178dbc4529ac995475576c01ab889

      SHA256

      c1d3681b5322c5418c117c01afcc10027dcb5da29609b7f01e6e0e8957a223a4

      SHA512

      3c0bcbf6b3303dad7ea95af5c370c2146aa0d6eca51de5bccd2f01e2c4d2373c716440408d28959ba3faceec4fb954116022943346fa2334b7d97e3396312f90

    • C:\Users\Admin\AppData\Local\Temp\Chapter

      Filesize

      10KB

      MD5

      2a0ac99f22cb9f050fecba113d32ab11

      SHA1

      2264a4bbeb99cf9a9b9ec55b3a8a420c604b9027

      SHA256

      e0276498ff1a1d663adffdbe5d2c99bb9572fa13ee07259314d5a6303a59f92c

      SHA512

      faa145ae91a70d647ca106cab7760181351689bc87087fa1d551fd12760fd8c022fb5ee5b1bfbfcd2899e6c9820f93b11c9f01f49256cff3ea617f4bb3ee1460

    • C:\Users\Admin\AppData\Local\Temp\Codes

      Filesize

      83KB

      MD5

      2fa9afd64847d6d77553141cc94e14dd

      SHA1

      cf656ea0f18a24414a2f6573d1dd7928dec19377

      SHA256

      03af540f7333c523bbcc35ec9b3087ac090eaa167478979a7bcddf50fa0d1239

      SHA512

      503ec0478f61e446434c4013b67b68d7c4eef349d79a02ed90d5aad2e2c8254c4e2cc18676736f33eab4f1d697e5dcd05c61644c3b3105c32cbe0c5c199ffbc4

    • C:\Users\Admin\AppData\Local\Temp\Director

      Filesize

      86KB

      MD5

      88381e7c072f5713edf974f2982c017d

      SHA1

      40a75be05452c2fe732092c43236a6aad22e239b

      SHA256

      81b49578a4c63f61c0e63b0655cac153f1108064a6084c0340470eb43a35f807

      SHA512

      f738e3940460beb52afdbc28d1b555e743926832c0ddc6a9b8a8f6f8e5648c00f9805721e3b92984c6c64eb6a2e28f00085c79c79bfeee9b326376d81b6ec603

    • C:\Users\Admin\AppData\Local\Temp\Hourly

      Filesize

      98KB

      MD5

      b58fa29736b8d2e85deeb6f3fd673112

      SHA1

      9e4b4624122efae3ede99d7c4888f3b5734c363f

      SHA256

      86ae223e0b7870824728f4099c942879fbd14740f576fe0fb71e06bf4d78da6b

      SHA512

      5089419d425234784e02f7dd68bf10f722b646270e5f01e4d9bc8d550c4247474505cd28d2c3f1c8220b033c9697e7446ae3c8ab22ecde040d09ecb3cd80f246

    • C:\Users\Admin\AppData\Local\Temp\Human

      Filesize

      20KB

      MD5

      8356ce4909006a870dd166dbf1cc26de

      SHA1

      04df14c4f75f0edc6a74e354631368aa6c0fc9ab

      SHA256

      c3d68e7c06a5f781489c9f4e4c3211509582bde86ac35d5f2212970cb071d1d4

      SHA512

      4549312b0db6401aa3341582361fe3a28d144d2b7a9ff92461f8492ff1ffbbc52c96aa73eb0175430c4c0eeecb251aec871f35dacc7cbc85de51f73fd89a9e9c

    • C:\Users\Admin\AppData\Local\Temp\Mr

      Filesize

      54KB

      MD5

      a01f16c141c3e31585624b2753051961

      SHA1

      dc1374ac16bc5be728fafae1d138db18c7b941cf

      SHA256

      d16fdcbe34ed63cb6a50fe3d212c30c7d5a19e23dd1b320c864754b094b7d73c

      SHA512

      190342bab7570112bb10404aba9e95e2919c0a3fa358ed84875738cd5373340604128d317004521ff8f6b658e46f100c79dc5b69ddf5cc4e204066009bd25d9b

    • C:\Users\Admin\AppData\Local\Temp\Para

      Filesize

      91KB

      MD5

      bb07c6eeb944116342c650ef64b7b665

      SHA1

      1cb46f51b270a043d6ea3aac2825cd62e797fd45

      SHA256

      a081f326b1693545aadb4bb0c8cf96180fe6b3b68eaa099001179842e5905911

      SHA512

      e9dae5e9599232ed99256bf7298f000def3aea848a1e188f3e1b0082f7b2087cadfa36d6e5b1316f4bb073fe4259623de9b32bd02095788946b0252c6b799b72

    • C:\Users\Admin\AppData\Local\Temp\Pipeline

      Filesize

      81KB

      MD5

      0884872b25f9b6608712fd94ed566f48

      SHA1

      c0662779fcff17a5ca7990b0bff4bf0aa477f790

      SHA256

      3e2755fc6a4d191c1c3cdeba3d9d9c11e38d78fc66ce7e6e44eb936bc215f2bd

      SHA512

      6d061fc4d4c81d2636efe2191c766c8ac838dd30f71db977ba18a545f5946eb03cb0013150fea6d86ab5c0c349ae6b5cba1791ca8817d0e60029a575264fce2f

    • C:\Users\Admin\AppData\Local\Temp\Ratio

      Filesize

      77KB

      MD5

      0ea143338442ca39f8aa5cfbac951ec5

      SHA1

      e6f49c70f352cf0d0d9277825072f8bc6f104f41

      SHA256

      340b71d6e192ee3fe312eba7cce1394650c75b4ed2f3ab8d64731d62cbee3929

      SHA512

      67afe1a340dde1fb40202975dbc80f5bfed5fc992fc9fc8406c51f31ded63cb1357efbb50f72f02688792222e5f927f4dfce2b63589c3ff687981a0793d3286f

    • C:\Users\Admin\AppData\Local\Temp\Stock

      Filesize

      66KB

      MD5

      d0d278b6bd89ed264eb40af00bbcbe5f

      SHA1

      45a743fb15cea73ebfe44da6ce246ff30bde83ad

      SHA256

      01e4dece06c5951d88a9e24527d7b547c590aaf304038ad89fe72903954dad55

      SHA512

      9afa219d2f5045f1bf8b78e212404e3b79326543076ab33340b7cadd3205db937a2e308ec9aaa26183093abee9ce07afd77c416bc751aa81daafd5491fe6c2ec

    • C:\Users\Admin\AppData\Local\Temp\Submitted

      Filesize

      867KB

      MD5

      c3faec7455371327d7f35523501ea2ab

      SHA1

      73d700d6a3eaf293f4b9a92d6b33014b95639239

      SHA256

      ff308042f1f7e60982684becc7e523bd8e2d59a94dbdcceceb1ebc18115b8834

      SHA512

      f4a89f638a23452d2a8a9d0814a6b86f790d492fa6ef1894e38c65ea290099a9c3901f74a16ca1391032f6b367890a60e72fb21cd5a82e21467f2ca2b6c41802

    • C:\Users\Admin\AppData\Local\Temp\tmpE17B.tmp

      Filesize

      20KB

      MD5

      c9ff7748d8fcef4cf84a5501e996a641

      SHA1

      02867e5010f62f97ebb0cfb32cb3ede9449fe0c9

      SHA256

      4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988

      SHA512

      d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73

    • \Users\Admin\AppData\Local\Temp\769621\RegAsm.exe

      Filesize

      63KB

      MD5

      b58b926c3574d28d5b7fdd2ca3ec30d5

      SHA1

      d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

      SHA256

      6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

      SHA512

      b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

    • \Users\Admin\AppData\Local\Temp\769621\Shore.pif

      Filesize

      872KB

      MD5

      18ce19b57f43ce0a5af149c96aecc685

      SHA1

      1bd5ca29fc35fc8ac346f23b155337c5b28bbc36

      SHA256

      d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd

      SHA512

      a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558

    • memory/1508-293-0x0000000000290000-0x0000000000356000-memory.dmp

      Filesize

      792KB

    • memory/1508-295-0x0000000000290000-0x0000000000356000-memory.dmp

      Filesize

      792KB

    • memory/1508-296-0x0000000000290000-0x0000000000356000-memory.dmp

      Filesize

      792KB