Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-11-2024 20:17

General

  • Target

    4350899d04502f9fb9ea63fda1820c5aea1d575f7893ef7edde5c661c5495b6b.exe

  • Size

    1.6MB

  • MD5

    4fabe26b8e5aafb4335ab4834eb83fbd

  • SHA1

    f310621024ffaab61fb03bde7d63bb4c0c376ebb

  • SHA256

    4350899d04502f9fb9ea63fda1820c5aea1d575f7893ef7edde5c661c5495b6b

  • SHA512

    624863fabc15bd8846639a8524a01e9ef30d146e348cfee808cfe298e8c9e8ff61c57fb86e0f017623d27e413fdcd132c78df3308b35b2d5176430d556795b48

  • SSDEEP

    24576:6C6SxJ8tzEnpouKAa3R3UGI2416CTLTrSPQt3jBoPCKMuLwYsRLoGBpuk:MdEnqAaR7IvTPrSAlKMvhJV

Malware Config

Signatures

  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 15 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3444
      • C:\Users\Admin\AppData\Local\Temp\4350899d04502f9fb9ea63fda1820c5aea1d575f7893ef7edde5c661c5495b6b.exe
        "C:\Users\Admin\AppData\Local\Temp\4350899d04502f9fb9ea63fda1820c5aea1d575f7893ef7edde5c661c5495b6b.exe"
        2⤵
        • Checks computer location settings
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1384
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c copy Chapter Chapter.bat & Chapter.bat
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4736
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:3116
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "wrsa opssvc"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3944
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:4012
          • C:\Windows\SysWOW64\findstr.exe
            findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3788
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c md 769621
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2168
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V "DivingDonorUsefulGeorge" Broker
            4⤵
            • System Location Discovery: System Language Discovery
            PID:4452
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c copy /b ..\Appreciation + ..\Para + ..\Hourly + ..\Ratio + ..\Codes + ..\Director + ..\Pipeline + ..\Mr + ..\Avg + ..\Calculate + ..\Bathroom + ..\Stock + ..\Bags + ..\Human H
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3440
          • C:\Users\Admin\AppData\Local\Temp\769621\Shore.pif
            Shore.pif H
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:1236
            • C:\Users\Admin\AppData\Local\Temp\769621\RegAsm.exe
              C:\Users\Admin\AppData\Local\Temp\769621\RegAsm.exe
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:1080
          • C:\Windows\SysWOW64\choice.exe
            choice /d y /t 5
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1612
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c schtasks.exe /create /tn "Usa" /tr "wscript //B 'C:\Users\Admin\AppData\Local\NexaSoft Scanners\NexaScan.js'" /sc minute /mo 5 /F
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2792
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /create /tn "Usa" /tr "wscript //B 'C:\Users\Admin\AppData\Local\NexaSoft Scanners\NexaScan.js'" /sc minute /mo 5 /F
          3⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:4376
      • C:\Windows\SysWOW64\cmd.exe
        cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NexaScan.url" & echo URL="C:\Users\Admin\AppData\Local\NexaSoft Scanners\NexaScan.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NexaScan.url" & exit
        2⤵
        • Drops startup file
        • System Location Discovery: System Language Discovery
        PID:900

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\769621\H

      Filesize

      1.0MB

      MD5

      37ccc3ad22fbce5ece083f71524edbe4

      SHA1

      8ae7e109a6d632baf975cc0636fea6c38a5c7e26

      SHA256

      b3b36f30304c2961af004ab7bb804346429bab668a26178387bdaa8e0d8abddf

      SHA512

      6e2f7632bf2f82f5af41333d4677d76a0a7c6c3b860fe38569d9e3dc7f8a9fde3da0c52a4aff02dc6264aa76978a579adcc11f3e2026dc4a9f8f74b3712c546d

    • C:\Users\Admin\AppData\Local\Temp\769621\RegAsm.exe

      Filesize

      63KB

      MD5

      0d5df43af2916f47d00c1573797c1a13

      SHA1

      230ab5559e806574d26b4c20847c368ed55483b0

      SHA256

      c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc

      SHA512

      f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2

    • C:\Users\Admin\AppData\Local\Temp\769621\Shore.pif

      Filesize

      872KB

      MD5

      18ce19b57f43ce0a5af149c96aecc685

      SHA1

      1bd5ca29fc35fc8ac346f23b155337c5b28bbc36

      SHA256

      d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd

      SHA512

      a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558

    • C:\Users\Admin\AppData\Local\Temp\Appreciation

      Filesize

      51KB

      MD5

      01907d2aba629cb93a97869d41acf8cb

      SHA1

      dd6233011392360b95bbf0b305d7035ff629dc1b

      SHA256

      e43d5b9eebe7866f6591065cb320fe1fa42caff29c580517c635d36c69c3d096

      SHA512

      56c156d59014376c56e6272421830e442dd16c521675f70b9c8527b95f23e71374fa5910ead9a2f44e3ff62494d9e1fe5189c7d2f9e6375a529476b57d5739f6

    • C:\Users\Admin\AppData\Local\Temp\Avg

      Filesize

      79KB

      MD5

      5041177b05855b7714f8d57f7195108f

      SHA1

      fa9dd5334ca6c1e6c52f86ae585c8b4991f03a84

      SHA256

      2c1c4bcc565dae24f012f0a838f4f1e0374c8373fcf18d53e05cb35bb7922c47

      SHA512

      1d17838d0143b738951e9d1b58dbd1b8a07a5a5bf051b30fe7d9e67f2d3c7d315452d14455341f03aa755216fc15654dc07743c276e55d95ed0853f5c936f401

    • C:\Users\Admin\AppData\Local\Temp\Bags

      Filesize

      79KB

      MD5

      e675c77569ff3cd135967d14bb761d18

      SHA1

      edc6baac1be50cd797f78dcf5bc72e32cf615778

      SHA256

      8224d7fb548d1b7b9522fa16f5431b5716e62d73f933db442cd6354e7e0910de

      SHA512

      7afb9bca993b2e7892d7bbdc93c0bfb5985b0de2ef7b986d8c12f159383237e23d0451e8dd9096099ce17f49d85fd2fafc4dc2e49baa95d8527abfbb0e390d07

    • C:\Users\Admin\AppData\Local\Temp\Bathroom

      Filesize

      90KB

      MD5

      44b27f4609f0b3e9d80404d22e4540bc

      SHA1

      28d001b55d0e6a4f24d65102cf82be66f74894d6

      SHA256

      a5020e23f3e56db8f6a1ce3537bf0610cd8480f2bea03a8238db573b928d651d

      SHA512

      732b41def52ca6b9f0128775b5e9d4264fd0c95cfd96d3c65c6999dcfbde8baf47a39411809c6a9258533608d890fe9377f698ec9f923311cef799e19bc5a626

    • C:\Users\Admin\AppData\Local\Temp\Broker

      Filesize

      5KB

      MD5

      92dd17df90cf401da0b85792f0b4dbd8

      SHA1

      366b4f6415a6bc6152717384ad38cbf5165cb0b9

      SHA256

      6f4db52f73906600363d076d3200b50b689f15a82d9888bf786eb35e391447ff

      SHA512

      c6cff3043a2a5de3a96df8297e4cede397ae17872d6d0b43ad815abd2b66f3100ce8ab79ea9d717e250be844b1ba6205a0207699821945049bcba59266c0f408

    • C:\Users\Admin\AppData\Local\Temp\Calculate

      Filesize

      90KB

      MD5

      40f4545087574a7a9b32505fb8b43eb4

      SHA1

      a793e3e4142178dbc4529ac995475576c01ab889

      SHA256

      c1d3681b5322c5418c117c01afcc10027dcb5da29609b7f01e6e0e8957a223a4

      SHA512

      3c0bcbf6b3303dad7ea95af5c370c2146aa0d6eca51de5bccd2f01e2c4d2373c716440408d28959ba3faceec4fb954116022943346fa2334b7d97e3396312f90

    • C:\Users\Admin\AppData\Local\Temp\Chapter

      Filesize

      10KB

      MD5

      2a0ac99f22cb9f050fecba113d32ab11

      SHA1

      2264a4bbeb99cf9a9b9ec55b3a8a420c604b9027

      SHA256

      e0276498ff1a1d663adffdbe5d2c99bb9572fa13ee07259314d5a6303a59f92c

      SHA512

      faa145ae91a70d647ca106cab7760181351689bc87087fa1d551fd12760fd8c022fb5ee5b1bfbfcd2899e6c9820f93b11c9f01f49256cff3ea617f4bb3ee1460

    • C:\Users\Admin\AppData\Local\Temp\Codes

      Filesize

      83KB

      MD5

      2fa9afd64847d6d77553141cc94e14dd

      SHA1

      cf656ea0f18a24414a2f6573d1dd7928dec19377

      SHA256

      03af540f7333c523bbcc35ec9b3087ac090eaa167478979a7bcddf50fa0d1239

      SHA512

      503ec0478f61e446434c4013b67b68d7c4eef349d79a02ed90d5aad2e2c8254c4e2cc18676736f33eab4f1d697e5dcd05c61644c3b3105c32cbe0c5c199ffbc4

    • C:\Users\Admin\AppData\Local\Temp\Director

      Filesize

      86KB

      MD5

      88381e7c072f5713edf974f2982c017d

      SHA1

      40a75be05452c2fe732092c43236a6aad22e239b

      SHA256

      81b49578a4c63f61c0e63b0655cac153f1108064a6084c0340470eb43a35f807

      SHA512

      f738e3940460beb52afdbc28d1b555e743926832c0ddc6a9b8a8f6f8e5648c00f9805721e3b92984c6c64eb6a2e28f00085c79c79bfeee9b326376d81b6ec603

    • C:\Users\Admin\AppData\Local\Temp\Hourly

      Filesize

      98KB

      MD5

      b58fa29736b8d2e85deeb6f3fd673112

      SHA1

      9e4b4624122efae3ede99d7c4888f3b5734c363f

      SHA256

      86ae223e0b7870824728f4099c942879fbd14740f576fe0fb71e06bf4d78da6b

      SHA512

      5089419d425234784e02f7dd68bf10f722b646270e5f01e4d9bc8d550c4247474505cd28d2c3f1c8220b033c9697e7446ae3c8ab22ecde040d09ecb3cd80f246

    • C:\Users\Admin\AppData\Local\Temp\Human

      Filesize

      20KB

      MD5

      8356ce4909006a870dd166dbf1cc26de

      SHA1

      04df14c4f75f0edc6a74e354631368aa6c0fc9ab

      SHA256

      c3d68e7c06a5f781489c9f4e4c3211509582bde86ac35d5f2212970cb071d1d4

      SHA512

      4549312b0db6401aa3341582361fe3a28d144d2b7a9ff92461f8492ff1ffbbc52c96aa73eb0175430c4c0eeecb251aec871f35dacc7cbc85de51f73fd89a9e9c

    • C:\Users\Admin\AppData\Local\Temp\Mr

      Filesize

      54KB

      MD5

      a01f16c141c3e31585624b2753051961

      SHA1

      dc1374ac16bc5be728fafae1d138db18c7b941cf

      SHA256

      d16fdcbe34ed63cb6a50fe3d212c30c7d5a19e23dd1b320c864754b094b7d73c

      SHA512

      190342bab7570112bb10404aba9e95e2919c0a3fa358ed84875738cd5373340604128d317004521ff8f6b658e46f100c79dc5b69ddf5cc4e204066009bd25d9b

    • C:\Users\Admin\AppData\Local\Temp\Para

      Filesize

      91KB

      MD5

      bb07c6eeb944116342c650ef64b7b665

      SHA1

      1cb46f51b270a043d6ea3aac2825cd62e797fd45

      SHA256

      a081f326b1693545aadb4bb0c8cf96180fe6b3b68eaa099001179842e5905911

      SHA512

      e9dae5e9599232ed99256bf7298f000def3aea848a1e188f3e1b0082f7b2087cadfa36d6e5b1316f4bb073fe4259623de9b32bd02095788946b0252c6b799b72

    • C:\Users\Admin\AppData\Local\Temp\Pipeline

      Filesize

      81KB

      MD5

      0884872b25f9b6608712fd94ed566f48

      SHA1

      c0662779fcff17a5ca7990b0bff4bf0aa477f790

      SHA256

      3e2755fc6a4d191c1c3cdeba3d9d9c11e38d78fc66ce7e6e44eb936bc215f2bd

      SHA512

      6d061fc4d4c81d2636efe2191c766c8ac838dd30f71db977ba18a545f5946eb03cb0013150fea6d86ab5c0c349ae6b5cba1791ca8817d0e60029a575264fce2f

    • C:\Users\Admin\AppData\Local\Temp\Ratio

      Filesize

      77KB

      MD5

      0ea143338442ca39f8aa5cfbac951ec5

      SHA1

      e6f49c70f352cf0d0d9277825072f8bc6f104f41

      SHA256

      340b71d6e192ee3fe312eba7cce1394650c75b4ed2f3ab8d64731d62cbee3929

      SHA512

      67afe1a340dde1fb40202975dbc80f5bfed5fc992fc9fc8406c51f31ded63cb1357efbb50f72f02688792222e5f927f4dfce2b63589c3ff687981a0793d3286f

    • C:\Users\Admin\AppData\Local\Temp\Stock

      Filesize

      66KB

      MD5

      d0d278b6bd89ed264eb40af00bbcbe5f

      SHA1

      45a743fb15cea73ebfe44da6ce246ff30bde83ad

      SHA256

      01e4dece06c5951d88a9e24527d7b547c590aaf304038ad89fe72903954dad55

      SHA512

      9afa219d2f5045f1bf8b78e212404e3b79326543076ab33340b7cadd3205db937a2e308ec9aaa26183093abee9ce07afd77c416bc751aa81daafd5491fe6c2ec

    • C:\Users\Admin\AppData\Local\Temp\Submitted

      Filesize

      867KB

      MD5

      c3faec7455371327d7f35523501ea2ab

      SHA1

      73d700d6a3eaf293f4b9a92d6b33014b95639239

      SHA256

      ff308042f1f7e60982684becc7e523bd8e2d59a94dbdcceceb1ebc18115b8834

      SHA512

      f4a89f638a23452d2a8a9d0814a6b86f790d492fa6ef1894e38c65ea290099a9c3901f74a16ca1391032f6b367890a60e72fb21cd5a82e21467f2ca2b6c41802

    • C:\Users\Admin\AppData\Local\Temp\tmp8D69.tmp

      Filesize

      20KB

      MD5

      49693267e0adbcd119f9f5e02adf3a80

      SHA1

      3ba3d7f89b8ad195ca82c92737e960e1f2b349df

      SHA256

      d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f

      SHA512

      b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2

    • memory/1080-293-0x0000000005980000-0x0000000005F24000-memory.dmp

      Filesize

      5.6MB

    • memory/1080-292-0x00000000052B0000-0x0000000005342000-memory.dmp

      Filesize

      584KB

    • memory/1080-294-0x0000000005720000-0x00000000058E2000-memory.dmp

      Filesize

      1.8MB

    • memory/1080-296-0x00000000053F0000-0x0000000005440000-memory.dmp

      Filesize

      320KB

    • memory/1080-295-0x0000000005450000-0x00000000054C6000-memory.dmp

      Filesize

      472KB

    • memory/1080-297-0x00000000053A0000-0x00000000053AA000-memory.dmp

      Filesize

      40KB

    • memory/1080-298-0x0000000007060000-0x000000000758C000-memory.dmp

      Filesize

      5.2MB

    • memory/1080-299-0x0000000006B90000-0x0000000006BAE000-memory.dmp

      Filesize

      120KB

    • memory/1080-300-0x0000000006C90000-0x0000000006CF6000-memory.dmp

      Filesize

      408KB

    • memory/1080-289-0x0000000000D50000-0x0000000000E16000-memory.dmp

      Filesize

      792KB

    • memory/1080-313-0x0000000007DA0000-0x0000000007DAA000-memory.dmp

      Filesize

      40KB

    • memory/1080-314-0x0000000006850000-0x0000000006862000-memory.dmp

      Filesize

      72KB

    • memory/1080-315-0x00000000068B0000-0x00000000068EC000-memory.dmp

      Filesize

      240KB