Analysis

  • max time kernel
    117s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/12/2024, 02:54 UTC

General

  • Target

    aaca1d0a684091ceb9367a917719e5593de9337ec857afeb51719bf8994834cf.exe

  • Size

    768KB

  • MD5

    f9026db46d3aba99ae513ebad80bbb6c

  • SHA1

    fba300cffc1b94f5e95fde5b92b1616ff9e91808

  • SHA256

    aaca1d0a684091ceb9367a917719e5593de9337ec857afeb51719bf8994834cf

  • SHA512

    b864349a78c59e9646f0431245be4f0070f6af84369788b551b2fbc20eee6bd8a4897df9190fc420b5bfe1d1407814b324245039443329e723b7172210c3f0a4

  • SSDEEP

    12288:uvsXZv8km0OHcbGbvzWHz0HnquwQU+S0ssFWylkkoAbtEhTwfNqbYS2VbICKMIUr:ZfPz0HbdS0ssFlSjtMR

Malware Config

Signatures

  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aaca1d0a684091ceb9367a917719e5593de9337ec857afeb51719bf8994834cf.exe
    "C:\Users\Admin\AppData\Local\Temp\aaca1d0a684091ceb9367a917719e5593de9337ec857afeb51719bf8994834cf.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:3832

Network

  • flag-us
    DNS
    8.8.8.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.8.8.8.in-addr.arpa
    IN PTR
    Response
    8.8.8.8.in-addr.arpa
    IN PTR
    dnsgoogle
  • flag-us
    DNS
    97.17.167.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    97.17.167.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    236.124.147.185.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    236.124.147.185.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    172.210.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.210.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    14.160.190.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    14.160.190.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-ru
    GET
    http://185.147.124.236:9000/wbinjget?q=E20352CAF9DA996AA4158743ACD6740D
    aaca1d0a684091ceb9367a917719e5593de9337ec857afeb51719bf8994834cf.exe
    Remote address:
    185.147.124.236:9000
    Request
    GET /wbinjget?q=E20352CAF9DA996AA4158743ACD6740D HTTP/1.1
    Host: 185.147.124.236:9000
    Connection: Keep-Alive
    Response
    HTTP/1.1 200 OK
    Cache-Control: no-cache
    Content-Length: 0
    Server: Microsoft-HTTPAPI/2.0
    Access-Control-Allow-Origin: *
    Access-Control-Allow-Methods: OPTIONS, HEAD, GET, PUT, POST, DELETE, PATCH
    Access-Control-Allow-Headers: *
    Access-Control-Expose-Headers:
    Accept: */*
    Accept-Language: en-US, en
    Accept-Charset: ISO-8859-1, utf-8
    Host: *:9000
    Date: Fri, 13 Dec 2024 02:54:21 GMT
    Connection: close
  • flag-us
    DNS
    196.249.167.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    196.249.167.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    209.205.72.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    209.205.72.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    200.163.202.172.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    200.163.202.172.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    206.23.85.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    206.23.85.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    73.190.18.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    73.190.18.2.in-addr.arpa
    IN PTR
    Response
    73.190.18.2.in-addr.arpa
    IN PTR
    a2-18-190-73deploystaticakamaitechnologiescom
  • flag-us
    DNS
    11.227.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    11.227.111.52.in-addr.arpa
    IN PTR
    Response
  • 185.147.124.236:15647
    aaca1d0a684091ceb9367a917719e5593de9337ec857afeb51719bf8994834cf.exe
    988 B
    756 B
    13
    8
  • 185.147.124.236:9000
    http://185.147.124.236:9000/wbinjget?q=E20352CAF9DA996AA4158743ACD6740D
    http
    aaca1d0a684091ceb9367a917719e5593de9337ec857afeb51719bf8994834cf.exe
    343 B
    546 B
    5
    3

    HTTP Request

    GET http://185.147.124.236:9000/wbinjget?q=E20352CAF9DA996AA4158743ACD6740D

    HTTP Response

    200
  • 8.8.8.8:53
    8.8.8.8.in-addr.arpa
    dns
    66 B
    90 B
    1
    1

    DNS Request

    8.8.8.8.in-addr.arpa

  • 8.8.8.8:53
    97.17.167.52.in-addr.arpa
    dns
    71 B
    145 B
    1
    1

    DNS Request

    97.17.167.52.in-addr.arpa

  • 8.8.8.8:53
    236.124.147.185.in-addr.arpa
    dns
    74 B
    134 B
    1
    1

    DNS Request

    236.124.147.185.in-addr.arpa

  • 8.8.8.8:53
    172.210.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.210.232.199.in-addr.arpa

  • 8.8.8.8:53
    14.160.190.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    14.160.190.20.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    196.249.167.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    196.249.167.52.in-addr.arpa

  • 8.8.8.8:53
    209.205.72.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    209.205.72.20.in-addr.arpa

  • 8.8.8.8:53
    200.163.202.172.in-addr.arpa
    dns
    74 B
    160 B
    1
    1

    DNS Request

    200.163.202.172.in-addr.arpa

  • 8.8.8.8:53
    206.23.85.13.in-addr.arpa
    dns
    71 B
    145 B
    1
    1

    DNS Request

    206.23.85.13.in-addr.arpa

  • 8.8.8.8:53
    73.190.18.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    73.190.18.2.in-addr.arpa

  • 8.8.8.8:53
    11.227.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    11.227.111.52.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpD322.tmp

    Filesize

    20KB

    MD5

    49693267e0adbcd119f9f5e02adf3a80

    SHA1

    3ba3d7f89b8ad195ca82c92737e960e1f2b349df

    SHA256

    d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f

    SHA512

    b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2

  • memory/3832-4-0x0000000005070000-0x0000000005232000-memory.dmp

    Filesize

    1.8MB

  • memory/3832-11-0x0000000005B70000-0x0000000005BD6000-memory.dmp

    Filesize

    408KB

  • memory/3832-3-0x0000000005300000-0x00000000058A4000-memory.dmp

    Filesize

    5.6MB

  • memory/3832-0-0x00000000745EE000-0x00000000745EF000-memory.dmp

    Filesize

    4KB

  • memory/3832-5-0x00000000745E0000-0x0000000074D90000-memory.dmp

    Filesize

    7.7MB

  • memory/3832-6-0x0000000004D50000-0x0000000004DC6000-memory.dmp

    Filesize

    472KB

  • memory/3832-2-0x0000000004CB0000-0x0000000004D42000-memory.dmp

    Filesize

    584KB

  • memory/3832-9-0x0000000005EE0000-0x000000000640C000-memory.dmp

    Filesize

    5.2MB

  • memory/3832-7-0x0000000004C40000-0x0000000004C90000-memory.dmp

    Filesize

    320KB

  • memory/3832-10-0x00000000052D0000-0x00000000052EE000-memory.dmp

    Filesize

    120KB

  • memory/3832-8-0x0000000004BE0000-0x0000000004BEA000-memory.dmp

    Filesize

    40KB

  • memory/3832-1-0x0000000000160000-0x0000000000226000-memory.dmp

    Filesize

    792KB

  • memory/3832-24-0x0000000007690000-0x000000000769A000-memory.dmp

    Filesize

    40KB

  • memory/3832-25-0x00000000745EE000-0x00000000745EF000-memory.dmp

    Filesize

    4KB

  • memory/3832-26-0x00000000745E0000-0x0000000074D90000-memory.dmp

    Filesize

    7.7MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.