Analysis
-
max time kernel
96s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 19:29
Static task
static1
Behavioral task
behavioral1
Sample
babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.exe
Resource
win10v2004-20241007-en
General
-
Target
babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.exe
-
Size
3.4MB
-
MD5
e81e5f0016aae2d4f9b2ed1126a24030
-
SHA1
369b87b75020cd152b97427c85e8c8a89fe0c1e9
-
SHA256
babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9
-
SHA512
88c0d4c677e5e3b94b159933e7e60aa87c064ba6df98450265a4b092c07ef75f15297fc7582a1b50ff9bfa9c3a57752ebf19aac41268d60b7efdfcb73f6d2e65
-
SSDEEP
98304:SwRElZ33Li0XUU3FMi9+Q4m1PQKqdiCanFQyRnNlz:ufnGcUU0xm1PsMjXrz
Malware Config
Signatures
-
SectopRAT payload 1 IoCs
resource yara_rule behavioral2/memory/2472-57-0x0000000000400000-0x00000000004C6000-memory.dmp family_sectoprat -
Sectoprat family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.tmp Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation electronics.exe -
Executes dropped EXE 4 IoCs
pid Process 4404 babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.tmp 4304 babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.tmp 3980 electronics.exe 4776 electronics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\afhfcca = "\"C:\\ddffhkh\\AutoIt3.exe\" C:\\ddffhkh\\afhfcca.a3x" electronics.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 34 pastebin.com 35 pastebin.com -
Enumerates processes with tasklist 1 TTPs 6 IoCs
pid Process 1988 tasklist.exe 2300 tasklist.exe 4392 tasklist.exe 3408 tasklist.exe 3572 tasklist.exe 3596 tasklist.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4776 set thread context of 2472 4776 electronics.exe 121 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language electronics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language electronics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4864 cmd.exe 4484 PING.EXE -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 electronics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString electronics.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4484 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4304 babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.tmp 4304 babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.tmp -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 1988 tasklist.exe Token: SeDebugPrivilege 2300 tasklist.exe Token: SeDebugPrivilege 4392 tasklist.exe Token: SeDebugPrivilege 3408 tasklist.exe Token: SeDebugPrivilege 3572 tasklist.exe Token: SeDebugPrivilege 3596 tasklist.exe Token: SeDebugPrivilege 2472 MSBuild.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4304 babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.tmp -
Suspicious use of WriteProcessMemory 62 IoCs
description pid Process procid_target PID 4880 wrote to memory of 4404 4880 babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.exe 82 PID 4880 wrote to memory of 4404 4880 babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.exe 82 PID 4880 wrote to memory of 4404 4880 babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.exe 82 PID 4404 wrote to memory of 4712 4404 babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.tmp 83 PID 4404 wrote to memory of 4712 4404 babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.tmp 83 PID 4404 wrote to memory of 4712 4404 babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.tmp 83 PID 4712 wrote to memory of 4304 4712 babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.exe 84 PID 4712 wrote to memory of 4304 4712 babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.exe 84 PID 4712 wrote to memory of 4304 4712 babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.exe 84 PID 4304 wrote to memory of 2372 4304 babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.tmp 89 PID 4304 wrote to memory of 2372 4304 babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.tmp 89 PID 2372 wrote to memory of 1988 2372 cmd.exe 91 PID 2372 wrote to memory of 1988 2372 cmd.exe 91 PID 2372 wrote to memory of 3420 2372 cmd.exe 92 PID 2372 wrote to memory of 3420 2372 cmd.exe 92 PID 4304 wrote to memory of 4656 4304 babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.tmp 93 PID 4304 wrote to memory of 4656 4304 babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.tmp 93 PID 4656 wrote to memory of 2300 4656 cmd.exe 95 PID 4656 wrote to memory of 2300 4656 cmd.exe 95 PID 4656 wrote to memory of 4136 4656 cmd.exe 96 PID 4656 wrote to memory of 4136 4656 cmd.exe 96 PID 4304 wrote to memory of 4196 4304 babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.tmp 97 PID 4304 wrote to memory of 4196 4304 babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.tmp 97 PID 4196 wrote to memory of 4392 4196 cmd.exe 99 PID 4196 wrote to memory of 4392 4196 cmd.exe 99 PID 4196 wrote to memory of 4124 4196 cmd.exe 100 PID 4196 wrote to memory of 4124 4196 cmd.exe 100 PID 4304 wrote to memory of 4752 4304 babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.tmp 101 PID 4304 wrote to memory of 4752 4304 babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.tmp 101 PID 4752 wrote to memory of 3408 4752 cmd.exe 103 PID 4752 wrote to memory of 3408 4752 cmd.exe 103 PID 4752 wrote to memory of 2320 4752 cmd.exe 104 PID 4752 wrote to memory of 2320 4752 cmd.exe 104 PID 4304 wrote to memory of 1244 4304 babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.tmp 105 PID 4304 wrote to memory of 1244 4304 babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.tmp 105 PID 1244 wrote to memory of 3572 1244 cmd.exe 107 PID 1244 wrote to memory of 3572 1244 cmd.exe 107 PID 1244 wrote to memory of 2632 1244 cmd.exe 108 PID 1244 wrote to memory of 2632 1244 cmd.exe 108 PID 4304 wrote to memory of 2408 4304 babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.tmp 109 PID 4304 wrote to memory of 2408 4304 babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.tmp 109 PID 2408 wrote to memory of 3596 2408 cmd.exe 111 PID 2408 wrote to memory of 3596 2408 cmd.exe 111 PID 2408 wrote to memory of 1876 2408 cmd.exe 112 PID 2408 wrote to memory of 1876 2408 cmd.exe 112 PID 4304 wrote to memory of 3980 4304 babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.tmp 113 PID 4304 wrote to memory of 3980 4304 babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.tmp 113 PID 4304 wrote to memory of 3980 4304 babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.tmp 113 PID 3980 wrote to memory of 4864 3980 electronics.exe 117 PID 3980 wrote to memory of 4864 3980 electronics.exe 117 PID 3980 wrote to memory of 4864 3980 electronics.exe 117 PID 4864 wrote to memory of 4484 4864 cmd.exe 119 PID 4864 wrote to memory of 4484 4864 cmd.exe 119 PID 4864 wrote to memory of 4484 4864 cmd.exe 119 PID 4864 wrote to memory of 4776 4864 cmd.exe 120 PID 4864 wrote to memory of 4776 4864 cmd.exe 120 PID 4864 wrote to memory of 4776 4864 cmd.exe 120 PID 4776 wrote to memory of 2472 4776 electronics.exe 121 PID 4776 wrote to memory of 2472 4776 electronics.exe 121 PID 4776 wrote to memory of 2472 4776 electronics.exe 121 PID 4776 wrote to memory of 2472 4776 electronics.exe 121 PID 4776 wrote to memory of 2472 4776 electronics.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.exe"C:\Users\Admin\AppData\Local\Temp\babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\is-26MPI.tmp\babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.tmp"C:\Users\Admin\AppData\Local\Temp\is-26MPI.tmp\babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.tmp" /SL5="$90116,1931507,845824,C:\Users\Admin\AppData\Local\Temp\babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.exe"C:\Users\Admin\AppData\Local\Temp\babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.exe" /VERYSILENT3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\is-OGD2R.tmp\babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.tmp"C:\Users\Admin\AppData\Local\Temp\is-OGD2R.tmp\babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.tmp" /SL5="$C005E,1931507,845824,C:\Users\Admin\AppData\Local\Temp\babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.exe" /VERYSILENT4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH | find /I "wrsa.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
-
C:\Windows\system32\find.exefind /I "wrsa.exe"6⤵PID:3420
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH | find /I "opssvc.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
-
C:\Windows\system32\find.exefind /I "opssvc.exe"6⤵PID:4136
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH | find /I "avastui.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4392
-
-
C:\Windows\system32\find.exefind /I "avastui.exe"6⤵PID:4124
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH | find /I "avgui.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3408
-
-
C:\Windows\system32\find.exefind /I "avgui.exe"6⤵PID:2320
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH | find /I "nswscsvc.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3572
-
-
C:\Windows\system32\find.exefind /I "nswscsvc.exe"6⤵PID:2632
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH | find /I "sophoshealth.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3596
-
-
C:\Windows\system32\find.exefind /I "sophoshealth.exe"6⤵PID:1876
-
-
-
C:\Users\Admin\AppData\Roaming\Partition\electronics.exe"C:\Users\Admin\AppData\Roaming\Partition\\electronics.exe" "C:\Users\Admin\AppData\Roaming\Partition\\expulsionist.eml"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping -n 5 127.0.0.1 >nul && electronics.exe C:\ProgramData\\xJCkHk.a3x && del C:\ProgramData\\xJCkHk.a3x6⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\SysWOW64\PING.EXEping -n 5 127.0.0.17⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4484
-
-
C:\Users\Admin\AppData\Roaming\Partition\electronics.exeelectronics.exe C:\ProgramData\\xJCkHk.a3x7⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe8⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2472
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-26MPI.tmp\babc536d2015b19e0944f5c61778c0e6c7c8643720123914dd4cc97ae2e6e7d9N.tmp
Filesize3.2MB
MD560aeeeda4d416077aaa5c9b21e336c5a
SHA12d5e9ecec78620e6664d4828b7ee3576a660a306
SHA256c4df89c1ee343740c7a54a9afbb28c47f3cef86ad53c505553c680bc8c58b569
SHA51246c8d197635cbbdd7089a27579b6dadda1c2598aa70aad9966cfa92a57d07dc2ce91dd585270ac6d2dfac9417e2d98f486ca409cec226731784e17a4115e3c59
-
Filesize
921KB
MD53f58a517f1f4796225137e7659ad2adb
SHA1e264ba0e9987b0ad0812e5dd4dd3075531cfe269
SHA2561da298cab4d537b0b7b5dabf09bff6a212b9e45731e0cc772f99026005fb9e48
SHA512acf740aafce390d06c6a76c84e7ae7c0f721731973aadbe3e57f2eb63241a01303cc6bf11a3f9a88f8be0237998b5772bdaf569137d63ba3d0f877e7d27fc634
-
Filesize
48KB
MD5105b3c4033a1a5b36b0d897d64d2dbc5
SHA102df0cba5c7e52e160747023b523ba511a13eca4
SHA2566871177291918fadb13bb2092c134ec849ca0fbb79289959ddfcc0857872936d
SHA512f0f915618efb70effcbe20897a67001766a74ceacee8b53234d98051c16b7b54a72e78ed1c06b4924725049301f1189f9923b919769dfa7ce48295580751748f
-
Filesize
940KB
MD50577137e38bb6ac64d302158d97e3309
SHA1cd1d921efc0d6749f1c613e6b3f58b5c1cb6d229
SHA25670bb7249d401b402c5e2a095ffc8832b36a3318f66218189ae49d072daee7208
SHA5127eda8e96d0c10eb0c21a29522d2a9d2012fc78788d5a209e9fb9ce10dc9125da6e9678e12675310c33a5dedb7973e5f04fb2e38634f51e57d72ea59fc0a8197b