Analysis

  • max time kernel
    136s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    17-02-2025 16:37

General

  • Target

    pica.exe

  • Size

    40.0MB

  • MD5

    30ad2c460bec3cec4078de57849e76c8

  • SHA1

    86455b67f56495bbb5efa2bf19b4824c77e432b4

  • SHA256

    aabac842ff753a562b44874af5a849db7df6c1d79678c2c5e746aa3c9ade35c3

  • SHA512

    e873e4b2d7ca5df411efa2e3a13159387ad419050bf6d64e0a8151763aeb725446df3713deed736990693e916166093b05a6d74371d6516356feb169df854910

  • SSDEEP

    98304:rRq0X6DOzl4pysJwWVNUK1oiUf4EdbldN+VNQo:bXoysJwWXUKa4EvdmQo

Malware Config

Signatures

  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\pica.exe
    "C:\Users\Admin\AppData\Local\Temp\pica.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:2556
    • C:\Windows\SysWOW64\choice.exe
      C:\Windows\SysWOW64\choice.exe
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:1476
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\283b85a7

    Filesize

    1.4MB

    MD5

    b5b4208ee39579bc120764a76a796d0e

    SHA1

    3449b2f887c71faff0577159de691159af7d43f7

    SHA256

    5dcad4edd19e993a959944c80067b8eb19f3b5dae94dab4ac5ceb9cd8f27d13c

    SHA512

    460d449a8593d1b2c8440f871b7f75e1547da22b7d6eafe42c9425b0fbf83a92c740d86178011557bab53c4bb6ed8a964e1e17ecd9d7629dca94704589424fba

  • C:\Users\Admin\AppData\Local\Temp\2864aa18

    Filesize

    1.4MB

    MD5

    aff94b393b6ce8e34c19b4cd306b8202

    SHA1

    ec67129993dcdd2e7091196c0251eb4099831673

    SHA256

    84c9f6f6e1d335b7f1737546c28253811eda92dda5543440aed3ca06d379c59e

    SHA512

    7b9a3c4d300bd9072b5f2b0eb3c477323f3b8e309a196ec8e86e8fe23b7c26025bcdc85f6d2ab3862899c8966744906678e296495eec0f2fad4660eb9563dad0

  • C:\Users\Admin\AppData\Local\Temp\tmp4A6A.tmp

    Filesize

    20KB

    MD5

    c9ff7748d8fcef4cf84a5501e996a641

    SHA1

    02867e5010f62f97ebb0cfb32cb3ede9449fe0c9

    SHA256

    4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988

    SHA512

    d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73

  • memory/1476-17-0x0000000074600000-0x0000000074774000-memory.dmp

    Filesize

    1.5MB

  • memory/1476-24-0x0000000074600000-0x0000000074774000-memory.dmp

    Filesize

    1.5MB

  • memory/1476-20-0x0000000074600000-0x0000000074774000-memory.dmp

    Filesize

    1.5MB

  • memory/1476-21-0x0000000074600000-0x0000000074774000-memory.dmp

    Filesize

    1.5MB

  • memory/1476-18-0x0000000074600000-0x0000000074774000-memory.dmp

    Filesize

    1.5MB

  • memory/1476-14-0x0000000074600000-0x0000000074774000-memory.dmp

    Filesize

    1.5MB

  • memory/1476-16-0x00000000771B0000-0x0000000077359000-memory.dmp

    Filesize

    1.7MB

  • memory/2556-11-0x0000000074600000-0x0000000074774000-memory.dmp

    Filesize

    1.5MB

  • memory/2556-0-0x0000000000400000-0x0000000000769000-memory.dmp

    Filesize

    3.4MB

  • memory/2556-8-0x0000000074613000-0x0000000074615000-memory.dmp

    Filesize

    8KB

  • memory/2556-9-0x0000000074600000-0x0000000074774000-memory.dmp

    Filesize

    1.5MB

  • memory/2556-7-0x00000000771B0000-0x0000000077359000-memory.dmp

    Filesize

    1.7MB

  • memory/2556-6-0x0000000074600000-0x0000000074774000-memory.dmp

    Filesize

    1.5MB

  • memory/2876-23-0x0000000072730000-0x0000000073792000-memory.dmp

    Filesize

    16.4MB

  • memory/2876-26-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2876-27-0x0000000073F1E000-0x0000000073F1F000-memory.dmp

    Filesize

    4KB

  • memory/2876-28-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2876-29-0x0000000073F10000-0x00000000745FE000-memory.dmp

    Filesize

    6.9MB

  • memory/2876-25-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2876-45-0x0000000073F1E000-0x0000000073F1F000-memory.dmp

    Filesize

    4KB

  • memory/2876-46-0x0000000073F10000-0x00000000745FE000-memory.dmp

    Filesize

    6.9MB