Analysis
-
max time kernel
150s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18-02-2025 07:52
Static task
static1
Behavioral task
behavioral1
Sample
Mind/borlndmm.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Mind/borlndmm.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
Mind/cc32290mt.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Mind/cc32290mt.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
Mind/content.exe
Resource
win7-20241010-en
General
-
Target
Mind/content.exe
-
Size
27.6MB
-
MD5
950f3bebb7563ee8354b21ef9cbea4a2
-
SHA1
7b520ff8bd1b552e3de00a38a87722f21dc1c9f4
-
SHA256
8f4f53bc02348a549f3437444aacec43eae5f90875ea3c5ec96600ba1cb4a061
-
SHA512
6aac49f02fcfc131634864684c59c82c51208ab3191eacfd28bd1e184a8d6583565e2a57701f55c283b7297f843d4bcdd07ed7db4fc212a7b1c153e7cc4486d5
-
SSDEEP
393216:QM7KPSvINzNgF7kiPF7Ijs1vg+NLh3wBRoQWhKUzLkWEgC+24lRTSRAyGrR2FhHS:dGiPF+lvFNjXE9wpS
Malware Config
Signatures
-
SectopRAT payload 1 IoCs
resource yara_rule behavioral5/memory/2288-68-0x0000000000400000-0x00000000004C4000-memory.dmp family_sectoprat -
Sectoprat family
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2280 set thread context of 3068 2280 content.exe 29 PID 3068 set thread context of 2288 3068 cmd.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language content.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2280 content.exe 2280 content.exe 3068 cmd.exe 3068 cmd.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 2280 content.exe 3068 cmd.exe 3068 cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2288 MSBuild.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2280 wrote to memory of 3068 2280 content.exe 29 PID 2280 wrote to memory of 3068 2280 content.exe 29 PID 2280 wrote to memory of 3068 2280 content.exe 29 PID 2280 wrote to memory of 3068 2280 content.exe 29 PID 2280 wrote to memory of 3068 2280 content.exe 29 PID 3068 wrote to memory of 2288 3068 cmd.exe 31 PID 3068 wrote to memory of 2288 3068 cmd.exe 31 PID 3068 wrote to memory of 2288 3068 cmd.exe 31 PID 3068 wrote to memory of 2288 3068 cmd.exe 31 PID 3068 wrote to memory of 2288 3068 cmd.exe 31 PID 3068 wrote to memory of 2288 3068 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Mind\content.exe"C:\Users\Admin\AppData\Local\Temp\Mind\content.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2288
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5da1853c1b6b3c82ae05d48149d3ca376
SHA15cb18aa636144e90a75bc50b82a9259021bc97cd
SHA25668cd89c14ae2e8c54b11afc56ba9eb54375ee17b3ad0a0d4f70a5fb2ecb7d4b6
SHA512ded33ef84bfc50eaae24c9d5f31599019192bc976940fb88024a74c6f841971dc3cead6c768acda08b40a2a4d39ac495e7dc8e95120767618e00cfe786451179