Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19-02-2025 05:47
Static task
static1
Behavioral task
behavioral1
Sample
Mind/borlndmm.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Mind/borlndmm.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
Mind/cc32290mt.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Mind/cc32290mt.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
Mind/content.exe
Resource
win7-20240729-en
General
-
Target
Mind/content.exe
-
Size
27.6MB
-
MD5
950f3bebb7563ee8354b21ef9cbea4a2
-
SHA1
7b520ff8bd1b552e3de00a38a87722f21dc1c9f4
-
SHA256
8f4f53bc02348a549f3437444aacec43eae5f90875ea3c5ec96600ba1cb4a061
-
SHA512
6aac49f02fcfc131634864684c59c82c51208ab3191eacfd28bd1e184a8d6583565e2a57701f55c283b7297f843d4bcdd07ed7db4fc212a7b1c153e7cc4486d5
-
SSDEEP
393216:QM7KPSvINzNgF7kiPF7Ijs1vg+NLh3wBRoQWhKUzLkWEgC+24lRTSRAyGrR2FhHS:dGiPF+lvFNjXE9wpS
Malware Config
Signatures
-
SectopRAT payload 1 IoCs
resource yara_rule behavioral5/memory/2804-67-0x0000000000400000-0x00000000004C4000-memory.dmp family_sectoprat -
Sectoprat family
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3016 set thread context of 2448 3016 content.exe 30 PID 2448 set thread context of 2804 2448 cmd.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language content.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3016 content.exe 3016 content.exe 2448 cmd.exe 2448 cmd.exe 2804 MSBuild.exe 2804 MSBuild.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 3016 content.exe 2448 cmd.exe 2448 cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2804 MSBuild.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2804 MSBuild.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2448 3016 content.exe 30 PID 3016 wrote to memory of 2448 3016 content.exe 30 PID 3016 wrote to memory of 2448 3016 content.exe 30 PID 3016 wrote to memory of 2448 3016 content.exe 30 PID 3016 wrote to memory of 2448 3016 content.exe 30 PID 2448 wrote to memory of 2804 2448 cmd.exe 33 PID 2448 wrote to memory of 2804 2448 cmd.exe 33 PID 2448 wrote to memory of 2804 2448 cmd.exe 33 PID 2448 wrote to memory of 2804 2448 cmd.exe 33 PID 2448 wrote to memory of 2804 2448 cmd.exe 33 PID 2448 wrote to memory of 2804 2448 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\Mind\content.exe"C:\Users\Admin\AppData\Local\Temp\Mind\content.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2804
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5be2f77f2a056396ae78dc3b81f0b4d77
SHA1f97cc1c11ffa4d9fbc94b9c5243bc5664a7d9fc1
SHA2561c46ee47f5cd044deaad305f18c8f4f26d2f0b8c5d601a9bf196a63d0e5d6ace
SHA5123ecc0eb57f3dafbc1dca3273df972ae3f41be3b02bdd9de75bfd88182194a89ec079a5b90bbc6ec753706290e7797ee2c17f9993ff34bb1ccfbfb95dcbce7449
-
Filesize
20KB
MD5c9ff7748d8fcef4cf84a5501e996a641
SHA102867e5010f62f97ebb0cfb32cb3ede9449fe0c9
SHA2564d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988
SHA512d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73