Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2025, 20:54
Static task
static1
Behavioral task
behavioral1
Sample
383af7126e2e28748b4b75c66cc3406933a935931185d37b672a033cb193a26c.exe
Resource
win7-20240903-en
General
-
Target
383af7126e2e28748b4b75c66cc3406933a935931185d37b672a033cb193a26c.exe
-
Size
1.9MB
-
MD5
538aeeefac0c750a2f506a6f3815c7ae
-
SHA1
4ae1eb347e7f73618824d1c5e58dd7f0eab31848
-
SHA256
383af7126e2e28748b4b75c66cc3406933a935931185d37b672a033cb193a26c
-
SHA512
ae7eb66f9e2e83442a72b9b837e3ab0d36fa16cf8b45609055d569d2d1e63c63190eb93079450a60fb3b908844144b186c6e180a0c586a7c82fd0f2290890c81
-
SSDEEP
24576:RMjhoB0NyTZsOtuzkYSDmzfTDIas2Mko9DTTQjrChAkBIsamQFrj0p/C2Y:oRy1sOLDMaRkUTQfkBIS0D7
Malware Config
Signatures
-
SectopRAT payload 1 IoCs
resource yara_rule behavioral2/memory/2680-83-0x000000001BAD0000-0x000000001BB96000-memory.dmp family_sectoprat -
Sectoprat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation 383af7126e2e28748b4b75c66cc3406933a935931185d37b672a033cb193a26c.tmp -
Executes dropped EXE 2 IoCs
pid Process 3724 383af7126e2e28748b4b75c66cc3406933a935931185d37b672a033cb193a26c.tmp 2548 383af7126e2e28748b4b75c66cc3406933a935931185d37b672a033cb193a26c.tmp -
Loads dropped DLL 8 IoCs
pid Process 3724 383af7126e2e28748b4b75c66cc3406933a935931185d37b672a033cb193a26c.tmp 3724 383af7126e2e28748b4b75c66cc3406933a935931185d37b672a033cb193a26c.tmp 2548 383af7126e2e28748b4b75c66cc3406933a935931185d37b672a033cb193a26c.tmp 2548 383af7126e2e28748b4b75c66cc3406933a935931185d37b672a033cb193a26c.tmp 1340 regsvr32.exe 2680 regsvr32.exe 4276 regsvr32.EXE 116 regsvr32.EXE -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
pid Process 3976 powershell.exe 3976 powershell.exe 3248 powershell.exe 4632 powershell.exe 2448 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 383af7126e2e28748b4b75c66cc3406933a935931185d37b672a033cb193a26c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 383af7126e2e28748b4b75c66cc3406933a935931185d37b672a033cb193a26c.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 383af7126e2e28748b4b75c66cc3406933a935931185d37b672a033cb193a26c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 383af7126e2e28748b4b75c66cc3406933a935931185d37b672a033cb193a26c.tmp -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2548 383af7126e2e28748b4b75c66cc3406933a935931185d37b672a033cb193a26c.tmp 2548 383af7126e2e28748b4b75c66cc3406933a935931185d37b672a033cb193a26c.tmp 2680 regsvr32.exe 2680 regsvr32.exe 2448 powershell.exe 2448 powershell.exe 3976 powershell.exe 3976 powershell.exe 2680 regsvr32.exe 2680 regsvr32.exe 4276 regsvr32.EXE 4276 regsvr32.EXE 3248 powershell.exe 3248 powershell.exe 4276 regsvr32.EXE 4276 regsvr32.EXE 116 regsvr32.EXE 116 regsvr32.EXE 4632 powershell.exe 4632 powershell.exe 116 regsvr32.EXE 116 regsvr32.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2448 powershell.exe Token: SeIncreaseQuotaPrivilege 2448 powershell.exe Token: SeSecurityPrivilege 2448 powershell.exe Token: SeTakeOwnershipPrivilege 2448 powershell.exe Token: SeLoadDriverPrivilege 2448 powershell.exe Token: SeSystemProfilePrivilege 2448 powershell.exe Token: SeSystemtimePrivilege 2448 powershell.exe Token: SeProfSingleProcessPrivilege 2448 powershell.exe Token: SeIncBasePriorityPrivilege 2448 powershell.exe Token: SeCreatePagefilePrivilege 2448 powershell.exe Token: SeBackupPrivilege 2448 powershell.exe Token: SeRestorePrivilege 2448 powershell.exe Token: SeShutdownPrivilege 2448 powershell.exe Token: SeDebugPrivilege 2448 powershell.exe Token: SeSystemEnvironmentPrivilege 2448 powershell.exe Token: SeRemoteShutdownPrivilege 2448 powershell.exe Token: SeUndockPrivilege 2448 powershell.exe Token: SeManageVolumePrivilege 2448 powershell.exe Token: 33 2448 powershell.exe Token: 34 2448 powershell.exe Token: 35 2448 powershell.exe Token: 36 2448 powershell.exe Token: SeDebugPrivilege 3976 powershell.exe Token: SeIncreaseQuotaPrivilege 3976 powershell.exe Token: SeSecurityPrivilege 3976 powershell.exe Token: SeTakeOwnershipPrivilege 3976 powershell.exe Token: SeLoadDriverPrivilege 3976 powershell.exe Token: SeSystemProfilePrivilege 3976 powershell.exe Token: SeSystemtimePrivilege 3976 powershell.exe Token: SeProfSingleProcessPrivilege 3976 powershell.exe Token: SeIncBasePriorityPrivilege 3976 powershell.exe Token: SeCreatePagefilePrivilege 3976 powershell.exe Token: SeBackupPrivilege 3976 powershell.exe Token: SeRestorePrivilege 3976 powershell.exe Token: SeShutdownPrivilege 3976 powershell.exe Token: SeDebugPrivilege 3976 powershell.exe Token: SeSystemEnvironmentPrivilege 3976 powershell.exe Token: SeRemoteShutdownPrivilege 3976 powershell.exe Token: SeUndockPrivilege 3976 powershell.exe Token: SeManageVolumePrivilege 3976 powershell.exe Token: 33 3976 powershell.exe Token: 34 3976 powershell.exe Token: 35 3976 powershell.exe Token: 36 3976 powershell.exe Token: SeIncreaseQuotaPrivilege 3976 powershell.exe Token: SeSecurityPrivilege 3976 powershell.exe Token: SeTakeOwnershipPrivilege 3976 powershell.exe Token: SeLoadDriverPrivilege 3976 powershell.exe Token: SeSystemProfilePrivilege 3976 powershell.exe Token: SeSystemtimePrivilege 3976 powershell.exe Token: SeProfSingleProcessPrivilege 3976 powershell.exe Token: SeIncBasePriorityPrivilege 3976 powershell.exe Token: SeCreatePagefilePrivilege 3976 powershell.exe Token: SeBackupPrivilege 3976 powershell.exe Token: SeRestorePrivilege 3976 powershell.exe Token: SeShutdownPrivilege 3976 powershell.exe Token: SeDebugPrivilege 3976 powershell.exe Token: SeSystemEnvironmentPrivilege 3976 powershell.exe Token: SeRemoteShutdownPrivilege 3976 powershell.exe Token: SeUndockPrivilege 3976 powershell.exe Token: SeManageVolumePrivilege 3976 powershell.exe Token: 33 3976 powershell.exe Token: 34 3976 powershell.exe Token: 35 3976 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2548 383af7126e2e28748b4b75c66cc3406933a935931185d37b672a033cb193a26c.tmp -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3348 wrote to memory of 3724 3348 383af7126e2e28748b4b75c66cc3406933a935931185d37b672a033cb193a26c.exe 85 PID 3348 wrote to memory of 3724 3348 383af7126e2e28748b4b75c66cc3406933a935931185d37b672a033cb193a26c.exe 85 PID 3348 wrote to memory of 3724 3348 383af7126e2e28748b4b75c66cc3406933a935931185d37b672a033cb193a26c.exe 85 PID 3724 wrote to memory of 780 3724 383af7126e2e28748b4b75c66cc3406933a935931185d37b672a033cb193a26c.tmp 87 PID 3724 wrote to memory of 780 3724 383af7126e2e28748b4b75c66cc3406933a935931185d37b672a033cb193a26c.tmp 87 PID 3724 wrote to memory of 780 3724 383af7126e2e28748b4b75c66cc3406933a935931185d37b672a033cb193a26c.tmp 87 PID 780 wrote to memory of 2548 780 383af7126e2e28748b4b75c66cc3406933a935931185d37b672a033cb193a26c.exe 88 PID 780 wrote to memory of 2548 780 383af7126e2e28748b4b75c66cc3406933a935931185d37b672a033cb193a26c.exe 88 PID 780 wrote to memory of 2548 780 383af7126e2e28748b4b75c66cc3406933a935931185d37b672a033cb193a26c.exe 88 PID 2548 wrote to memory of 1340 2548 383af7126e2e28748b4b75c66cc3406933a935931185d37b672a033cb193a26c.tmp 90 PID 2548 wrote to memory of 1340 2548 383af7126e2e28748b4b75c66cc3406933a935931185d37b672a033cb193a26c.tmp 90 PID 2548 wrote to memory of 1340 2548 383af7126e2e28748b4b75c66cc3406933a935931185d37b672a033cb193a26c.tmp 90 PID 1340 wrote to memory of 2680 1340 regsvr32.exe 91 PID 1340 wrote to memory of 2680 1340 regsvr32.exe 91 PID 2680 wrote to memory of 2448 2680 regsvr32.exe 92 PID 2680 wrote to memory of 2448 2680 regsvr32.exe 92 PID 2680 wrote to memory of 3976 2680 regsvr32.exe 97 PID 2680 wrote to memory of 3976 2680 regsvr32.exe 97 PID 4276 wrote to memory of 3248 4276 regsvr32.EXE 118 PID 4276 wrote to memory of 3248 4276 regsvr32.EXE 118 PID 116 wrote to memory of 4632 116 regsvr32.EXE 122 PID 116 wrote to memory of 4632 116 regsvr32.EXE 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\383af7126e2e28748b4b75c66cc3406933a935931185d37b672a033cb193a26c.exe"C:\Users\Admin\AppData\Local\Temp\383af7126e2e28748b4b75c66cc3406933a935931185d37b672a033cb193a26c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\is-C0FM0.tmp\383af7126e2e28748b4b75c66cc3406933a935931185d37b672a033cb193a26c.tmp"C:\Users\Admin\AppData\Local\Temp\is-C0FM0.tmp\383af7126e2e28748b4b75c66cc3406933a935931185d37b672a033cb193a26c.tmp" /SL5="$8022C,1592193,247808,C:\Users\Admin\AppData\Local\Temp\383af7126e2e28748b4b75c66cc3406933a935931185d37b672a033cb193a26c.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\383af7126e2e28748b4b75c66cc3406933a935931185d37b672a033cb193a26c.exe"C:\Users\Admin\AppData\Local\Temp\383af7126e2e28748b4b75c66cc3406933a935931185d37b672a033cb193a26c.exe" /VERYSILENT3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Users\Admin\AppData\Local\Temp\is-9P9JV.tmp\383af7126e2e28748b4b75c66cc3406933a935931185d37b672a033cb193a26c.tmp"C:\Users\Admin\AppData\Local\Temp\is-9P9JV.tmp\383af7126e2e28748b4b75c66cc3406933a935931185d37b672a033cb193a26c.tmp" /SL5="$A020A,1592193,247808,C:\Users\Admin\AppData\Local\Temp\383af7126e2e28748b4b75c66cc3406933a935931185d37b672a033cb193a26c.exe" /VERYSILENT4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\regsvr32.exe"regsvr32.exe" /s /i:SYNC "C:\Users\Admin\AppData\Roaming\\6fwpuclnt_9.drv"5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\system32\regsvr32.exe/s /i:SYNC "C:\Users\Admin\AppData\Roaming\\6fwpuclnt_9.drv"6⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:SYNC C:\Users\Admin\AppData\Roaming\6fwpuclnt_9.drv' }) { exit 0 } else { exit 1 }"7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2448
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/S /i:SYNC C:\Users\Admin\AppData\Roaming\6fwpuclnt_9.drv\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{7393A43D-AB90-4C05-AA10-2ED581A465E5}' -Description 'MicrosoftEdgeUpdateTaskMachineUA' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3976
-
-
-
-
-
-
-
C:\Windows\system32\regsvr32.EXEC:\Windows\system32\regsvr32.EXE /S /i:SYNC C:\Users\Admin\AppData\Roaming\6fwpuclnt_9.drv1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:SYNC C:\Users\Admin\AppData\Roaming\6fwpuclnt_9.drv' }) { exit 0 } else { exit 1 }"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3248
-
-
C:\Windows\system32\regsvr32.EXEC:\Windows\system32\regsvr32.EXE /S /i:SYNC C:\Users\Admin\AppData\Roaming\6fwpuclnt_9.drv1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:SYNC C:\Users\Admin\AppData\Roaming\6fwpuclnt_9.drv' }) { exit 0 } else { exit 1 }"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5661739d384d9dfd807a089721202900b
SHA15b2c5d6a7122b4ce849dc98e79a7713038feac55
SHA25670c3ecbaa6df88e88df4efc70968502955e890a2248269641c4e2d4668ef61bf
SHA51281b48ae5c4064c4d9597303d913e32d3954954ba1c8123731d503d1653a0d848856812d2ee6951efe06b1db2b91a50e5d54098f60c26f36bc8390203f4c8a2d8
-
Filesize
1KB
MD52ac3c9ba89b8c2ef19c601ecebb82157
SHA1a239a4b11438c00e5ff89ebd4a804ede6a01935b
SHA2563c2714ce07f8c04b3f8222dfe50d8ae08f548b0e6e79fe33d08bf6f4c2e5143e
SHA512b1221d29e747b37071761b2509e9109b522cce6411f73f27c9428ac332d26b9f413ae6b8c0aeac1afb7fab2d0b3b1c4af189da12fe506287596df2ef8f083432
-
Filesize
1KB
MD5d876732bbd3f6c9cf9e2be236480e367
SHA18f2dd87515f7bcf62cc89a8a27cc4fa7817e0823
SHA256a4cea038e351c82952d795d84b29fc3e92680560d881bb86fe9dfbc4658dd9d0
SHA512375217306f3de9bf02548db09efba9065b84314a1ddecba022613f9502a3302c3e7a800561253c8a2b6bfade0f5f8dd5c5a1ad4e58e45c613965c4564bfb14ab
-
Filesize
1KB
MD571c4b1323b5c2b0b3dce79a418170c57
SHA1f2484755165cc812bd2017c3ff93d7aef8e9f642
SHA256b7151a59702581451ad3accb25d5aa7889a4d385142568331f42b0fcc2019872
SHA5129048311d8ca08c33c090038fce1b5f28d22e1b9b0c1a6bb27f97619c778e2d474a3f10ab92c76bd487b94e059b5d066d1d960eec15b6a3a74355099494172e51
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
C:\Users\Admin\AppData\Local\Temp\is-C0FM0.tmp\383af7126e2e28748b4b75c66cc3406933a935931185d37b672a033cb193a26c.tmp
Filesize1.2MB
MD5f4e0d271d78d0ab6f8eb7764c0c761f7
SHA159e01bf27764127d8772c804ddce134819c819e9
SHA256a1885560cb6679cb42a6e992266ab8fdcf7e30ca5167f7c62ecf913501939869
SHA5126e34e80b634a6274230f8e3682d8e6df7067ba5e2327461a280502298cb3a74d4afb8af69168ceff7e5ef44b1d664af87d153416b8c1fc8bc69fa2d44a633ee7
-
Filesize
13KB
MD5a813d18268affd4763dde940246dc7e5
SHA1c7366e1fd925c17cc6068001bd38eaef5b42852f
SHA256e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64
SHA512b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4
-
Filesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
Filesize
3.4MB
MD5499b7a906e7a12a4468195ffced35a1a
SHA14426c0e68ac85a5f2fa12367983191de110f5963
SHA256653b829de89240b1fd1e6e850c8ba52741e1dd8aeb04baf946608bb00e0a558a
SHA512247c9689aed0b0e069df128a1ea3c6337449e56b428f0f46e79bf7e77ebaaf1c9e449aa142bbeffe0f5218f4ad4a4985786a4537bac0b66cbb661f410d146893