Analysis

  • max time kernel
    140s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/03/2025, 21:03

General

  • Target

    08.msi

  • Size

    5.7MB

  • MD5

    436b14fb3637af66cfd787869decbb6f

  • SHA1

    b94dab2a8de781973507172017019f0d89527056

  • SHA256

    1bd7e0c46933e8dc11cb5375fe14600575ceed6f09fc14fc8b56032524f8bb42

  • SHA512

    caad869b295e222c0999a8eee8f270e2d1b937484c69cbf9154211db4f30237d4277ae1549e34fe842f8dbf72660c2d3023eb65bad90d07cec2a23f902b2c0dd

  • SSDEEP

    98304:9Yrd1ALFlGmyUMCW/x/64I7gXbzZFx7eG7eI243u/HyuuOneWFug3X:2yFlPyU32i4ISNh5243u/HAlW

Malware Config

Signatures

  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 12 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\08.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2664
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3872
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:2156
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 2AEBF3B6291331729034FB00D20EF599
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2092
      • C:\Users\Admin\AppData\Roaming\Causerie\VSAddIn.exe
        "C:\Users\Admin\AppData\Roaming\Causerie\VSAddIn.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:3332
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          3⤵
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4608
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
            4⤵
              PID:220
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
              4⤵
              • System Location Discovery: System Language Discovery
              PID:2832
          • C:\Windows\SysWOW64\more.com
            C:\Windows\SysWOW64\more.com
            3⤵
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:2692
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Checks SCSI registry key(s)
        • Suspicious use of AdjustPrivilegeToken
        PID:2640

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Config.Msi\e579473.rbs

        Filesize

        11KB

        MD5

        3c2e52f47a91fac18c140d15435486b8

        SHA1

        090e5362ec31b64fc452a90a61faf75e8442aa8c

        SHA256

        414b0fb0297724ade539173261b74309f791ae72fa65cdc19f03a652fe48215c

        SHA512

        b47c29d330a7ffac217e067e01f2c3029349032f0f865f5448783240fae06d4e94fedd7ebbe950a6656c83611c28c89dd3dc794fb03f315edc8c2f657bbe6a27

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MSBuild.exe.log

        Filesize

        1KB

        MD5

        7e49b3290ebec042bdc962964fe4504c

        SHA1

        db2d7bb458f81ec9f48325fdbbebbd714d063db4

        SHA256

        f9464d9adaf5b3f451b99c61744351b9099de570798c367f4f8a4f294fa2d42c

        SHA512

        c590a9021e04ab93f5d6e666e054144066e0823d36354a7b545b1290462215df83b71c09efe6c69e839cf4a10ac520d829e146ab15c9b959c83f0822cbe09d8a

      • C:\Users\Admin\AppData\Local\Temp\42e93d54

        Filesize

        1.9MB

        MD5

        eb7417474afce7ec5a8c818c5502c1a8

        SHA1

        f8fa2e3e21d47265915a7a7d5a51e19509b22038

        SHA256

        886fe661e800ac08116c96e67a76ce302b7bebe60b52415a0fcdd50526792850

        SHA512

        ea2489a15766b70835c609de6cfdf152b5a519e7fa1cfb56e202ca1dc60119c543c97f53cee4d85244d55784181de7c5f366fa643fcae83d954ce870e8ba58b7

      • C:\Users\Admin\AppData\Local\Temp\45432dfa

        Filesize

        2.3MB

        MD5

        1b859c7d515b6defddcb5212b86f9683

        SHA1

        c9982e808f5b50586da71804e11be1610a37312b

        SHA256

        d8f4d465a8247459d85ef7ce9c2ba355d3cd0f8755d91e2bad8714e279b99377

        SHA512

        01aab40302f787bdb5c15928dd51e5d2cfac0613b2486076ed9b037514a6a68be480e14e95ad36bb23c541a40ad155eb50c7f77259466f3b285806dbf35574c8

      • C:\Windows\Installer\MSI94BE.tmp

        Filesize

        386KB

        MD5

        72b1c6699ddc2baab105d32761285df2

        SHA1

        fc85e9fb190f205e6752624a5231515c4ee4e155

        SHA256

        bf7f6f7e527ab8617766bb7a21c21b2895b5275c0e808756c2aadcd66eff8a97

        SHA512

        cde1e754d8dfb2fa55db243517b5dd3d75b209ea6387ef2e4be6157875e536db2373f23434a9e66c119150301c7b7cdf97de5a5544d94c03247b4ae716cbc170

      • C:\Windows\Installer\e579470.msi

        Filesize

        5.7MB

        MD5

        436b14fb3637af66cfd787869decbb6f

        SHA1

        b94dab2a8de781973507172017019f0d89527056

        SHA256

        1bd7e0c46933e8dc11cb5375fe14600575ceed6f09fc14fc8b56032524f8bb42

        SHA512

        caad869b295e222c0999a8eee8f270e2d1b937484c69cbf9154211db4f30237d4277ae1549e34fe842f8dbf72660c2d3023eb65bad90d07cec2a23f902b2c0dd

      • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

        Filesize

        24.1MB

        MD5

        1d65a22c44de755dcb90f4e3d1aec0cc

        SHA1

        7b73a939f07193ee5595cb8e6e85db1bc59f0bf5

        SHA256

        0bf22dc1a1fb41044678df73c3da8745ae3ec5e30e520312654c1e938dd6afaa

        SHA512

        30f0939e91bfc2d7395f471a599ab2e8a32f5ad011ee920927dc2fb24df99a82f05f46746d14bc6f1a8bdf449c7b420b2b8b117a5ae4485c5d81708f5f3174f8

      • \??\Volume{2b89492a-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{5e1ab8d7-e714-4d5a-b47c-c021b4ea1911}_OnDiskSnapshotProp

        Filesize

        6KB

        MD5

        65ac1edac4f878a76d9075b088474957

        SHA1

        848f13521fb7099e18c116c2446e5a51193bd094

        SHA256

        8cbc3671ecfbeee7f436fc8b35a467395582b3cd7a4a2994c9e93207a31986bb

        SHA512

        c825d27e3f3d86547c3be3c0d8f9e680effd42d8a0db5e13cd8ac4982cb1ff8cf06a42b5062adae10a8ea2e22275e5906d2e7255956dba83da4d38445ff0e235

      • memory/2692-71-0x00007FFDB8F50000-0x00007FFDB9145000-memory.dmp

        Filesize

        2.0MB

      • memory/2832-80-0x00000000053D0000-0x0000000005592000-memory.dmp

        Filesize

        1.8MB

      • memory/2832-79-0x0000000005060000-0x00000000050B0000-memory.dmp

        Filesize

        320KB

      • memory/2832-76-0x0000000000400000-0x00000000004D4000-memory.dmp

        Filesize

        848KB

      • memory/3332-49-0x00007FFDAAD60000-0x00007FFDAADC0000-memory.dmp

        Filesize

        384KB

      • memory/3332-42-0x00000000007C0000-0x0000000000FAE000-memory.dmp

        Filesize

        7.9MB

      • memory/3332-54-0x00007FFDAAD60000-0x00007FFDAADC0000-memory.dmp

        Filesize

        384KB

      • memory/4608-59-0x0000000005710000-0x00000000057A2000-memory.dmp

        Filesize

        584KB

      • memory/4608-63-0x0000000007E50000-0x0000000007E6A000-memory.dmp

        Filesize

        104KB

      • memory/4608-64-0x000000000A370000-0x000000000A376000-memory.dmp

        Filesize

        24KB

      • memory/4608-62-0x0000000005D10000-0x0000000005D1A000-memory.dmp

        Filesize

        40KB

      • memory/4608-61-0x0000000005820000-0x0000000005846000-memory.dmp

        Filesize

        152KB

      • memory/4608-60-0x0000000005D60000-0x0000000006304000-memory.dmp

        Filesize

        5.6MB

      • memory/4608-58-0x0000000005620000-0x00000000056BC000-memory.dmp

        Filesize

        624KB

      • memory/4608-57-0x0000000000F00000-0x0000000001090000-memory.dmp

        Filesize

        1.6MB

      • memory/4608-55-0x00000000757A0000-0x0000000075A31000-memory.dmp

        Filesize

        2.6MB