Analysis

  • max time kernel
    105s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250313-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/04/2025, 20:16

General

  • Target

    55.msi

  • Size

    5.0MB

  • MD5

    e58d905d9e1529e987c9a82a74ce29c9

  • SHA1

    b305eef82dc620e836ada7b56de9e98b077bf118

  • SHA256

    87f7e5081a34770f1277d101c4ae40126623195cbce621196bde10e46df704b1

  • SHA512

    ff0d482d98676b1ffdfdb82ce7ba1327bde0d92deee583335ea5d93e7e8aa81aeae9b59753646fc4d12ee553e7254f654caffaee28d3756030912c7ce729ccfb

  • SSDEEP

    98304:3Yqd1A4isy2+mnoWNO6wM8UBc9XzAwC2PBpQrkLa8:pZi6+LWNHwZUBcZzvPBpek

Malware Config

Signatures

  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 12 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3404
      • C:\Windows\system32\msiexec.exe
        msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\55.msi
        2⤵
        • Enumerates connected drives
        • Event Triggered Execution: Installer Packages
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:3244
      • C:\Users\Admin\AppData\Local\Temp\31084\CasPol.exe
        "C:\Users\Admin\AppData\Local\Temp\31084\CasPol.exe"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3100
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Enumerates connected drives
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1564
      • C:\Windows\system32\srtasks.exe
        C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
        2⤵
          PID:4840
        • C:\Windows\syswow64\MsiExec.exe
          C:\Windows\syswow64\MsiExec.exe -Embedding 8F7C263F3EA392CFDAF366F449B78401
          2⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:3900
        • C:\Users\Admin\AppData\Roaming\Cruse\vmnetdhcp.exe
          "C:\Users\Admin\AppData\Roaming\Cruse\vmnetdhcp.exe"
          2⤵
          • Suspicious use of SetThreadContext
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:4816
          • C:\Users\Admin\AppData\Local\Temp\31084\CasPol.exe
            C:\Users\Admin\AppData\Local\Temp\31084\CasPol.exe
            3⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Suspicious use of SetThreadContext
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:3732
          • C:\Windows\SysWOW64\gpupdate.exe
            C:\Windows\SysWOW64\gpupdate.exe
            3⤵
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:1680
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Checks SCSI registry key(s)
        • Suspicious use of AdjustPrivilegeToken
        PID:3176

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Config.Msi\e5792cd.rbs

        Filesize

        11KB

        MD5

        22ba5724805f607ef23c445f960d408d

        SHA1

        3d66dc1811713721cd60981c313e80f5243af16b

        SHA256

        59953de8de570bd65daf695eb36468ae96a8e30a0699b4ea583f8853f65abc40

        SHA512

        df12a80afdf52a8b3c7a89a55edaef4b785d307ef63554b649394b51874bb8f84314ad1b55b58f570c18493067595045ca7837a4e38524e9940a4a6b00c02018

      • C:\Users\Admin\AppData\Local\Temp\31084\CasPol.exe

        Filesize

        99KB

        MD5

        f61fa5ce25f885a9b1f549055c9911ed

        SHA1

        aba1c035b06017b0b0bd1c712669646e4f3765ab

        SHA256

        57e9675902b443085e37ead57dfed97de6bb61321682bc93aff30f16b5ca5aeb

        SHA512

        02e3db343037294fd3b774f954c9a617a50715e6b89d7c409f3c7dc5a1cf5ed9418158c442e9e80111994da139a9a16db33ac68a833d6d115c4a41bdf75751ac

      • C:\Users\Admin\AppData\Local\Temp\31d59e53

        Filesize

        2.9MB

        MD5

        1c016531f2b109e3c8e06895188c3c79

        SHA1

        0f56fc7890cadb94a1029474912dab7b146a7376

        SHA256

        3e4dd65697cca5eae6361ea44145249a0978c945529d45015e4ede084977b99c

        SHA512

        87dba3edec8951052b21230ce69c1d948d93268c86ed3d7e579d2c3341b9d03803ba8d76b5079f74590f41196eb15efebfb8530a0a646419500eef0cce83cc42

      • C:\Users\Admin\AppData\Local\Temp\356d57e2

        Filesize

        2.7MB

        MD5

        0d39159811dec9412031a92816ac44b2

        SHA1

        ae4c591b2c33a27499a86063be288000306007b6

        SHA256

        2771a1a197aefe31af95625a77db8ae6f3bcc5b537236135a1456071b1eb1f6e

        SHA512

        bb5e125dea8bceadc212243df2bbb6899b4cd2a900bb7e9d9799c559f380ecb22c4726ceec47155c6149450848879fcc32a17db68ace513192d8023f1d1baeda

      • C:\Users\Admin\AppData\Local\Temp\356d57e2

        Filesize

        2.7MB

        MD5

        5c00a937bde3335dfb6366166a733217

        SHA1

        929811910055f95454487344a7774f6094fd1c28

        SHA256

        0563185a2aa68b76deb6a9021696ebfa6e6cadbd641c942ac26483671979f952

        SHA512

        97b1ad970351d5a6202860e4d82d99bf14db49d92f50f4a8143c3e14496bb60c2d39147821a12b9b21b76985d5a833e42707dc7cf477ab8bba210247827ff67e

      • C:\Windows\Installer\MSI93E4.tmp

        Filesize

        386KB

        MD5

        72b1c6699ddc2baab105d32761285df2

        SHA1

        fc85e9fb190f205e6752624a5231515c4ee4e155

        SHA256

        bf7f6f7e527ab8617766bb7a21c21b2895b5275c0e808756c2aadcd66eff8a97

        SHA512

        cde1e754d8dfb2fa55db243517b5dd3d75b209ea6387ef2e4be6157875e536db2373f23434a9e66c119150301c7b7cdf97de5a5544d94c03247b4ae716cbc170

      • C:\Windows\Installer\e5792ca.msi

        Filesize

        5.0MB

        MD5

        e58d905d9e1529e987c9a82a74ce29c9

        SHA1

        b305eef82dc620e836ada7b56de9e98b077bf118

        SHA256

        87f7e5081a34770f1277d101c4ae40126623195cbce621196bde10e46df704b1

        SHA512

        ff0d482d98676b1ffdfdb82ce7ba1327bde0d92deee583335ea5d93e7e8aa81aeae9b59753646fc4d12ee553e7254f654caffaee28d3756030912c7ce729ccfb

      • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

        Filesize

        24.1MB

        MD5

        77959008b8294a192f52e9003570645d

        SHA1

        780e9e42eab0bee317ead1cd21524a0aaa5d96ad

        SHA256

        f6032bee53be7e13905ac3c459f0e75e27d35033ab4f718c70c65242dcec9be8

        SHA512

        10247117303ed99af89814b07bc478889bbe332f04c1839c0060d382497251a63a8c57a4b27ad25307e4f80086655fb27794b6f0626a2f7d3d815a399ca41bae

      • \??\Volume{a6f17796-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{34d33a3e-9328-4e8f-bd13-bbd28c1efca6}_OnDiskSnapshotProp

        Filesize

        6KB

        MD5

        cc296c14cd3deac18599ba0780012d99

        SHA1

        9b4af22689b5dba65e3fcea3c3c5f7dc0f64e4ce

        SHA256

        8f9bdab3c17928a15d4aa3da88fcb5df62f5f705ba2d00b419902e5af9a734cd

        SHA512

        7795b7ba3195912626b4c0f57c655e239cd3bbf6a7302072cccde27caf733f7108726b6b073b476065f1deca13bdb2125a157a0824388dd16d6e48764f2d089a

      • memory/3100-1419-0x0000000005170000-0x0000000005332000-memory.dmp

        Filesize

        1.8MB

      • memory/3100-1418-0x0000000004C90000-0x0000000004CE0000-memory.dmp

        Filesize

        320KB

      • memory/3100-1416-0x0000000000700000-0x00000000007D4000-memory.dmp

        Filesize

        848KB

      • memory/3100-1417-0x0000000004CE0000-0x0000000004D72000-memory.dmp

        Filesize

        584KB

      • memory/3732-82-0x0000000006230000-0x000000000639B000-memory.dmp

        Filesize

        1.4MB

      • memory/3732-74-0x0000000006230000-0x000000000639B000-memory.dmp

        Filesize

        1.4MB

      • memory/3732-114-0x0000000006230000-0x000000000639B000-memory.dmp

        Filesize

        1.4MB

      • memory/3732-113-0x0000000006230000-0x000000000639B000-memory.dmp

        Filesize

        1.4MB

      • memory/3732-108-0x0000000006230000-0x000000000639B000-memory.dmp

        Filesize

        1.4MB

      • memory/3732-106-0x0000000006230000-0x000000000639B000-memory.dmp

        Filesize

        1.4MB

      • memory/3732-104-0x0000000006230000-0x000000000639B000-memory.dmp

        Filesize

        1.4MB

      • memory/3732-100-0x0000000006230000-0x000000000639B000-memory.dmp

        Filesize

        1.4MB

      • memory/3732-98-0x0000000006230000-0x000000000639B000-memory.dmp

        Filesize

        1.4MB

      • memory/3732-96-0x0000000006230000-0x000000000639B000-memory.dmp

        Filesize

        1.4MB

      • memory/3732-94-0x0000000006230000-0x000000000639B000-memory.dmp

        Filesize

        1.4MB

      • memory/3732-92-0x0000000006230000-0x000000000639B000-memory.dmp

        Filesize

        1.4MB

      • memory/3732-84-0x0000000006230000-0x000000000639B000-memory.dmp

        Filesize

        1.4MB

      • memory/3732-102-0x0000000006230000-0x000000000639B000-memory.dmp

        Filesize

        1.4MB

      • memory/3732-80-0x0000000006230000-0x000000000639B000-memory.dmp

        Filesize

        1.4MB

      • memory/3732-78-0x0000000006230000-0x000000000639B000-memory.dmp

        Filesize

        1.4MB

      • memory/3732-76-0x0000000006230000-0x000000000639B000-memory.dmp

        Filesize

        1.4MB

      • memory/3732-64-0x0000000006230000-0x00000000063A0000-memory.dmp

        Filesize

        1.4MB

      • memory/3732-1405-0x0000000006710000-0x00000000067D6000-memory.dmp

        Filesize

        792KB

      • memory/3732-1404-0x0000000006640000-0x0000000006708000-memory.dmp

        Filesize

        800KB

      • memory/3732-1406-0x00000000065B0000-0x00000000065FC000-memory.dmp

        Filesize

        304KB

      • memory/3732-116-0x0000000006230000-0x000000000639B000-memory.dmp

        Filesize

        1.4MB

      • memory/3732-72-0x0000000006230000-0x000000000639B000-memory.dmp

        Filesize

        1.4MB

      • memory/3732-70-0x0000000006230000-0x000000000639B000-memory.dmp

        Filesize

        1.4MB

      • memory/3732-1408-0x0000000006920000-0x0000000006974000-memory.dmp

        Filesize

        336KB

      • memory/3732-1407-0x0000000007100000-0x00000000076A4000-memory.dmp

        Filesize

        5.6MB

      • memory/3732-63-0x0000000005980000-0x0000000005B1E000-memory.dmp

        Filesize

        1.6MB

      • memory/3732-60-0x0000000000A30000-0x0000000000C03000-memory.dmp

        Filesize

        1.8MB

      • memory/3732-86-0x0000000006230000-0x000000000639B000-memory.dmp

        Filesize

        1.4MB

      • memory/3732-55-0x0000000073920000-0x0000000073BB1000-memory.dmp

        Filesize

        2.6MB

      • memory/3732-120-0x0000000006230000-0x000000000639B000-memory.dmp

        Filesize

        1.4MB

      • memory/3732-68-0x0000000006230000-0x000000000639B000-memory.dmp

        Filesize

        1.4MB

      • memory/3732-118-0x0000000006230000-0x000000000639B000-memory.dmp

        Filesize

        1.4MB

      • memory/3732-110-0x0000000006230000-0x000000000639B000-memory.dmp

        Filesize

        1.4MB

      • memory/3732-66-0x0000000006230000-0x000000000639B000-memory.dmp

        Filesize

        1.4MB

      • memory/3732-90-0x0000000006230000-0x000000000639B000-memory.dmp

        Filesize

        1.4MB

      • memory/3732-65-0x0000000006230000-0x000000000639B000-memory.dmp

        Filesize

        1.4MB

      • memory/3732-88-0x0000000006230000-0x000000000639B000-memory.dmp

        Filesize

        1.4MB

      • memory/4816-42-0x00000000004A0000-0x0000000000964000-memory.dmp

        Filesize

        4.8MB

      • memory/4816-49-0x0000000074CF0000-0x0000000074D3F000-memory.dmp

        Filesize

        316KB

      • memory/4816-50-0x00007FFEDB370000-0x00007FFEDB565000-memory.dmp

        Filesize

        2.0MB

      • memory/4816-54-0x0000000074CF0000-0x0000000074D3F000-memory.dmp

        Filesize

        316KB