Analysis

  • max time kernel
    137s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250313-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/04/2025, 19:55

General

  • Target

    55.msi

  • Size

    5.0MB

  • MD5

    e58d905d9e1529e987c9a82a74ce29c9

  • SHA1

    b305eef82dc620e836ada7b56de9e98b077bf118

  • SHA256

    87f7e5081a34770f1277d101c4ae40126623195cbce621196bde10e46df704b1

  • SHA512

    ff0d482d98676b1ffdfdb82ce7ba1327bde0d92deee583335ea5d93e7e8aa81aeae9b59753646fc4d12ee553e7254f654caffaee28d3756030912c7ce729ccfb

  • SSDEEP

    98304:3Yqd1A4isy2+mnoWNO6wM8UBc9XzAwC2PBpQrkLa8:pZi6+LWNHwZUBcZzvPBpek

Malware Config

Signatures

  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 12 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3520
      • C:\Windows\system32\msiexec.exe
        msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\55.msi
        2⤵
        • Enumerates connected drives
        • Event Triggered Execution: Installer Packages
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:5472
      • C:\Users\Admin\AppData\Local\Temp\31084\CasPol.exe
        "C:\Users\Admin\AppData\Local\Temp\31084\CasPol.exe"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3704
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Enumerates connected drives
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2108
      • C:\Windows\system32\srtasks.exe
        C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3740
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 2F1E3C82BBAC484A1568BAA2E42F6516
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:380
      • C:\Users\Admin\AppData\Roaming\Cruse\vmnetdhcp.exe
        "C:\Users\Admin\AppData\Roaming\Cruse\vmnetdhcp.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:3548
        • C:\Users\Admin\AppData\Local\Temp\31084\CasPol.exe
          C:\Users\Admin\AppData\Local\Temp\31084\CasPol.exe
          3⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Suspicious use of SetThreadContext
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3872
        • C:\Windows\SysWOW64\gpupdate.exe
          C:\Windows\SysWOW64\gpupdate.exe
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:5416
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:4100

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e579a3f.rbs

      Filesize

      11KB

      MD5

      834eee26bf0f70bb3d2c0994c7832b2a

      SHA1

      c7d5cd171ce0a45420e567f28071e6555f353f3f

      SHA256

      222d9799f831a96e01fe3b099dda5230af67fc30b04634610c66f8fb701810fc

      SHA512

      cc4855c29429309a1ade08003ef7d7551c4daa07be64fac7373bb61b8207a67b1146af90625dd559f0f94986acf66e1cbd23296f2d39071f799450904d15b471

    • C:\Users\Admin\AppData\Local\Temp\31084\CasPol.exe

      Filesize

      99KB

      MD5

      f61fa5ce25f885a9b1f549055c9911ed

      SHA1

      aba1c035b06017b0b0bd1c712669646e4f3765ab

      SHA256

      57e9675902b443085e37ead57dfed97de6bb61321682bc93aff30f16b5ca5aeb

      SHA512

      02e3db343037294fd3b774f954c9a617a50715e6b89d7c409f3c7dc5a1cf5ed9418158c442e9e80111994da139a9a16db33ac68a833d6d115c4a41bdf75751ac

    • C:\Users\Admin\AppData\Local\Temp\44a276e8

      Filesize

      2.9MB

      MD5

      1c016531f2b109e3c8e06895188c3c79

      SHA1

      0f56fc7890cadb94a1029474912dab7b146a7376

      SHA256

      3e4dd65697cca5eae6361ea44145249a0978c945529d45015e4ede084977b99c

      SHA512

      87dba3edec8951052b21230ce69c1d948d93268c86ed3d7e579d2c3341b9d03803ba8d76b5079f74590f41196eb15efebfb8530a0a646419500eef0cce83cc42

    • C:\Users\Admin\AppData\Local\Temp\48bf09e5

      Filesize

      2.7MB

      MD5

      6175c90b900916be2ad6586f60642b78

      SHA1

      f45f724c60ff0ae22e043d37bcdd3da766ba8972

      SHA256

      816c6921085cd6c45f09fd9cc8221a08633b1a3dd11a79f7a97411ca0e4e10b5

      SHA512

      89e36cab7f37b70af98c4bfc2400d2c5d1e3a508b54f768ded6323a93726ec5070c309951524949359b6a8c6384b19671f4b5f68990c56c9e8ea9e826d8071d8

    • C:\Users\Admin\AppData\Local\Temp\48bf09e5

      Filesize

      2.7MB

      MD5

      9c81f7f9b89fc3f85b48134b270cea87

      SHA1

      88d15871eb7581ff8e6e4a79e2e235a07fcc4f66

      SHA256

      535f5ffd688c2076155f3b9e270bdf8c6eabca53656443e620ff023f328860c5

      SHA512

      24f52f2a4935d58a28ba9b5c250e3dd5b1b644e5f9f4be4ad250c1059eafb78b4c430a9d245641a868ce21e0ea5dc29b5ae06bc82f8427d41a7f18e69f1a0719

    • C:\Windows\Installer\MSI9A7B.tmp

      Filesize

      386KB

      MD5

      72b1c6699ddc2baab105d32761285df2

      SHA1

      fc85e9fb190f205e6752624a5231515c4ee4e155

      SHA256

      bf7f6f7e527ab8617766bb7a21c21b2895b5275c0e808756c2aadcd66eff8a97

      SHA512

      cde1e754d8dfb2fa55db243517b5dd3d75b209ea6387ef2e4be6157875e536db2373f23434a9e66c119150301c7b7cdf97de5a5544d94c03247b4ae716cbc170

    • C:\Windows\Installer\e579a3c.msi

      Filesize

      5.0MB

      MD5

      e58d905d9e1529e987c9a82a74ce29c9

      SHA1

      b305eef82dc620e836ada7b56de9e98b077bf118

      SHA256

      87f7e5081a34770f1277d101c4ae40126623195cbce621196bde10e46df704b1

      SHA512

      ff0d482d98676b1ffdfdb82ce7ba1327bde0d92deee583335ea5d93e7e8aa81aeae9b59753646fc4d12ee553e7254f654caffaee28d3756030912c7ce729ccfb

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      24.1MB

      MD5

      45802cbaf3d088b85e451462d2b9b98a

      SHA1

      0457562c69a7c061eb26ec9dac733cbe665d7c64

      SHA256

      a05cbc3b12c6f9a1581ba4c05fb4096b233d0d007f0a6bbc2fe0054338a1a412

      SHA512

      29feef3f35a91592f28b532056812d1a3cddf59b24cdfcc5ab5b1d2808bbddedb0033f30d3ce034741b3e7ff242140b49579091cafac3f537a25afd0b402833f

    • \??\Volume{a15ece3a-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{887e74d3-1f0b-4ab8-8694-6757baf1eb28}_OnDiskSnapshotProp

      Filesize

      6KB

      MD5

      411c8bdf5109cb08e932d7ff00dfb861

      SHA1

      e2ae93fb86402ac2821358b5e8673bc49eff2df3

      SHA256

      26713b67c24deae095f9396077eac052a806a844ca8af71026a481296aa45d34

      SHA512

      7404f7156ffc14d9d53a70e850ab182af859591ca87939ead3e5d60183f6a309af5c0871888a29dd70f681ef36665843e5ad5f5016bedc5e5d685f6affa13149

    • memory/3548-44-0x0000000000580000-0x0000000000A44000-memory.dmp

      Filesize

      4.8MB

    • memory/3548-52-0x00007FF8B98D0000-0x00007FF8B9AC5000-memory.dmp

      Filesize

      2.0MB

    • memory/3548-56-0x0000000074C90000-0x0000000074CDF000-memory.dmp

      Filesize

      316KB

    • memory/3548-51-0x0000000074C90000-0x0000000074CDF000-memory.dmp

      Filesize

      316KB

    • memory/3704-1419-0x0000000004E80000-0x0000000005042000-memory.dmp

      Filesize

      1.8MB

    • memory/3704-1418-0x0000000004BC0000-0x0000000004C10000-memory.dmp

      Filesize

      320KB

    • memory/3704-1417-0x0000000004AD0000-0x0000000004B62000-memory.dmp

      Filesize

      584KB

    • memory/3704-1416-0x0000000000560000-0x0000000000634000-memory.dmp

      Filesize

      848KB

    • memory/3872-96-0x00000000066E0000-0x000000000684B000-memory.dmp

      Filesize

      1.4MB

    • memory/3872-78-0x00000000066E0000-0x000000000684B000-memory.dmp

      Filesize

      1.4MB

    • memory/3872-112-0x00000000066E0000-0x000000000684B000-memory.dmp

      Filesize

      1.4MB

    • memory/3872-110-0x00000000066E0000-0x000000000684B000-memory.dmp

      Filesize

      1.4MB

    • memory/3872-108-0x00000000066E0000-0x000000000684B000-memory.dmp

      Filesize

      1.4MB

    • memory/3872-106-0x00000000066E0000-0x000000000684B000-memory.dmp

      Filesize

      1.4MB

    • memory/3872-102-0x00000000066E0000-0x000000000684B000-memory.dmp

      Filesize

      1.4MB

    • memory/3872-100-0x00000000066E0000-0x000000000684B000-memory.dmp

      Filesize

      1.4MB

    • memory/3872-98-0x00000000066E0000-0x000000000684B000-memory.dmp

      Filesize

      1.4MB

    • memory/3872-114-0x00000000066E0000-0x000000000684B000-memory.dmp

      Filesize

      1.4MB

    • memory/3872-92-0x00000000066E0000-0x000000000684B000-memory.dmp

      Filesize

      1.4MB

    • memory/3872-90-0x00000000066E0000-0x000000000684B000-memory.dmp

      Filesize

      1.4MB

    • memory/3872-88-0x00000000066E0000-0x000000000684B000-memory.dmp

      Filesize

      1.4MB

    • memory/3872-104-0x00000000066E0000-0x000000000684B000-memory.dmp

      Filesize

      1.4MB

    • memory/3872-94-0x00000000066E0000-0x000000000684B000-memory.dmp

      Filesize

      1.4MB

    • memory/3872-86-0x00000000066E0000-0x000000000684B000-memory.dmp

      Filesize

      1.4MB

    • memory/3872-84-0x00000000066E0000-0x000000000684B000-memory.dmp

      Filesize

      1.4MB

    • memory/3872-82-0x00000000066E0000-0x000000000684B000-memory.dmp

      Filesize

      1.4MB

    • memory/3872-80-0x00000000066E0000-0x000000000684B000-memory.dmp

      Filesize

      1.4MB

    • memory/3872-116-0x00000000066E0000-0x000000000684B000-memory.dmp

      Filesize

      1.4MB

    • memory/3872-76-0x00000000066E0000-0x000000000684B000-memory.dmp

      Filesize

      1.4MB

    • memory/3872-74-0x00000000066E0000-0x000000000684B000-memory.dmp

      Filesize

      1.4MB

    • memory/3872-72-0x00000000066E0000-0x000000000684B000-memory.dmp

      Filesize

      1.4MB

    • memory/3872-66-0x00000000066E0000-0x000000000684B000-memory.dmp

      Filesize

      1.4MB

    • memory/3872-64-0x00000000066E0000-0x000000000684B000-memory.dmp

      Filesize

      1.4MB

    • memory/3872-63-0x00000000066E0000-0x000000000684B000-memory.dmp

      Filesize

      1.4MB

    • memory/3872-120-0x00000000066E0000-0x000000000684B000-memory.dmp

      Filesize

      1.4MB

    • memory/3872-118-0x00000000066E0000-0x000000000684B000-memory.dmp

      Filesize

      1.4MB

    • memory/3872-70-0x00000000066E0000-0x000000000684B000-memory.dmp

      Filesize

      1.4MB

    • memory/3872-1404-0x0000000006AE0000-0x0000000006BA8000-memory.dmp

      Filesize

      800KB

    • memory/3872-1405-0x0000000006BB0000-0x0000000006C76000-memory.dmp

      Filesize

      792KB

    • memory/3872-1406-0x0000000006A50000-0x0000000006A9C000-memory.dmp

      Filesize

      304KB

    • memory/3872-1407-0x00000000075A0000-0x0000000007B44000-memory.dmp

      Filesize

      5.6MB

    • memory/3872-1408-0x0000000006CC0000-0x0000000006D14000-memory.dmp

      Filesize

      336KB

    • memory/3872-68-0x00000000066E0000-0x000000000684B000-memory.dmp

      Filesize

      1.4MB

    • memory/3872-62-0x00000000066E0000-0x0000000006850000-memory.dmp

      Filesize

      1.4MB

    • memory/3872-61-0x0000000005F40000-0x00000000060DE000-memory.dmp

      Filesize

      1.6MB

    • memory/3872-57-0x0000000073570000-0x0000000073801000-memory.dmp

      Filesize

      2.6MB