Analysis

  • max time kernel
    137s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/04/2025, 12:20

General

  • Target

    msi (8).msi

  • Size

    19.9MB

  • MD5

    3101ecfa0802a37677592a003f4005b1

  • SHA1

    cf611230456d70127f7541723af162c6a09d6549

  • SHA256

    69a2b85495bbf5fe03c9fa86e6b7b931f52e986a0ad1885583a4486f2b6d39c3

  • SHA512

    ea9d2b6f211d9e5811d57d1525252d437f0a3a3f81ce21750824ed53967d1f834b1e3908d761e371e3bf3f80d2e35dae362ba451d1bf843f57051b6870b68eb6

  • SSDEEP

    196608:R8DQnkCru3ZBggTPCBAIk9a7911FuyuON7NKmiRT5kozS6A4d2mOmGhIXA:kYkCwz+BP9ZuyuOxNzOkos4zG2XA

Malware Config

Signatures

  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 2 IoCs
  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 24 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I "C:\Users\Admin\AppData\Local\Temp\msi (8).msi"
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:5532
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2464
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 000307542D2A34494B791F7FEBD3AEBD C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:952
      • C:\Users\Admin\AppData\Local\Temp\{973A3955-376F-401C-A20D-747FECAFC2EC}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{973A3955-376F-401C-A20D-747FECAFC2EC}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{319C6EFA-E589-4960-ADEF-D6DDF02486AA}
        3⤵
        • Executes dropped EXE
        PID:4696
      • C:\Users\Admin\AppData\Local\Temp\{973A3955-376F-401C-A20D-747FECAFC2EC}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{973A3955-376F-401C-A20D-747FECAFC2EC}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{8A577FA2-0935-478C-B4FF-D98EF30E30C2}
        3⤵
        • Executes dropped EXE
        PID:4680
      • C:\Users\Admin\AppData\Local\Temp\{973A3955-376F-401C-A20D-747FECAFC2EC}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{973A3955-376F-401C-A20D-747FECAFC2EC}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{1D960B27-5473-4781-BAEB-A30B9E276321}
        3⤵
        • Executes dropped EXE
        PID:4552
      • C:\Users\Admin\AppData\Local\Temp\{973A3955-376F-401C-A20D-747FECAFC2EC}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{973A3955-376F-401C-A20D-747FECAFC2EC}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{C021BF70-5028-4260-8677-DFA4CE648295}
        3⤵
        • Executes dropped EXE
        PID:1472
      • C:\Users\Admin\AppData\Local\Temp\{973A3955-376F-401C-A20D-747FECAFC2EC}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{973A3955-376F-401C-A20D-747FECAFC2EC}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{5744ED9A-2170-43F5-9696-7EB6EDBD00D9}
        3⤵
        • Executes dropped EXE
        PID:4632
      • C:\Users\Admin\AppData\Local\Temp\{973A3955-376F-401C-A20D-747FECAFC2EC}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{973A3955-376F-401C-A20D-747FECAFC2EC}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{83476E08-5256-4A90-A355-2520E550248B}
        3⤵
        • Executes dropped EXE
        PID:4852
      • C:\Users\Admin\AppData\Local\Temp\{973A3955-376F-401C-A20D-747FECAFC2EC}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{973A3955-376F-401C-A20D-747FECAFC2EC}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{A01FFE2F-8074-455B-B468-5A884733C93B}
        3⤵
        • Executes dropped EXE
        PID:4872
      • C:\Users\Admin\AppData\Local\Temp\{973A3955-376F-401C-A20D-747FECAFC2EC}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{973A3955-376F-401C-A20D-747FECAFC2EC}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{B739F7D0-7A3A-4128-B8DB-C89571BDA3BA}
        3⤵
        • Executes dropped EXE
        PID:4788
      • C:\Users\Admin\AppData\Local\Temp\{973A3955-376F-401C-A20D-747FECAFC2EC}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{973A3955-376F-401C-A20D-747FECAFC2EC}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{C2507640-6BB0-4F86-9FBF-5F6A3F373C53}
        3⤵
        • Executes dropped EXE
        PID:3580
      • C:\Users\Admin\AppData\Local\Temp\{973A3955-376F-401C-A20D-747FECAFC2EC}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{973A3955-376F-401C-A20D-747FECAFC2EC}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{0B463572-66D9-4BE4-BC24-732B99AFED39}
        3⤵
        • Executes dropped EXE
        PID:1248
      • C:\Users\Admin\AppData\Local\Temp\{D76AF13D-8C7C-4E31-9718-68504E4BEC32}\crashreporter.exe
        C:\Users\Admin\AppData\Local\Temp\{D76AF13D-8C7C-4E31-9718-68504E4BEC32}\crashreporter.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4016
        • C:\Users\Admin\AppData\Roaming\QuickJava_wys_5\crashreporter.exe
          C:\Users\Admin\AppData\Roaming\QuickJava_wys_5\crashreporter.exe
          4⤵
          • Suspicious use of SetThreadContext
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:2140
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\SysWOW64\cmd.exe
            5⤵
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:3128
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              6⤵
              • System Location Discovery: System Language Discovery
              PID:6012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\2fe93d15

    Filesize

    1.5MB

    MD5

    842cdfc1368f8dabc0a30b6df8fa3cc5

    SHA1

    f84e5d7e4338a925a370f62a79f1aa326cc0dc7a

    SHA256

    f14ccda7b2f10027ce28f48a160293ae82dc50f8d4ab991deb435d050df3a7f8

    SHA512

    8e014de653ed000abb3c0e1666026775ad3211fca9ead0c4492c409bb0e7d2e40d271880c29e723751dcd20ddaafe5467bf6f6dbeea11da7177c4ca589b8a200

  • C:\Users\Admin\AppData\Local\Temp\MSI925D.tmp

    Filesize

    171KB

    MD5

    a0e940a3d3c1523416675125e3b0c07e

    SHA1

    2e29eeba6da9a4023bc8071158feee3b0277fd1b

    SHA256

    b8fa7aa425e4084ea3721780a13d11e08b8d53d1c5414b73f22faeca1bfd314f

    SHA512

    736ea06824388372aeef1938c6b11e66f4595e0b0589d7b4a87ff4abbabe52e82dff64d916293eab47aa869cf372ced2c66755dd8a8471b2ab0d3a37ba91d0b2

  • C:\Users\Admin\AppData\Local\Temp\MSI953C.tmp

    Filesize

    2.5MB

    MD5

    308770cbd92375538bdf33f4497b086c

    SHA1

    433668a3580b611c46177f065b1d22f450a75c94

    SHA256

    dd30788d51bf77ce8aee05ec97665577fb30909a7530ce143c994ca57b2a1e9f

    SHA512

    941b7b0edbfe3e4bf7a2cdb005f1e554deae1af5e503d78b0af0b9cfa41d5c2fae4b579c1c5dd07628c1075acec7021e383db79f2ed91d0e2afc58167591fed4

  • C:\Users\Admin\AppData\Local\Temp\{973A3955-376F-401C-A20D-747FECAFC2EC}\ISBEW64.exe

    Filesize

    178KB

    MD5

    40f3a092744e46f3531a40b917cca81e

    SHA1

    c73f62a44cb3a75933cecf1be73a48d0d623039b

    SHA256

    561f14cdece85b38617403e1c525ff0b1b752303797894607a4615d0bd66f97f

    SHA512

    1589b27db29051c772e5ba56953d9f798efbf74d75e0524fa8569df092d28960972779811a7916198d0707d35b1093d3e0dd7669a8179c412cfa7df7120733b2

  • C:\Users\Admin\AppData\Local\Temp\{973A3955-376F-401C-A20D-747FECAFC2EC}\ISRT.dll

    Filesize

    426KB

    MD5

    8af02bf8e358e11caec4f2e7884b43cc

    SHA1

    16badc6c610eeb08de121ab268093dd36b56bf27

    SHA256

    58a724d23c63387a2dda27ccfdbc8ca87fd4db671bea8bb636247667f6a5a11e

    SHA512

    d0228a8cc93ff6647c2f4ba645fa224dc9d114e2adb5b5d01670b6dafc2258b5b1be11629868748e77b346e291974325e8e8e1192042d7c04a35fc727ad4e3fd

  • C:\Users\Admin\AppData\Local\Temp\{973A3955-376F-401C-A20D-747FECAFC2EC}\_isres_0x0409.dll

    Filesize

    1.8MB

    MD5

    7de024bc275f9cdeaf66a865e6fd8e58

    SHA1

    5086e4a26f9b80699ea8d9f2a33cead28a1819c0

    SHA256

    bd32468ee7e8885323f22eabbff9763a0f6ffef3cc151e0bd0481df5888f4152

    SHA512

    191c57e22ea13d13806dd390c4039029d40c7532918618d185d8a627aabc3969c7af2e532e3c933bde8f652b4723d951bf712e9ba0cc0d172dde693012f5ef1a

  • C:\Users\Admin\AppData\Local\Temp\{D76AF13D-8C7C-4E31-9718-68504E4BEC32}\MSVCP140.dll

    Filesize

    439KB

    MD5

    4d157073a891d0832b9b05fb8aca73a8

    SHA1

    551efcdd93ecafc6b54ebb6f8f38c505d42d61ca

    SHA256

    718812adb0d669eea9606432202371e358c7de6cdeafeddad222c36ae0d3f263

    SHA512

    141563450e4cdf44315270360414f339fc3c96ebdaa46e28a1f673237c30f5e94e6da271db67547499c14dc3bd10e39767c3b6a2a3c9cec0a64a11f0263e0c5d

  • C:\Users\Admin\AppData\Local\Temp\{D76AF13D-8C7C-4E31-9718-68504E4BEC32}\VCRUNTIME140.dll

    Filesize

    88KB

    MD5

    e4ed441f0f6afb0d8d55af87900ec48f

    SHA1

    ac5bd77fd06ed29bebceb65371387555658870d9

    SHA256

    09d1e604e8cdd06176fcc3d3698861be20638a4391f9f2d9e23f868c1576ca94

    SHA512

    dec6d693aa2d6c043ef8ae35f7f613cf9366aeb8a5903e8e0c54644f799262229b91953c65d39f8535ce464c75bf34b3b23ddb50a9fc5f171d36d6bfa1e4d7dd

  • C:\Users\Admin\AppData\Local\Temp\{D76AF13D-8C7C-4E31-9718-68504E4BEC32}\crashreporter.exe

    Filesize

    1.2MB

    MD5

    e69917fa99f750a6c4e19523c3f2014b

    SHA1

    4b0185f38b668d7332d411f4824de2d111b3e670

    SHA256

    51de0b104e9ced3028a41d01dedf735809eb7f60888621027c7f00f0fcf9c834

    SHA512

    2f3b3f878fcae51a718d5ae2c12b4d98372c7aab46ed93cd567e66a1b45a96fb79ad66b7aaf0e9383905f46e4f639597af4914640d23596583057112d94a22c4

  • C:\Users\Admin\AppData\Local\Temp\{D76AF13D-8C7C-4E31-9718-68504E4BEC32}\fantail.tiff

    Filesize

    35KB

    MD5

    129afd98abb9c8790d01fc5f5c03a46c

    SHA1

    e6b3340e024f76d04ba5e24e6570d3cc0d67f64d

    SHA256

    d381fb7645aa0553e122efd20d78a421c19de4123ba9f3e9080f9002aff473ee

    SHA512

    360a9b9348285446d7bbfbd79dfc99cd54e8bd59abd5a1e3cd83db2c2432dad484ed5807de464d9ab1ce606fa9512d9c6bf0e5c4958e2afcfc75d8f96007de35

  • C:\Users\Admin\AppData\Local\Temp\{D76AF13D-8C7C-4E31-9718-68504E4BEC32}\jpeg8.dll

    Filesize

    684KB

    MD5

    e4e335ea9f7d5824a1aa3abcbc5f7dc9

    SHA1

    2c840163497d6db2ad9aa0cf92fe990d8b7f8074

    SHA256

    66c5fddaf6af0c0ecd0ce6923010c9d4f5eab184e6b6cb3f5453d405281366a4

    SHA512

    082550fe52adb0a1a25809484e95c02b175c63c8b03dc68655a331d2369c4b79276a4338571a605814862ede8a6673ad781ea3f0c9b5372e0df60f07b3205587

  • C:\Users\Admin\AppData\Local\Temp\{D76AF13D-8C7C-4E31-9718-68504E4BEC32}\lib-strings.dll

    Filesize

    125KB

    MD5

    5ae0bda29f1387fbb266c12daea57d03

    SHA1

    154c999a371af12b80782e3012934f1f1edbf80b

    SHA256

    762620c3e241e8da462311bec8ae87c9a01089ac028f77384a8ea2ba3854dac1

    SHA512

    063cb0ab3a29c73be01fd07070e27613b185c0b67ede20f3df1e5c63a3e9ce2a9996eb7864e6f13e7088339d9dd162b2a19c44d4b761711051961424c9e49930

  • C:\Users\Admin\AppData\Local\Temp\{D76AF13D-8C7C-4E31-9718-68504E4BEC32}\libpng16.dll

    Filesize

    216KB

    MD5

    7895937099678ccf369519179b223016

    SHA1

    d08fee6de6e04e9a6df35e64de0082d6dbd4ff6f

    SHA256

    c162ed44fe43320ebeea325eb25c6b33d5411dfba9a260d186ebcb95478ef13c

    SHA512

    e51c717529b289e4af7bfe0ff0036f2d17ebc21678d3f8231e976a07de1a1d03b6b183a7544a562cedbf609b188e707264ff38d4307755a9c5f5e4510eb6a57c

  • C:\Users\Admin\AppData\Local\Temp\{D76AF13D-8C7C-4E31-9718-68504E4BEC32}\utricle.sql

    Filesize

    1.3MB

    MD5

    f9afa3754fbf8a44670d517175b107cf

    SHA1

    72ae998f9d858c4f4385dcf824b8ac6895a05b7f

    SHA256

    92db5286adc620b6a2d151d7a2981923c1600a3b7b7a9a687934db7b3b6d6222

    SHA512

    c3c578c87f3316ad58aed25cf50dfd1b1f55ddbd62ce3728163ae169fb881c5f71db29ef1cbe8eea1ccb7242f30139f12f83209745ea72525fc0d496ff28dc96

  • C:\Users\Admin\AppData\Local\Temp\{D76AF13D-8C7C-4E31-9718-68504E4BEC32}\wxbase313u_vc_custom.dll

    Filesize

    3.3MB

    MD5

    fbe10d14b2a0b27fc8f228aa261ced38

    SHA1

    33bc390bc7088294ba4ad4db07a92a81743081e3

    SHA256

    9b52773e8cc7a1259cbd484528425bc4f0740f66eaa0b3b9e84d840e75fdfc40

    SHA512

    53078861a481b3655d5f8e346ddca035cf46111ea02dfceee65e6d9948003b5b5e4a95bcfbecea29ee1cf00293f01c8fa9576bbd84ac06447d91b21b92dc1862

  • C:\Users\Admin\AppData\Local\Temp\{D76AF13D-8C7C-4E31-9718-68504E4BEC32}\wxmsw313u_core_vc_custom.dll

    Filesize

    9.2MB

    MD5

    4e6f4affac9e3241078e46d237b2dbf0

    SHA1

    1d19da4253c238bfb86a6142d39c6cee4562bd39

    SHA256

    dcf938002a46ca976e1166939baf54ebdf6031288c0d33f1857aae6929fdc39b

    SHA512

    b94cb411a7444d271fa97cac49a326f3ab06bc44529049c3c8879fc2a258e02358f483f20f5b8f7c96e8ca459bc9b72c155d2543bdba8c66d2005aba6225d6d4

  • C:\Users\Admin\AppData\Local\Temp\{D76AF13D-8C7C-4E31-9718-68504E4BEC32}\zlib1.dll

    Filesize

    109KB

    MD5

    dfd95d4f4160f0756f2898144ba9e300

    SHA1

    f6b426ce6f17255956637834105af3a403eda36c

    SHA256

    964cbd05e4e8cfc1ba7f1fa17625b1ce7e539e519f725f8cb7f2f342641bf03d

    SHA512

    d414ec8a53f972ef2fb5f2b94a4cf417ceefba9a09a4677de6c376f3a27e435cf57e8c997695971d6d99c4ef705eb803994426d3da81ef6061a276bd4b762d4f

  • memory/952-44-0x0000000002BF0000-0x0000000002DB7000-memory.dmp

    Filesize

    1.8MB

  • memory/952-39-0x0000000010000000-0x0000000010114000-memory.dmp

    Filesize

    1.1MB

  • memory/2140-122-0x00000000749C0000-0x0000000074B3B000-memory.dmp

    Filesize

    1.5MB

  • memory/2140-123-0x00007FFDF6A50000-0x00007FFDF6C45000-memory.dmp

    Filesize

    2.0MB

  • memory/2140-124-0x00000000749C0000-0x0000000074B3B000-memory.dmp

    Filesize

    1.5MB

  • memory/3128-127-0x00007FFDF6A50000-0x00007FFDF6C45000-memory.dmp

    Filesize

    2.0MB

  • memory/3128-129-0x00000000749C0000-0x0000000074B3B000-memory.dmp

    Filesize

    1.5MB

  • memory/4016-76-0x0000000072670000-0x00000000727EB000-memory.dmp

    Filesize

    1.5MB

  • memory/4016-77-0x00007FFDF6A50000-0x00007FFDF6C45000-memory.dmp

    Filesize

    2.0MB

  • memory/6012-131-0x0000000073040000-0x0000000074294000-memory.dmp

    Filesize

    18.3MB

  • memory/6012-134-0x0000000000930000-0x0000000000A04000-memory.dmp

    Filesize

    848KB

  • memory/6012-135-0x0000000005060000-0x00000000050F2000-memory.dmp

    Filesize

    584KB

  • memory/6012-136-0x0000000005850000-0x0000000005DF4000-memory.dmp

    Filesize

    5.6MB

  • memory/6012-137-0x0000000005010000-0x0000000005060000-memory.dmp

    Filesize

    320KB

  • memory/6012-138-0x0000000005470000-0x0000000005632000-memory.dmp

    Filesize

    1.8MB

  • memory/6012-139-0x0000000005740000-0x00000000057B6000-memory.dmp

    Filesize

    472KB

  • memory/6012-140-0x0000000006330000-0x000000000685C000-memory.dmp

    Filesize

    5.2MB

  • memory/6012-141-0x00000000057C0000-0x00000000057DE000-memory.dmp

    Filesize

    120KB

  • memory/6012-142-0x0000000005E70000-0x0000000005ED6000-memory.dmp

    Filesize

    408KB