Analysis

  • max time kernel
    131s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/04/2025, 12:21

General

  • Target

    msi (7).msi

  • Size

    19.9MB

  • MD5

    8496849eda82ac31b355892b6fd86221

  • SHA1

    bb797b7c49cf6e160affd6e7465251cfc0143ba7

  • SHA256

    58c7a3273fa1b84cf28226f8b868af3d1a4447ee2e4f0c3dcf4a315061c23b08

  • SHA512

    ea8606a112667d4f4847505418f5db1ab5d10889ea8bd2935f90d9886810eaaf8d33747331ec002c3400b6dfc23e1208a08a3332738866e661c7bd79d6b66701

  • SSDEEP

    196608:Eh8QnkCrkuKLCBAIk9a7911FuyuON7NKmiRT5kokS6A4d2mOrGIIX5:jYkC4uK2BP9ZuyuOxNzOko14mGlX5

Malware Config

Signatures

  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 2 IoCs
  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 23 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I "C:\Users\Admin\AppData\Local\Temp\msi (7).msi"
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2904
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4476
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding ED7F1CE9956A6A3D32A5D5AD30D990E6 C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4972
      • C:\Users\Admin\AppData\Local\Temp\{D1ACB2E0-9E5B-4ADC-B4C2-C509D44532F3}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{D1ACB2E0-9E5B-4ADC-B4C2-C509D44532F3}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{0D4913AF-E6F3-4E2E-A574-74E7CE4F3724}
        3⤵
        • Executes dropped EXE
        PID:4800
      • C:\Users\Admin\AppData\Local\Temp\{D1ACB2E0-9E5B-4ADC-B4C2-C509D44532F3}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{D1ACB2E0-9E5B-4ADC-B4C2-C509D44532F3}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{B626B6C8-4222-4869-B24D-329EA60AF570}
        3⤵
        • Executes dropped EXE
        PID:5020
      • C:\Users\Admin\AppData\Local\Temp\{D1ACB2E0-9E5B-4ADC-B4C2-C509D44532F3}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{D1ACB2E0-9E5B-4ADC-B4C2-C509D44532F3}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{9C5AF01E-4C61-49D5-8A06-11AF2828FAF4}
        3⤵
        • Executes dropped EXE
        PID:4248
      • C:\Users\Admin\AppData\Local\Temp\{D1ACB2E0-9E5B-4ADC-B4C2-C509D44532F3}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{D1ACB2E0-9E5B-4ADC-B4C2-C509D44532F3}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{C6FA22FE-AE2D-428F-8F5E-0AA56863B9E3}
        3⤵
        • Executes dropped EXE
        PID:4892
      • C:\Users\Admin\AppData\Local\Temp\{D1ACB2E0-9E5B-4ADC-B4C2-C509D44532F3}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{D1ACB2E0-9E5B-4ADC-B4C2-C509D44532F3}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{CE152F44-9BEF-48B2-8027-05B7217CF7DB}
        3⤵
        • Executes dropped EXE
        PID:1988
      • C:\Users\Admin\AppData\Local\Temp\{D1ACB2E0-9E5B-4ADC-B4C2-C509D44532F3}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{D1ACB2E0-9E5B-4ADC-B4C2-C509D44532F3}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{E05DDA50-F4C5-4407-A7A9-7BFF859BEFEC}
        3⤵
        • Executes dropped EXE
        PID:4716
      • C:\Users\Admin\AppData\Local\Temp\{D1ACB2E0-9E5B-4ADC-B4C2-C509D44532F3}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{D1ACB2E0-9E5B-4ADC-B4C2-C509D44532F3}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{984E0753-2B86-46C4-B6DC-0054ACEB6BE7}
        3⤵
        • Executes dropped EXE
        PID:5940
      • C:\Users\Admin\AppData\Local\Temp\{D1ACB2E0-9E5B-4ADC-B4C2-C509D44532F3}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{D1ACB2E0-9E5B-4ADC-B4C2-C509D44532F3}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{5FA85CFD-E819-4DF4-806A-AC10BC2BEDF2}
        3⤵
        • Executes dropped EXE
        PID:1376
      • C:\Users\Admin\AppData\Local\Temp\{D1ACB2E0-9E5B-4ADC-B4C2-C509D44532F3}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{D1ACB2E0-9E5B-4ADC-B4C2-C509D44532F3}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{2C1B9A12-0AAC-4DA0-B90B-7F209845E288}
        3⤵
        • Executes dropped EXE
        PID:1252
      • C:\Users\Admin\AppData\Local\Temp\{D1ACB2E0-9E5B-4ADC-B4C2-C509D44532F3}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{D1ACB2E0-9E5B-4ADC-B4C2-C509D44532F3}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{7E34EEF5-9031-418B-8467-E9B37B343690}
        3⤵
        • Executes dropped EXE
        PID:6072
      • C:\Users\Admin\AppData\Local\Temp\{2127C967-F38F-4B09-BC37-182F69538567}\crashreporter.exe
        C:\Users\Admin\AppData\Local\Temp\{2127C967-F38F-4B09-BC37-182F69538567}\crashreporter.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4628
        • C:\Users\Admin\AppData\Roaming\Lm_chrome_test_v5\crashreporter.exe
          C:\Users\Admin\AppData\Roaming\Lm_chrome_test_v5\crashreporter.exe
          4⤵
          • Suspicious use of SetThreadContext
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:3544
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\SysWOW64\cmd.exe
            5⤵
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:4900
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              6⤵
              • System Location Discovery: System Language Discovery
              PID:220

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\46f66edb

    Filesize

    1.5MB

    MD5

    a37a5e91ee7da25feaaa03b991f05ff8

    SHA1

    cf5a6a52492ba621c59b73ff62f974becd0d26e1

    SHA256

    55a2c4c6a8ecf0796c4e28f68d22dde599828891e8f70c17742c7dae6baca7bd

    SHA512

    64f422b50c3c78a93e4158e4099817cd7993b282e75371e0e64f635d308046abc07888bb1c5c3fe06e820b3cd012a74f67bf34ba2d2a711bb402df4da67a00ca

  • C:\Users\Admin\AppData\Local\Temp\MSIAB53.tmp

    Filesize

    171KB

    MD5

    a0e940a3d3c1523416675125e3b0c07e

    SHA1

    2e29eeba6da9a4023bc8071158feee3b0277fd1b

    SHA256

    b8fa7aa425e4084ea3721780a13d11e08b8d53d1c5414b73f22faeca1bfd314f

    SHA512

    736ea06824388372aeef1938c6b11e66f4595e0b0589d7b4a87ff4abbabe52e82dff64d916293eab47aa869cf372ced2c66755dd8a8471b2ab0d3a37ba91d0b2

  • C:\Users\Admin\AppData\Local\Temp\MSIADF4.tmp

    Filesize

    2.5MB

    MD5

    932e412fe8b075100a113b9a6336f122

    SHA1

    36e57c7a33b6750f86473e960ebba0fc7705c7d9

    SHA256

    137b957344aa4fc204786a436e80dcc1b43109ec54b10dc2823519d943d5100e

    SHA512

    6c6f21b1919599ddd19a37950e3d9d76ec2c0c8a328a45b4b63b241d1ec2fa53fe45d26ab2044e717a9bc6c2aeaf2ca6b654969da00449593dfa938bbfe900ad

  • C:\Users\Admin\AppData\Local\Temp\{2127C967-F38F-4B09-BC37-182F69538567}\VCRUNTIME140.dll

    Filesize

    88KB

    MD5

    e4ed441f0f6afb0d8d55af87900ec48f

    SHA1

    ac5bd77fd06ed29bebceb65371387555658870d9

    SHA256

    09d1e604e8cdd06176fcc3d3698861be20638a4391f9f2d9e23f868c1576ca94

    SHA512

    dec6d693aa2d6c043ef8ae35f7f613cf9366aeb8a5903e8e0c54644f799262229b91953c65d39f8535ce464c75bf34b3b23ddb50a9fc5f171d36d6bfa1e4d7dd

  • C:\Users\Admin\AppData\Local\Temp\{2127C967-F38F-4B09-BC37-182F69538567}\crashreporter.exe

    Filesize

    1.2MB

    MD5

    e69917fa99f750a6c4e19523c3f2014b

    SHA1

    4b0185f38b668d7332d411f4824de2d111b3e670

    SHA256

    51de0b104e9ced3028a41d01dedf735809eb7f60888621027c7f00f0fcf9c834

    SHA512

    2f3b3f878fcae51a718d5ae2c12b4d98372c7aab46ed93cd567e66a1b45a96fb79ad66b7aaf0e9383905f46e4f639597af4914640d23596583057112d94a22c4

  • C:\Users\Admin\AppData\Local\Temp\{2127C967-F38F-4B09-BC37-182F69538567}\fantail.tiff

    Filesize

    35KB

    MD5

    129afd98abb9c8790d01fc5f5c03a46c

    SHA1

    e6b3340e024f76d04ba5e24e6570d3cc0d67f64d

    SHA256

    d381fb7645aa0553e122efd20d78a421c19de4123ba9f3e9080f9002aff473ee

    SHA512

    360a9b9348285446d7bbfbd79dfc99cd54e8bd59abd5a1e3cd83db2c2432dad484ed5807de464d9ab1ce606fa9512d9c6bf0e5c4958e2afcfc75d8f96007de35

  • C:\Users\Admin\AppData\Local\Temp\{2127C967-F38F-4B09-BC37-182F69538567}\jpeg8.dll

    Filesize

    684KB

    MD5

    e4e335ea9f7d5824a1aa3abcbc5f7dc9

    SHA1

    2c840163497d6db2ad9aa0cf92fe990d8b7f8074

    SHA256

    66c5fddaf6af0c0ecd0ce6923010c9d4f5eab184e6b6cb3f5453d405281366a4

    SHA512

    082550fe52adb0a1a25809484e95c02b175c63c8b03dc68655a331d2369c4b79276a4338571a605814862ede8a6673ad781ea3f0c9b5372e0df60f07b3205587

  • C:\Users\Admin\AppData\Local\Temp\{2127C967-F38F-4B09-BC37-182F69538567}\lib-strings.dll

    Filesize

    125KB

    MD5

    5ae0bda29f1387fbb266c12daea57d03

    SHA1

    154c999a371af12b80782e3012934f1f1edbf80b

    SHA256

    762620c3e241e8da462311bec8ae87c9a01089ac028f77384a8ea2ba3854dac1

    SHA512

    063cb0ab3a29c73be01fd07070e27613b185c0b67ede20f3df1e5c63a3e9ce2a9996eb7864e6f13e7088339d9dd162b2a19c44d4b761711051961424c9e49930

  • C:\Users\Admin\AppData\Local\Temp\{2127C967-F38F-4B09-BC37-182F69538567}\libpng16.dll

    Filesize

    216KB

    MD5

    7895937099678ccf369519179b223016

    SHA1

    d08fee6de6e04e9a6df35e64de0082d6dbd4ff6f

    SHA256

    c162ed44fe43320ebeea325eb25c6b33d5411dfba9a260d186ebcb95478ef13c

    SHA512

    e51c717529b289e4af7bfe0ff0036f2d17ebc21678d3f8231e976a07de1a1d03b6b183a7544a562cedbf609b188e707264ff38d4307755a9c5f5e4510eb6a57c

  • C:\Users\Admin\AppData\Local\Temp\{2127C967-F38F-4B09-BC37-182F69538567}\msvcp140.dll

    Filesize

    439KB

    MD5

    4d157073a891d0832b9b05fb8aca73a8

    SHA1

    551efcdd93ecafc6b54ebb6f8f38c505d42d61ca

    SHA256

    718812adb0d669eea9606432202371e358c7de6cdeafeddad222c36ae0d3f263

    SHA512

    141563450e4cdf44315270360414f339fc3c96ebdaa46e28a1f673237c30f5e94e6da271db67547499c14dc3bd10e39767c3b6a2a3c9cec0a64a11f0263e0c5d

  • C:\Users\Admin\AppData\Local\Temp\{2127C967-F38F-4B09-BC37-182F69538567}\utricle.sql

    Filesize

    1.3MB

    MD5

    5f58dcfdbbedf28ceb4bf0fa1a797452

    SHA1

    b888788b8f419c103a363c2f1e3111fa5accbec1

    SHA256

    e2f3547809dc4b2c98dca60f6525ec04bb568526bb8f9b368e587b7f50777e6e

    SHA512

    477eb6d0af0e0bd511e662640db58ebefe27cdc42d03924eac9c0230ed2b0540ad1ec7960fc57bbddc7824b719c4066311b3b592c17427fca830795392ffc7b4

  • C:\Users\Admin\AppData\Local\Temp\{2127C967-F38F-4B09-BC37-182F69538567}\wxbase313u_vc_custom.dll

    Filesize

    3.3MB

    MD5

    fbe10d14b2a0b27fc8f228aa261ced38

    SHA1

    33bc390bc7088294ba4ad4db07a92a81743081e3

    SHA256

    9b52773e8cc7a1259cbd484528425bc4f0740f66eaa0b3b9e84d840e75fdfc40

    SHA512

    53078861a481b3655d5f8e346ddca035cf46111ea02dfceee65e6d9948003b5b5e4a95bcfbecea29ee1cf00293f01c8fa9576bbd84ac06447d91b21b92dc1862

  • C:\Users\Admin\AppData\Local\Temp\{2127C967-F38F-4B09-BC37-182F69538567}\wxmsw313u_core_vc_custom.dll

    Filesize

    9.2MB

    MD5

    4e6f4affac9e3241078e46d237b2dbf0

    SHA1

    1d19da4253c238bfb86a6142d39c6cee4562bd39

    SHA256

    dcf938002a46ca976e1166939baf54ebdf6031288c0d33f1857aae6929fdc39b

    SHA512

    b94cb411a7444d271fa97cac49a326f3ab06bc44529049c3c8879fc2a258e02358f483f20f5b8f7c96e8ca459bc9b72c155d2543bdba8c66d2005aba6225d6d4

  • C:\Users\Admin\AppData\Local\Temp\{2127C967-F38F-4B09-BC37-182F69538567}\zlib1.dll

    Filesize

    109KB

    MD5

    dfd95d4f4160f0756f2898144ba9e300

    SHA1

    f6b426ce6f17255956637834105af3a403eda36c

    SHA256

    964cbd05e4e8cfc1ba7f1fa17625b1ce7e539e519f725f8cb7f2f342641bf03d

    SHA512

    d414ec8a53f972ef2fb5f2b94a4cf417ceefba9a09a4677de6c376f3a27e435cf57e8c997695971d6d99c4ef705eb803994426d3da81ef6061a276bd4b762d4f

  • C:\Users\Admin\AppData\Local\Temp\{D1ACB2E0-9E5B-4ADC-B4C2-C509D44532F3}\ISBEW64.exe

    Filesize

    178KB

    MD5

    40f3a092744e46f3531a40b917cca81e

    SHA1

    c73f62a44cb3a75933cecf1be73a48d0d623039b

    SHA256

    561f14cdece85b38617403e1c525ff0b1b752303797894607a4615d0bd66f97f

    SHA512

    1589b27db29051c772e5ba56953d9f798efbf74d75e0524fa8569df092d28960972779811a7916198d0707d35b1093d3e0dd7669a8179c412cfa7df7120733b2

  • C:\Users\Admin\AppData\Local\Temp\{D1ACB2E0-9E5B-4ADC-B4C2-C509D44532F3}\ISRT.dll

    Filesize

    426KB

    MD5

    8af02bf8e358e11caec4f2e7884b43cc

    SHA1

    16badc6c610eeb08de121ab268093dd36b56bf27

    SHA256

    58a724d23c63387a2dda27ccfdbc8ca87fd4db671bea8bb636247667f6a5a11e

    SHA512

    d0228a8cc93ff6647c2f4ba645fa224dc9d114e2adb5b5d01670b6dafc2258b5b1be11629868748e77b346e291974325e8e8e1192042d7c04a35fc727ad4e3fd

  • C:\Users\Admin\AppData\Local\Temp\{D1ACB2E0-9E5B-4ADC-B4C2-C509D44532F3}\_isres_0x0409.dll

    Filesize

    1.8MB

    MD5

    7de024bc275f9cdeaf66a865e6fd8e58

    SHA1

    5086e4a26f9b80699ea8d9f2a33cead28a1819c0

    SHA256

    bd32468ee7e8885323f22eabbff9763a0f6ffef3cc151e0bd0481df5888f4152

    SHA512

    191c57e22ea13d13806dd390c4039029d40c7532918618d185d8a627aabc3969c7af2e532e3c933bde8f652b4723d951bf712e9ba0cc0d172dde693012f5ef1a

  • memory/220-133-0x0000000000590000-0x0000000000664000-memory.dmp

    Filesize

    848KB

  • memory/220-136-0x0000000004D40000-0x0000000004D90000-memory.dmp

    Filesize

    320KB

  • memory/220-141-0x0000000005AB0000-0x0000000005B16000-memory.dmp

    Filesize

    408KB

  • memory/220-140-0x00000000059D0000-0x00000000059EE000-memory.dmp

    Filesize

    120KB

  • memory/220-139-0x0000000005F00000-0x000000000642C000-memory.dmp

    Filesize

    5.2MB

  • memory/220-138-0x0000000005950000-0x00000000059C6000-memory.dmp

    Filesize

    472KB

  • memory/220-137-0x0000000004FF0000-0x00000000051B2000-memory.dmp

    Filesize

    1.8MB

  • memory/220-135-0x00000000052A0000-0x0000000005844000-memory.dmp

    Filesize

    5.6MB

  • memory/220-134-0x0000000004C20000-0x0000000004CB2000-memory.dmp

    Filesize

    584KB

  • memory/220-130-0x0000000074030000-0x0000000075284000-memory.dmp

    Filesize

    18.3MB

  • memory/3544-123-0x0000000073110000-0x000000007328B000-memory.dmp

    Filesize

    1.5MB

  • memory/3544-117-0x0000000073110000-0x000000007328B000-memory.dmp

    Filesize

    1.5MB

  • memory/3544-118-0x00007FFDCB470000-0x00007FFDCB665000-memory.dmp

    Filesize

    2.0MB

  • memory/4628-76-0x0000000072FF0000-0x000000007316B000-memory.dmp

    Filesize

    1.5MB

  • memory/4628-77-0x00007FFDCB470000-0x00007FFDCB665000-memory.dmp

    Filesize

    2.0MB

  • memory/4900-128-0x0000000073110000-0x000000007328B000-memory.dmp

    Filesize

    1.5MB

  • memory/4900-126-0x00007FFDCB470000-0x00007FFDCB665000-memory.dmp

    Filesize

    2.0MB

  • memory/4972-39-0x0000000010000000-0x0000000010114000-memory.dmp

    Filesize

    1.1MB

  • memory/4972-44-0x00000000037E0000-0x00000000039A7000-memory.dmp

    Filesize

    1.8MB