Analysis

  • max time kernel
    139s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/04/2025, 12:21

General

  • Target

    msi (5).msi

  • Size

    33.4MB

  • MD5

    0883973200bb9fc4d641690284d6e052

  • SHA1

    50a1aa74fade4aad8dc76f264a73973d2667b17d

  • SHA256

    4e7243907d83bb073b054ce1eb3508fdd234623b3570c077fa7c0c35ea7e90fc

  • SHA512

    a4cb67d2d51632d29d57df9a89cb0e2e5b6fdaa3931455a8b2b66460da82dde7183b8058f910748057a2c791574e920075d32da4b11c1c71b73e7fc1f290e0d6

  • SSDEEP

    393216:O/u6I9kN75OTLwxaEPnrIzIn/y+NLhxaBJ8oWhKUzLkWEKC+5ylVgTKO/fJ+rFOI:jDEPnelVFLWTUvwrp47

Malware Config

Signatures

  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 2 IoCs
  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I "C:\Users\Admin\AppData\Local\Temp\msi (5).msi"
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4180
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4696
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 5FDEEC5126D8114F88439EF1DF320383 C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4248
      • C:\Users\Admin\AppData\Local\Temp\{8EF33731-5212-4F8F-8B42-9DB2E47AE33A}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{8EF33731-5212-4F8F-8B42-9DB2E47AE33A}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{0132B106-0705-49FE-90CB-4FB7A1468CC7}
        3⤵
        • Executes dropped EXE
        PID:4888
      • C:\Users\Admin\AppData\Local\Temp\{8EF33731-5212-4F8F-8B42-9DB2E47AE33A}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{8EF33731-5212-4F8F-8B42-9DB2E47AE33A}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{2D34730E-05F0-4D08-AC00-A42C5B1F42CB}
        3⤵
        • Executes dropped EXE
        PID:1132
      • C:\Users\Admin\AppData\Local\Temp\{8EF33731-5212-4F8F-8B42-9DB2E47AE33A}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{8EF33731-5212-4F8F-8B42-9DB2E47AE33A}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{ECB2DEA3-3782-40CD-97CE-D730DBF47163}
        3⤵
        • Executes dropped EXE
        PID:4512
      • C:\Users\Admin\AppData\Local\Temp\{8EF33731-5212-4F8F-8B42-9DB2E47AE33A}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{8EF33731-5212-4F8F-8B42-9DB2E47AE33A}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{AF933E79-1082-4952-B3E7-8D6F77772E16}
        3⤵
        • Executes dropped EXE
        PID:2892
      • C:\Users\Admin\AppData\Local\Temp\{8EF33731-5212-4F8F-8B42-9DB2E47AE33A}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{8EF33731-5212-4F8F-8B42-9DB2E47AE33A}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{A917AA90-98E2-4517-9800-7195E47BBB71}
        3⤵
        • Executes dropped EXE
        PID:4480
      • C:\Users\Admin\AppData\Local\Temp\{8EF33731-5212-4F8F-8B42-9DB2E47AE33A}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{8EF33731-5212-4F8F-8B42-9DB2E47AE33A}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{E5302914-0A06-41A7-8682-1B6A87F61250}
        3⤵
        • Executes dropped EXE
        PID:4936
      • C:\Users\Admin\AppData\Local\Temp\{8EF33731-5212-4F8F-8B42-9DB2E47AE33A}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{8EF33731-5212-4F8F-8B42-9DB2E47AE33A}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{03DB2932-0469-4581-A824-E107CCA42DEA}
        3⤵
        • Executes dropped EXE
        PID:5556
      • C:\Users\Admin\AppData\Local\Temp\{8EF33731-5212-4F8F-8B42-9DB2E47AE33A}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{8EF33731-5212-4F8F-8B42-9DB2E47AE33A}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{B270001F-F140-429A-A468-9E67A7B1E7F3}
        3⤵
        • Executes dropped EXE
        PID:4884
      • C:\Users\Admin\AppData\Local\Temp\{8EF33731-5212-4F8F-8B42-9DB2E47AE33A}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{8EF33731-5212-4F8F-8B42-9DB2E47AE33A}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{76D18E57-3E80-477F-99CC-2F00BA6DF87B}
        3⤵
        • Executes dropped EXE
        PID:4968
      • C:\Users\Admin\AppData\Local\Temp\{8EF33731-5212-4F8F-8B42-9DB2E47AE33A}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{8EF33731-5212-4F8F-8B42-9DB2E47AE33A}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{F887D0A0-C2EE-4888-BFAE-D239942230EB}
        3⤵
        • Executes dropped EXE
        PID:5588
      • C:\Users\Admin\AppData\Local\Temp\{DE6FC227-7852-4EF4-A49A-A23EBAFC1D69}\Ahnenblatt4.exe
        C:\Users\Admin\AppData\Local\Temp\{DE6FC227-7852-4EF4-A49A-A23EBAFC1D69}\Ahnenblatt4.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3188
        • C:\Users\Admin\AppData\Roaming\MontlsIOK_v5\Ahnenblatt4.exe
          C:\Users\Admin\AppData\Roaming\MontlsIOK_v5\Ahnenblatt4.exe
          4⤵
          • Suspicious use of SetThreadContext
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:1456
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\SysWOW64\cmd.exe
            5⤵
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:3496
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2904

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MSI5F18.tmp

    Filesize

    171KB

    MD5

    a0e940a3d3c1523416675125e3b0c07e

    SHA1

    2e29eeba6da9a4023bc8071158feee3b0277fd1b

    SHA256

    b8fa7aa425e4084ea3721780a13d11e08b8d53d1c5414b73f22faeca1bfd314f

    SHA512

    736ea06824388372aeef1938c6b11e66f4595e0b0589d7b4a87ff4abbabe52e82dff64d916293eab47aa869cf372ced2c66755dd8a8471b2ab0d3a37ba91d0b2

  • C:\Users\Admin\AppData\Local\Temp\MSI634F.tmp

    Filesize

    2.5MB

    MD5

    340e52708d50a6f08b836ef5de19f6cf

    SHA1

    9a87841a0b9b30c3bb4db68b1bf823d801a17939

    SHA256

    4d3fa1b2abec177748692d1261cc8906500f5760f770133e64d260f0819b2d74

    SHA512

    b1551cd7f549bf0c278c45802de76dabe8d70c30e8e8c76a062f8a6df73d67c7530e357f2c9f1d8a34353772c7e2df973540e52328aae020b8dd2dec1451a0c4

  • C:\Users\Admin\AppData\Local\Temp\df839f07

    Filesize

    1.5MB

    MD5

    56726887343345be48768de32fd8c9c2

    SHA1

    95ff249918f99bdae13fc48bf15a4ab439f89a01

    SHA256

    d775dcec0daaa615773495ff558709db08446cb38165d56039277dfe7a95f813

    SHA512

    84f7a8acebe14a98ad616e13f893f4f0d8959b511a54b93dad47baf56692279ca8fe521df25016ed4cc1c5607156535ee8c65a1e90e6b4c1503f755e72b15ba3

  • C:\Users\Admin\AppData\Local\Temp\{8EF33731-5212-4F8F-8B42-9DB2E47AE33A}\ISBEW64.exe

    Filesize

    178KB

    MD5

    40f3a092744e46f3531a40b917cca81e

    SHA1

    c73f62a44cb3a75933cecf1be73a48d0d623039b

    SHA256

    561f14cdece85b38617403e1c525ff0b1b752303797894607a4615d0bd66f97f

    SHA512

    1589b27db29051c772e5ba56953d9f798efbf74d75e0524fa8569df092d28960972779811a7916198d0707d35b1093d3e0dd7669a8179c412cfa7df7120733b2

  • C:\Users\Admin\AppData\Local\Temp\{8EF33731-5212-4F8F-8B42-9DB2E47AE33A}\ISRT.dll

    Filesize

    426KB

    MD5

    8af02bf8e358e11caec4f2e7884b43cc

    SHA1

    16badc6c610eeb08de121ab268093dd36b56bf27

    SHA256

    58a724d23c63387a2dda27ccfdbc8ca87fd4db671bea8bb636247667f6a5a11e

    SHA512

    d0228a8cc93ff6647c2f4ba645fa224dc9d114e2adb5b5d01670b6dafc2258b5b1be11629868748e77b346e291974325e8e8e1192042d7c04a35fc727ad4e3fd

  • C:\Users\Admin\AppData\Local\Temp\{8EF33731-5212-4F8F-8B42-9DB2E47AE33A}\_isres_0x0409.dll

    Filesize

    1.8MB

    MD5

    7de024bc275f9cdeaf66a865e6fd8e58

    SHA1

    5086e4a26f9b80699ea8d9f2a33cead28a1819c0

    SHA256

    bd32468ee7e8885323f22eabbff9763a0f6ffef3cc151e0bd0481df5888f4152

    SHA512

    191c57e22ea13d13806dd390c4039029d40c7532918618d185d8a627aabc3969c7af2e532e3c933bde8f652b4723d951bf712e9ba0cc0d172dde693012f5ef1a

  • C:\Users\Admin\AppData\Local\Temp\{DE6FC227-7852-4EF4-A49A-A23EBAFC1D69}\Ahnenblatt4.exe

    Filesize

    27.6MB

    MD5

    950f3bebb7563ee8354b21ef9cbea4a2

    SHA1

    7b520ff8bd1b552e3de00a38a87722f21dc1c9f4

    SHA256

    8f4f53bc02348a549f3437444aacec43eae5f90875ea3c5ec96600ba1cb4a061

    SHA512

    6aac49f02fcfc131634864684c59c82c51208ab3191eacfd28bd1e184a8d6583565e2a57701f55c283b7297f843d4bcdd07ed7db4fc212a7b1c153e7cc4486d5

  • C:\Users\Admin\AppData\Local\Temp\{DE6FC227-7852-4EF4-A49A-A23EBAFC1D69}\CC32290MT.DLL

    Filesize

    1.0MB

    MD5

    8a54f704750dbb39422d194296b4befe

    SHA1

    21c8e104d5de61b092a1045569ea74c3ac48c907

    SHA256

    c185eb816e0f5d524ceb6321124285af42bf8554a2663b281654875d228c4ff6

    SHA512

    b2fa8e59ddbd00cda345156f190a5b0f58af057f4d9a7d6bf3c9ce2fdd35a8522e4957ada6925746ec370123fefc9f2a5b9f3f78879a364662ccaa39cad65278

  • C:\Users\Admin\AppData\Local\Temp\{DE6FC227-7852-4EF4-A49A-A23EBAFC1D69}\borlndmm.dll

    Filesize

    71KB

    MD5

    2455c75c25687f2e363f0dbef000daf3

    SHA1

    ce4cee2bc712ecc7fac8f6ad14b7fc237ee1ebca

    SHA256

    c36c66cffef5471d58cd81d61c9d799303fb44abc784fc75fbcc2b5c6c44aa3a

    SHA512

    36eeb8cd14c8096707e255c356501b4ff9080d927384c4bd4db18db50821654485e81ee5a4e9af8ebe613c68fc63bfed4d3dfde6c9e0d4ff434a359cc6bb145e

  • C:\Users\Admin\AppData\Local\Temp\{DE6FC227-7852-4EF4-A49A-A23EBAFC1D69}\ladyssmock.avi

    Filesize

    63KB

    MD5

    42595705c8bda44f53a62e0a997c5203

    SHA1

    b754e6596f809e07453175cf5d925e688911a9c8

    SHA256

    648f103313bdff4b3ecd1f190c1a9110ff79ccd4f9b3551c0564734b901adb63

    SHA512

    9b7cbda86b58f434bea72f0be8cbffdb48980356835c16bea65d30dfc4ccdec3b3467631081bc0d9fc5d23ee1969e90ead8555e591cfb9288e8db581eb5b1853

  • C:\Users\Admin\AppData\Local\Temp\{DE6FC227-7852-4EF4-A49A-A23EBAFC1D69}\lickspittle.php

    Filesize

    1.2MB

    MD5

    f3e0c0bb9f30624cd96485bef594ae3c

    SHA1

    56b311cee5c242c5ab5d8182ccfd9d796da03d57

    SHA256

    1e04c0ffac66ddedbe4d2447150dc7b79cccad0276a4f23aacffba6c615c673c

    SHA512

    dae4865f62decaf5a1aa96a1e2c816bd5f5a81b21a16af271f6a6047971403830f1bc873edacc7c70e9b7fc86f77d1930bd586c2d22bbbabfc4ebc4d90557596

  • memory/1456-72-0x0000000000580000-0x00000000022F7000-memory.dmp

    Filesize

    29.5MB

  • memory/1456-93-0x0000000073040000-0x0000000073158000-memory.dmp

    Filesize

    1.1MB

  • memory/1456-92-0x0000000073160000-0x000000007317C000-memory.dmp

    Filesize

    112KB

  • memory/1456-89-0x0000000073380000-0x00000000734FB000-memory.dmp

    Filesize

    1.5MB

  • memory/1456-88-0x00007FFFC4C10000-0x00007FFFC4E05000-memory.dmp

    Filesize

    2.0MB

  • memory/1456-77-0x0000000073380000-0x00000000734FB000-memory.dmp

    Filesize

    1.5MB

  • memory/2904-100-0x0000000073B00000-0x0000000074D54000-memory.dmp

    Filesize

    18.3MB

  • memory/2904-104-0x0000000004FB0000-0x0000000005042000-memory.dmp

    Filesize

    584KB

  • memory/2904-107-0x0000000005110000-0x0000000005160000-memory.dmp

    Filesize

    320KB

  • memory/2904-106-0x0000000005680000-0x0000000005C24000-memory.dmp

    Filesize

    5.6MB

  • memory/2904-109-0x0000000006190000-0x00000000066BC000-memory.dmp

    Filesize

    5.2MB

  • memory/2904-108-0x0000000005330000-0x00000000054F2000-memory.dmp

    Filesize

    1.8MB

  • memory/2904-111-0x0000000005D90000-0x0000000005DF6000-memory.dmp

    Filesize

    408KB

  • memory/2904-103-0x0000000000900000-0x00000000009CC000-memory.dmp

    Filesize

    816KB

  • memory/2904-110-0x0000000005CC0000-0x0000000005CDE000-memory.dmp

    Filesize

    120KB

  • memory/2904-105-0x0000000005050000-0x00000000050C6000-memory.dmp

    Filesize

    472KB

  • memory/3188-57-0x0000000073380000-0x00000000734FB000-memory.dmp

    Filesize

    1.5MB

  • memory/3188-54-0x0000000000630000-0x00000000023A7000-memory.dmp

    Filesize

    29.5MB

  • memory/3188-73-0x0000000074170000-0x000000007418C000-memory.dmp

    Filesize

    112KB

  • memory/3188-58-0x00007FFFC4C10000-0x00007FFFC4E05000-memory.dmp

    Filesize

    2.0MB

  • memory/3188-74-0x00000000738F0000-0x0000000073A08000-memory.dmp

    Filesize

    1.1MB

  • memory/3496-95-0x00007FFFC4C10000-0x00007FFFC4E05000-memory.dmp

    Filesize

    2.0MB

  • memory/3496-98-0x0000000073380000-0x00000000734FB000-memory.dmp

    Filesize

    1.5MB

  • memory/4248-33-0x0000000010000000-0x0000000010114000-memory.dmp

    Filesize

    1.1MB

  • memory/4248-38-0x0000000002B70000-0x0000000002D37000-memory.dmp

    Filesize

    1.8MB