Analysis

  • max time kernel
    139s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/04/2025, 12:21

General

  • Target

    msi (3).msi

  • Size

    6.2MB

  • MD5

    a65e06ab79f119377a2c92fcecc00dfe

  • SHA1

    4c3fc302743879aa9713540ce33c78ba12b703e4

  • SHA256

    2884419e86608068c59c4352cb7c9472de27549d4710e8ccb2127ac0464e4931

  • SHA512

    98cf6349bff180bd19d227d2cb27d69fe17cf04743fce479a25e7d72c930d7028f90f06ba274207913074fb5251a8bd92a315bd8cecfa2df6e343b232e816908

  • SSDEEP

    98304:bRJYyhWYSugsS6a5BtGFC6hxyoZMEHGTS6y4wi36gZByUkXWo7FQR:ls8IkrkS6y4ZdZsUkXWYQR

Malware Config

Signatures

  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 2 IoCs
  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I "C:\Users\Admin\AppData\Local\Temp\msi (3).msi"
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:440
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5484
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding FAA7DE3FDFE01B19A09116AD3E5C8823 C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5048
      • C:\Users\Admin\AppData\Local\Temp\{FD7FD29E-116F-48D8-A75A-FFF402CF3008}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{FD7FD29E-116F-48D8-A75A-FFF402CF3008}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{98044F93-D39C-4D7E-9392-068AE20C6C9F}
        3⤵
        • Executes dropped EXE
        PID:6020
      • C:\Users\Admin\AppData\Local\Temp\{FD7FD29E-116F-48D8-A75A-FFF402CF3008}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{FD7FD29E-116F-48D8-A75A-FFF402CF3008}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{70EDADDF-BE20-4C60-89B4-E3DF896B3FC4}
        3⤵
        • Executes dropped EXE
        PID:4744
      • C:\Users\Admin\AppData\Local\Temp\{FD7FD29E-116F-48D8-A75A-FFF402CF3008}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{FD7FD29E-116F-48D8-A75A-FFF402CF3008}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{64421DD7-0CDA-40A6-940A-D0FCCD7F8D39}
        3⤵
        • Executes dropped EXE
        PID:4756
      • C:\Users\Admin\AppData\Local\Temp\{FD7FD29E-116F-48D8-A75A-FFF402CF3008}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{FD7FD29E-116F-48D8-A75A-FFF402CF3008}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{EF40AA9C-B47B-40CB-AFDC-05DEE2D2651D}
        3⤵
        • Executes dropped EXE
        PID:4836
      • C:\Users\Admin\AppData\Local\Temp\{FD7FD29E-116F-48D8-A75A-FFF402CF3008}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{FD7FD29E-116F-48D8-A75A-FFF402CF3008}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{2056D62D-7FEF-410E-B78C-B067CC2A5307}
        3⤵
        • Executes dropped EXE
        PID:4864
      • C:\Users\Admin\AppData\Local\Temp\{FD7FD29E-116F-48D8-A75A-FFF402CF3008}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{FD7FD29E-116F-48D8-A75A-FFF402CF3008}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{3833DA2D-E537-48CB-951D-0E33E74C88EC}
        3⤵
        • Executes dropped EXE
        PID:2836
      • C:\Users\Admin\AppData\Local\Temp\{FD7FD29E-116F-48D8-A75A-FFF402CF3008}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{FD7FD29E-116F-48D8-A75A-FFF402CF3008}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{4D1E0DF6-FA61-480D-9529-321B2E36EF29}
        3⤵
        • Executes dropped EXE
        PID:3824
      • C:\Users\Admin\AppData\Local\Temp\{FD7FD29E-116F-48D8-A75A-FFF402CF3008}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{FD7FD29E-116F-48D8-A75A-FFF402CF3008}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{649D20CB-74D2-47AC-A473-93FA5D951F53}
        3⤵
        • Executes dropped EXE
        PID:4908
      • C:\Users\Admin\AppData\Local\Temp\{FD7FD29E-116F-48D8-A75A-FFF402CF3008}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{FD7FD29E-116F-48D8-A75A-FFF402CF3008}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{FA16085A-0AE8-41E3-81BA-65862ACFA715}
        3⤵
        • Executes dropped EXE
        PID:4260
      • C:\Users\Admin\AppData\Local\Temp\{FD7FD29E-116F-48D8-A75A-FFF402CF3008}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{FD7FD29E-116F-48D8-A75A-FFF402CF3008}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{061ABA75-FF4D-4EF7-ACB1-26E68E6BDF4A}
        3⤵
        • Executes dropped EXE
        PID:5000
      • C:\Users\Admin\AppData\Local\Temp\{67C41515-C693-450B-9CAB-529C02988FB2}\SplashWin.exe
        C:\Users\Admin\AppData\Local\Temp\{67C41515-C693-450B-9CAB-529C02988FB2}\SplashWin.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:5076
        • C:\Users\Admin\AppData\Roaming\streamCom3\SplashWin.exe
          C:\Users\Admin\AppData\Roaming\streamCom3\SplashWin.exe
          4⤵
          • Suspicious use of SetThreadContext
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:1896
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\SysWOW64\cmd.exe
            5⤵
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:1060
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of SetWindowsHookEx
              PID:1748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\9ed65435

    Filesize

    1.5MB

    MD5

    5e2cc66a17a40a2176aa21bf14ff25cd

    SHA1

    bac567c074110449e6ea88fd5c47cee451d94bed

    SHA256

    f63654819d4aa855a07c90f9c62311d942b115af231c17e300f874361df9d69e

    SHA512

    efa7e5f2eeb2ff5c0dd94e37d9801510deb063d671a32b74e0432791269cbe443b6979b4b6fa0999c34c2b11f610d4ff3deb76ad5a8372cc84a96691c9c92e5b

  • C:\Users\Admin\AppData\Local\Temp\MSI41AC.tmp

    Filesize

    171KB

    MD5

    a0e940a3d3c1523416675125e3b0c07e

    SHA1

    2e29eeba6da9a4023bc8071158feee3b0277fd1b

    SHA256

    b8fa7aa425e4084ea3721780a13d11e08b8d53d1c5414b73f22faeca1bfd314f

    SHA512

    736ea06824388372aeef1938c6b11e66f4595e0b0589d7b4a87ff4abbabe52e82dff64d916293eab47aa869cf372ced2c66755dd8a8471b2ab0d3a37ba91d0b2

  • C:\Users\Admin\AppData\Local\Temp\MSI4372.tmp

    Filesize

    2.5MB

    MD5

    82a261c10f4d65704c85fff07bef443b

    SHA1

    65c9329b929ea6e4a37f1d80805e6a3f9184c76c

    SHA256

    feb530736690ba1ff8f9d752f6c4ac76f857f33b29ea07a67a939294f5b5b205

    SHA512

    ea90f668793a91fc7717fa6083b35ce7aa30a1f808ecb5d4b6cba348fa0144ea38be6a3620ef30a46708c87125e0ccec42cd4833479693982575706de6b942d3

  • C:\Users\Admin\AppData\Local\Temp\{67C41515-C693-450B-9CAB-529C02988FB2}\DuiLib_u.dll

    Filesize

    860KB

    MD5

    83495e5db2654bcec3948ee486424599

    SHA1

    8a86af21864f565567cc4cc1f021f08b2e9febaa

    SHA256

    e770be8fba337cc01e24c7f059368526a804d2af64136a39bb84adeebcf9cfbc

    SHA512

    b4dbdfff0501fb3ba912556a25a64da38d3872bc31c94cc2395d6567b786cbbe104fd6178f019f8efba08dc5abcd964616a99d886b74aa80014b1c09ba7e9c41

  • C:\Users\Admin\AppData\Local\Temp\{67C41515-C693-450B-9CAB-529C02988FB2}\MSVCP140.dll

    Filesize

    437KB

    MD5

    e9f00dd8746712610706cbeffd8df0bd

    SHA1

    5004d98c89a40ebf35f51407553e38e5ca16fb98

    SHA256

    4cb882621a3d1c6283570447f842801b396db1b3dcd2e01c2f7002efd66a0a97

    SHA512

    4d1ce1fc92cea60859b27ca95ca1d1a7c2bec4e2356f87659a69bab9c1befa7a94a2c64669cef1c9dadf9d38ab77e836fe69acdda0f95fa1b32cba9e8c6bb554

  • C:\Users\Admin\AppData\Local\Temp\{67C41515-C693-450B-9CAB-529C02988FB2}\SplashWin.exe

    Filesize

    446KB

    MD5

    4d20b83562eec3660e45027ad56fb444

    SHA1

    ff6134c34500a8f8e5881e6a34263e5796f83667

    SHA256

    c5e650b331fa5292872fdaede3a75c8167a0f1280ce0cd3d58b880d23854bdb1

    SHA512

    718bd66fcff80b8008a4523d88bd726cdbc95e6e7bdb3f50e337e291294505ed54e6f5995d431968b85415e96f6f7ed37381ca021401ad57fda3b08a1f0c27f4

  • C:\Users\Admin\AppData\Local\Temp\{67C41515-C693-450B-9CAB-529C02988FB2}\VCRUNTIME140.dll

    Filesize

    74KB

    MD5

    a554e4f1addc0c2c4ebb93d66b790796

    SHA1

    9fbd1d222da47240db92cd6c50625eb0cf650f61

    SHA256

    e610cdac0a37147919032d0d723b967276c217ff06ea402f098696ab4112512a

    SHA512

    5f3253f071da3e0110def888682d255186f2e2a30a8480791c0cad74029420033b5c90f818ae845b5f041ee4005f6de174a687aca8f858371026423f017902cc

  • C:\Users\Admin\AppData\Local\Temp\{67C41515-C693-450B-9CAB-529C02988FB2}\diorama.json

    Filesize

    55KB

    MD5

    61947293abc79f5e003ac42d9b7489f4

    SHA1

    9386c10a6441a395385007130f1aa6916b22881a

    SHA256

    57414bda77d468f6573672aaa7b1b68e38ae511ab5be187c227232a054c257bb

    SHA512

    6c90d23c9ce0a3d2880c7e0bf056df32de9701ce5e3c210967e04a67c7730fc9b341ed46641390cd49a645c49c6c6ab7a63710df0814ae75cfb32d7fef43903f

  • C:\Users\Admin\AppData\Local\Temp\{67C41515-C693-450B-9CAB-529C02988FB2}\fizgig.avi

    Filesize

    1.2MB

    MD5

    fcc5038b02669e61ef74320716d716ec

    SHA1

    d8e85f8a86b8ac04d0ac3eb366bb1297bc90b6ce

    SHA256

    d21e36c5d31d0d0dd309d257a9bf26a40081a2940b5f807ddcfd74ee81ff824f

    SHA512

    a2c8110204977238d2ab691614824d792cfb757bd313566c745490e419b51a821bf05a1d7f90338cc56c6f334fdadf4c5cf7e1107b2b30b02e25c7153263026c

  • C:\Users\Admin\AppData\Local\Temp\{FD7FD29E-116F-48D8-A75A-FFF402CF3008}\ISBEW64.exe

    Filesize

    178KB

    MD5

    40f3a092744e46f3531a40b917cca81e

    SHA1

    c73f62a44cb3a75933cecf1be73a48d0d623039b

    SHA256

    561f14cdece85b38617403e1c525ff0b1b752303797894607a4615d0bd66f97f

    SHA512

    1589b27db29051c772e5ba56953d9f798efbf74d75e0524fa8569df092d28960972779811a7916198d0707d35b1093d3e0dd7669a8179c412cfa7df7120733b2

  • C:\Users\Admin\AppData\Local\Temp\{FD7FD29E-116F-48D8-A75A-FFF402CF3008}\ISRT.dll

    Filesize

    426KB

    MD5

    8af02bf8e358e11caec4f2e7884b43cc

    SHA1

    16badc6c610eeb08de121ab268093dd36b56bf27

    SHA256

    58a724d23c63387a2dda27ccfdbc8ca87fd4db671bea8bb636247667f6a5a11e

    SHA512

    d0228a8cc93ff6647c2f4ba645fa224dc9d114e2adb5b5d01670b6dafc2258b5b1be11629868748e77b346e291974325e8e8e1192042d7c04a35fc727ad4e3fd

  • C:\Users\Admin\AppData\Local\Temp\{FD7FD29E-116F-48D8-A75A-FFF402CF3008}\_isres_0x0409.dll

    Filesize

    1.8MB

    MD5

    7de024bc275f9cdeaf66a865e6fd8e58

    SHA1

    5086e4a26f9b80699ea8d9f2a33cead28a1819c0

    SHA256

    bd32468ee7e8885323f22eabbff9763a0f6ffef3cc151e0bd0481df5888f4152

    SHA512

    191c57e22ea13d13806dd390c4039029d40c7532918618d185d8a627aabc3969c7af2e532e3c933bde8f652b4723d951bf712e9ba0cc0d172dde693012f5ef1a

  • memory/1060-96-0x0000000075AF0000-0x0000000075C6B000-memory.dmp

    Filesize

    1.5MB

  • memory/1060-94-0x00007FFB391D0000-0x00007FFB393C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1748-103-0x0000000005110000-0x0000000005186000-memory.dmp

    Filesize

    472KB

  • memory/1748-106-0x0000000005490000-0x0000000005652000-memory.dmp

    Filesize

    1.8MB

  • memory/1748-110-0x0000000007700000-0x000000000770A000-memory.dmp

    Filesize

    40KB

  • memory/1748-109-0x0000000005EB0000-0x0000000005F16000-memory.dmp

    Filesize

    408KB

  • memory/1748-108-0x0000000005DF0000-0x0000000005E0E000-memory.dmp

    Filesize

    120KB

  • memory/1748-107-0x0000000006320000-0x000000000684C000-memory.dmp

    Filesize

    5.2MB

  • memory/1748-105-0x0000000005190000-0x00000000051E0000-memory.dmp

    Filesize

    320KB

  • memory/1748-98-0x00000000740C0000-0x0000000075314000-memory.dmp

    Filesize

    18.3MB

  • memory/1748-101-0x00000000009B0000-0x0000000000A7C000-memory.dmp

    Filesize

    816KB

  • memory/1748-102-0x0000000005070000-0x0000000005102000-memory.dmp

    Filesize

    584KB

  • memory/1748-104-0x0000000005740000-0x0000000005CE4000-memory.dmp

    Filesize

    5.6MB

  • memory/1896-89-0x0000000075AF0000-0x0000000075C6B000-memory.dmp

    Filesize

    1.5MB

  • memory/1896-91-0x0000000075AF0000-0x0000000075C6B000-memory.dmp

    Filesize

    1.5MB

  • memory/1896-90-0x00007FFB391D0000-0x00007FFB393C5000-memory.dmp

    Filesize

    2.0MB

  • memory/5048-34-0x0000000010000000-0x0000000010114000-memory.dmp

    Filesize

    1.1MB

  • memory/5048-39-0x00000000037B0000-0x0000000003977000-memory.dmp

    Filesize

    1.8MB

  • memory/5076-60-0x0000000074460000-0x00000000745DB000-memory.dmp

    Filesize

    1.5MB

  • memory/5076-61-0x00007FFB391D0000-0x00007FFB393C5000-memory.dmp

    Filesize

    2.0MB