Analysis

  • max time kernel
    141s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/04/2025, 13:15

General

  • Target

    WNBOZYUN.msi

  • Size

    23.5MB

  • MD5

    fbad39a4e69da1cc3bf48541c7905d4c

  • SHA1

    747b277cd5bb37e719877e45864f3beedc949f06

  • SHA256

    923efb46578f7f31a9734ec1d7e7e1b9edf1560fec54d7319179aa51cf3dd26a

  • SHA512

    199763a4cc4fdde9aecec9b15523d1dc4283475128c0544ecab4dbe2887b62e9f54780e03539822f0f186e876b213269959ea07b2fbc4b01574a271784d1ef50

  • SSDEEP

    196608:/W/NUkyHnX2H4hsNAW+X8XPCNzllXzYEj3Jl0kj386l4ClxDRpIqX:JDHnXA4hsNAdX8XPCNJnZT4i+qX

Malware Config

Signatures

  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 2 IoCs
  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\WNBOZYUN.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4788
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1824
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding ED5E0C3377C5ACB7CA85CAD5FA32605B C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1720
      • C:\Users\Admin\AppData\Local\Temp\{263AFBD9-A867-4261-B2FC-AEF5DED39619}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{263AFBD9-A867-4261-B2FC-AEF5DED39619}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{0247D0E7-D7C7-4A19-BB05-56A1988E20F5}
        3⤵
        • Executes dropped EXE
        PID:1336
      • C:\Users\Admin\AppData\Local\Temp\{263AFBD9-A867-4261-B2FC-AEF5DED39619}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{263AFBD9-A867-4261-B2FC-AEF5DED39619}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{DF7F17D5-30A9-4DD5-A3F4-768AC5B6F1AE}
        3⤵
        • Executes dropped EXE
        PID:4148
      • C:\Users\Admin\AppData\Local\Temp\{263AFBD9-A867-4261-B2FC-AEF5DED39619}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{263AFBD9-A867-4261-B2FC-AEF5DED39619}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{CA984185-B526-402D-9E61-5AFCB63041C1}
        3⤵
        • Executes dropped EXE
        PID:3832
      • C:\Users\Admin\AppData\Local\Temp\{263AFBD9-A867-4261-B2FC-AEF5DED39619}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{263AFBD9-A867-4261-B2FC-AEF5DED39619}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{7F7CAD0B-C4B4-4128-A42F-5005B6E4AA17}
        3⤵
        • Executes dropped EXE
        PID:1588
      • C:\Users\Admin\AppData\Local\Temp\{263AFBD9-A867-4261-B2FC-AEF5DED39619}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{263AFBD9-A867-4261-B2FC-AEF5DED39619}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{EBEF573D-B8BB-4F6D-913C-854BA41620E9}
        3⤵
        • Executes dropped EXE
        PID:1280
      • C:\Users\Admin\AppData\Local\Temp\{263AFBD9-A867-4261-B2FC-AEF5DED39619}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{263AFBD9-A867-4261-B2FC-AEF5DED39619}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{A333B272-5AFC-4322-ABFD-D5DDEFD986EC}
        3⤵
        • Executes dropped EXE
        PID:2520
      • C:\Users\Admin\AppData\Local\Temp\{263AFBD9-A867-4261-B2FC-AEF5DED39619}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{263AFBD9-A867-4261-B2FC-AEF5DED39619}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{0D3ECD6D-AFDC-431C-A209-33148AACA227}
        3⤵
        • Executes dropped EXE
        PID:3464
      • C:\Users\Admin\AppData\Local\Temp\{263AFBD9-A867-4261-B2FC-AEF5DED39619}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{263AFBD9-A867-4261-B2FC-AEF5DED39619}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{EDAFFF33-B35A-426A-A041-2A34A1BC941D}
        3⤵
        • Executes dropped EXE
        PID:1936
      • C:\Users\Admin\AppData\Local\Temp\{263AFBD9-A867-4261-B2FC-AEF5DED39619}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{263AFBD9-A867-4261-B2FC-AEF5DED39619}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{D5215FCD-A9DD-42CB-AE8F-AEACAEA0A5AD}
        3⤵
        • Executes dropped EXE
        PID:3780
      • C:\Users\Admin\AppData\Local\Temp\{263AFBD9-A867-4261-B2FC-AEF5DED39619}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{263AFBD9-A867-4261-B2FC-AEF5DED39619}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{83ACC7B4-174B-4AEB-ABAB-B8C8F7F4BD95}
        3⤵
        • Executes dropped EXE
        PID:1540
      • C:\Users\Admin\AppData\Local\Temp\{EE8A0717-C2AE-4188-8BEC-631BE53427B8}\RoboTaskLite.exe
        C:\Users\Admin\AppData\Local\Temp\{EE8A0717-C2AE-4188-8BEC-631BE53427B8}\RoboTaskLite.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:452
        • C:\Users\Admin\AppData\Roaming\ServiceValid_testv2\RoboTaskLite.exe
          C:\Users\Admin\AppData\Roaming\ServiceValid_testv2\RoboTaskLite.exe
          4⤵
          • Suspicious use of SetThreadContext
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:1260
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\SysWOW64\cmd.exe
            5⤵
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:1940
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of SetWindowsHookEx
              PID:2828

Network

MITRE ATT&CK Enterprise v16

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MSI5D33.tmp

    Filesize

    171KB

    MD5

    a0e940a3d3c1523416675125e3b0c07e

    SHA1

    2e29eeba6da9a4023bc8071158feee3b0277fd1b

    SHA256

    b8fa7aa425e4084ea3721780a13d11e08b8d53d1c5414b73f22faeca1bfd314f

    SHA512

    736ea06824388372aeef1938c6b11e66f4595e0b0589d7b4a87ff4abbabe52e82dff64d916293eab47aa869cf372ced2c66755dd8a8471b2ab0d3a37ba91d0b2

  • C:\Users\Admin\AppData\Local\Temp\MSI613B.tmp

    Filesize

    2.5MB

    MD5

    ad5776edfcf8aae0f69730da79576be0

    SHA1

    0f36c4e7e79c1850d675af4a47a5ff55966d3483

    SHA256

    87517950f76654dd6f807e889ca48a7dc4fa8e99a206fe19299b1359a7205430

    SHA512

    b5c361a4cad3c53fb3a47ef4cffc2072791a59403f3b10508fb405dc74d4aec896ce6aca3cf24fa45d7de88be10626ea2f9675fe013940cc691e6ae3371e0487

  • C:\Users\Admin\AppData\Local\Temp\ce57693f

    Filesize

    1.4MB

    MD5

    d5723cd13b8dc084f1feed3568afef3a

    SHA1

    06911c411676bb5c542bc307eb0d5be878c10d39

    SHA256

    6ec2d016934f6edf6129afbdcbf4bec4f65ab44f669dbfda6e657eb4c07ff0a0

    SHA512

    44202a7071ffcdb57467ff3f7192b2b41c8bdc4b2c887e091f8e971f9d97d237bb1df15f8d86835d033daca6d0f2e21c8fb274beb646c32679dde99bdee62705

  • C:\Users\Admin\AppData\Local\Temp\tmpEE0B.tmp

    Filesize

    20KB

    MD5

    846e79035d3847aa16a65b00ddcdff67

    SHA1

    da0f645565ca09623658bfd55a25a6c666379c73

    SHA256

    4a7022a0711157de9eee08b806ad8b14b28a127321b2fc4dc7aa4b33c9d8d6ef

    SHA512

    e9223f31b94a5983ecbf2d98b32321cc89dffdeae185daaf861b7671e4e92d4761c4c7b99c6ee25e4bc626440f78799714463fa1cfc2aa4545215aae8bf4bcb0

  • C:\Users\Admin\AppData\Local\Temp\tmpEE2E.tmp

    Filesize

    20KB

    MD5

    a156bfab7f06800d5287d4616d6f8733

    SHA1

    8f365ec4db582dc519774dcbbfcc8001dd37b512

    SHA256

    e87b3d155c7582d4c1d889308b58f84e8fe90a1581014b21b785d6694bd156cc

    SHA512

    6c8eeab3ae6fb0d5be7758cca521665b216f31aed1aeeeaf121c99dc9f0192b385de0da36e94f90dd4a9bbbac6be2c5a55d2f284a24ccb7dec2c5302fb9b027c

  • C:\Users\Admin\AppData\Local\Temp\{263AFBD9-A867-4261-B2FC-AEF5DED39619}\ISBEW64.exe

    Filesize

    178KB

    MD5

    40f3a092744e46f3531a40b917cca81e

    SHA1

    c73f62a44cb3a75933cecf1be73a48d0d623039b

    SHA256

    561f14cdece85b38617403e1c525ff0b1b752303797894607a4615d0bd66f97f

    SHA512

    1589b27db29051c772e5ba56953d9f798efbf74d75e0524fa8569df092d28960972779811a7916198d0707d35b1093d3e0dd7669a8179c412cfa7df7120733b2

  • C:\Users\Admin\AppData\Local\Temp\{263AFBD9-A867-4261-B2FC-AEF5DED39619}\ISRT.dll

    Filesize

    426KB

    MD5

    8af02bf8e358e11caec4f2e7884b43cc

    SHA1

    16badc6c610eeb08de121ab268093dd36b56bf27

    SHA256

    58a724d23c63387a2dda27ccfdbc8ca87fd4db671bea8bb636247667f6a5a11e

    SHA512

    d0228a8cc93ff6647c2f4ba645fa224dc9d114e2adb5b5d01670b6dafc2258b5b1be11629868748e77b346e291974325e8e8e1192042d7c04a35fc727ad4e3fd

  • C:\Users\Admin\AppData\Local\Temp\{263AFBD9-A867-4261-B2FC-AEF5DED39619}\_isres_0x0409.dll

    Filesize

    1.8MB

    MD5

    7de024bc275f9cdeaf66a865e6fd8e58

    SHA1

    5086e4a26f9b80699ea8d9f2a33cead28a1819c0

    SHA256

    bd32468ee7e8885323f22eabbff9763a0f6ffef3cc151e0bd0481df5888f4152

    SHA512

    191c57e22ea13d13806dd390c4039029d40c7532918618d185d8a627aabc3969c7af2e532e3c933bde8f652b4723d951bf712e9ba0cc0d172dde693012f5ef1a

  • C:\Users\Admin\AppData\Local\Temp\{EE8A0717-C2AE-4188-8BEC-631BE53427B8}\RoboTaskLite.exe

    Filesize

    2.7MB

    MD5

    6ee5f7f9f0016b5cc4f93a949a08f0dc

    SHA1

    eafed63c2d271a607380788f2407d86529ae3f85

    SHA256

    dcc88bf0cfe7aa2c059d0f92f351627e8b38b6fdb2c85cb5a31a444bb0a6fba3

    SHA512

    b70980c1565e8060046949b4dfeb6fe75b210ded66e51c56a7f34d274a29159f06f89fcf863eb776e0729e3554e82d7923f8bbd1fac97a0d05d08ea5a6709e2f

  • C:\Users\Admin\AppData\Local\Temp\{EE8A0717-C2AE-4188-8BEC-631BE53427B8}\fell.jpg

    Filesize

    1.2MB

    MD5

    78ba7efb62cbf027c2a45d6dd73f7a08

    SHA1

    83d6bda63c02e3a7b2cd730cc4c87efd82488722

    SHA256

    6e072e22e76d32f12aaf1742b03256e9872d265a107a42000bce5f6e40ff71a8

    SHA512

    bfc64cc9dc7df764eb3f0df00f6fabc86619d0ed9bfa210b511c40be04aba604a23827527c2633c285b2e2a199c68a96472c7382da3a6048a8e7805753167603

  • C:\Users\Admin\AppData\Local\Temp\{EE8A0717-C2AE-4188-8BEC-631BE53427B8}\residentiary.php

    Filesize

    58KB

    MD5

    56ddfc14e3334bdeab08c68c00d2c002

    SHA1

    8d801b713acb99342abeddcb8a9f3554821eac9c

    SHA256

    21883109845ca284024c63b8c59a59ba8d053fa7395720d9c67b09e45868de6c

    SHA512

    198336b2617a7eb59cabb253a825253601e44c0934324f22c6ee68567503bf006dfa543d020b9b776b7a4816604b79ef6e22a26fe13e45058cc5a074f89e6885

  • C:\Users\Admin\AppData\Local\Temp\{EE8A0717-C2AE-4188-8BEC-631BE53427B8}\rtl280.bpl

    Filesize

    12.3MB

    MD5

    fcdf410c77a83f042590c29280b39f52

    SHA1

    c702ff6526e509b22c5659e6f7eeee1a38909a9e

    SHA256

    08941c5fa519f9dffba137a2a4844e9063ed71bc0c881fb7643e67fb3e3ddb0a

    SHA512

    bc68982570c27c859d1eaa06191058d23889d10f25279eb2e8130af715a50e3fe1b0b7aceb5d64e90f7e102ba3aa4bdc6c2c7705bab4bd55e24d5f5884211fb7

  • C:\Users\Admin\AppData\Local\Temp\{EE8A0717-C2AE-4188-8BEC-631BE53427B8}\vcl280.bpl

    Filesize

    4.0MB

    MD5

    c6bac35fca828124e75535a4bd4c563c

    SHA1

    4cfe1c92e4a28fda8888035d1475f09d55a66a5b

    SHA256

    76793f3fc4515628acafc68441850bd4f36eacb3ab568d30a3076d7e19cc3c8e

    SHA512

    4264c1314d49c6fe9866fabddb3fa096cd84a0be09901b844ba4df5103f9ed2a8914caaab0562c19ae34659bb382ea49e8254f3662f9b79d4b90334f45159004

  • memory/452-69-0x0000000000400000-0x000000000073B000-memory.dmp

    Filesize

    3.2MB

  • memory/452-75-0x0000000050050000-0x0000000050CA7000-memory.dmp

    Filesize

    12.3MB

  • memory/452-74-0x0000000050CB0000-0x00000000510C2000-memory.dmp

    Filesize

    4.1MB

  • memory/452-58-0x00007FF864110000-0x00007FF864305000-memory.dmp

    Filesize

    2.0MB

  • memory/452-57-0x0000000073D70000-0x0000000073EEB000-memory.dmp

    Filesize

    1.5MB

  • memory/1260-78-0x00007FF864110000-0x00007FF864305000-memory.dmp

    Filesize

    2.0MB

  • memory/1260-77-0x0000000073D70000-0x0000000073EEB000-memory.dmp

    Filesize

    1.5MB

  • memory/1260-89-0x0000000073D70000-0x0000000073EEB000-memory.dmp

    Filesize

    1.5MB

  • memory/1260-93-0x0000000050050000-0x0000000050CA7000-memory.dmp

    Filesize

    12.3MB

  • memory/1720-33-0x0000000010000000-0x0000000010114000-memory.dmp

    Filesize

    1.1MB

  • memory/1720-38-0x0000000003620000-0x00000000037E7000-memory.dmp

    Filesize

    1.8MB

  • memory/1940-95-0x00007FF864110000-0x00007FF864305000-memory.dmp

    Filesize

    2.0MB

  • memory/1940-98-0x0000000073D70000-0x0000000073EEB000-memory.dmp

    Filesize

    1.5MB

  • memory/2828-103-0x0000000000E10000-0x0000000000ED4000-memory.dmp

    Filesize

    784KB

  • memory/2828-105-0x0000000005AF0000-0x0000000006094000-memory.dmp

    Filesize

    5.6MB

  • memory/2828-106-0x0000000005460000-0x000000000546A000-memory.dmp

    Filesize

    40KB

  • memory/2828-107-0x0000000005860000-0x0000000005A22000-memory.dmp

    Filesize

    1.8MB

  • memory/2828-108-0x00000000055C0000-0x0000000005636000-memory.dmp

    Filesize

    472KB

  • memory/2828-109-0x0000000005690000-0x00000000056E0000-memory.dmp

    Filesize

    320KB

  • memory/2828-110-0x00000000066E0000-0x0000000006C0C000-memory.dmp

    Filesize

    5.2MB

  • memory/2828-111-0x0000000006240000-0x000000000625E000-memory.dmp

    Filesize

    120KB

  • memory/2828-112-0x0000000006330000-0x0000000006396000-memory.dmp

    Filesize

    408KB

  • memory/2828-104-0x0000000005490000-0x0000000005522000-memory.dmp

    Filesize

    584KB

  • memory/2828-100-0x0000000073F40000-0x0000000075194000-memory.dmp

    Filesize

    18.3MB

  • memory/2828-135-0x0000000007BC0000-0x0000000007BCA000-memory.dmp

    Filesize

    40KB

  • memory/2828-139-0x0000000005AD0000-0x0000000005AE2000-memory.dmp

    Filesize

    72KB

  • memory/2828-140-0x00000000060E0000-0x000000000611C000-memory.dmp

    Filesize

    240KB