Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10_x64 -
resource
win10 -
submitted
17-08-2020 18:55
Static task
static1
Behavioral task
behavioral1
Sample
Specification 788919754.pdf img ind.exe
Resource
win7v200722
General
-
Target
Specification 788919754.pdf img ind.exe
-
Size
411KB
-
MD5
b93e8fe38d0df20ba517b9d531660a4e
-
SHA1
ebc70668346f27b9c31759b335c3f6cb619c71b5
-
SHA256
293bf5eeec6d5d30ee3b3d26f73d6cb81f4e080a449774fc8d2c3a724454f521
-
SHA512
fa07022ab0d2d48066017e8283a9adab2fa2f8aebac2113ec451bd5b339639d0771fd975a92072bdabb24c24f4f40c25707aa9ec3d906104db9c59ba6ddf675d
Malware Config
Extracted
xpertrat
3.0.10
special X
sandshoe.myfirewall.org:4000
79.134.225.85:4000
F4S7P6J0-V116-K8H5-A6F1-U1L8V8A4B6R5
Signatures
-
XpertRAT Core Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1552-15-0x0000000000400000-0x0000000000443000-memory.dmp xpertrat behavioral2/memory/1552-16-0x0000000000401364-mapping.dmp xpertrat behavioral2/memory/1552-17-0x0000000000400000-0x0000000000443000-memory.dmp xpertrat -
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\F4S7P6J0-V116-K8H5-A6F1-U1L8V8A4B6R5 = "C:\\Users\\Admin\\AppData\\Roaming\\F4S7P6J0-V116-K8H5-A6F1-U1L8V8A4B6R5\\F4S7P6J0-V116-K8H5-A6F1-U1L8V8A4B6R5.exe" iexplore.exe -
Processes:
Specification 788919754.pdf img ind.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" Specification 788919754.pdf img ind.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run\F4S7P6J0-V116-K8H5-A6F1-U1L8V8A4B6R5 = "C:\\Users\\Admin\\AppData\\Roaming\\F4S7P6J0-V116-K8H5-A6F1-U1L8V8A4B6R5\\F4S7P6J0-V116-K8H5-A6F1-U1L8V8A4B6R5.exe" iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\F4S7P6J0-V116-K8H5-A6F1-U1L8V8A4B6R5 = "C:\\Users\\Admin\\AppData\\Roaming\\F4S7P6J0-V116-K8H5-A6F1-U1L8V8A4B6R5\\F4S7P6J0-V116-K8H5-A6F1-U1L8V8A4B6R5.exe" iexplore.exe -
Processes:
Specification 788919754.pdf img ind.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Specification 788919754.pdf img ind.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
Specification 788919754.pdf img ind.exeSpecification 788919754.pdf img ind.exedescription pid process target process PID 3676 set thread context of 4016 3676 Specification 788919754.pdf img ind.exe Specification 788919754.pdf img ind.exe PID 4016 set thread context of 1552 4016 Specification 788919754.pdf img ind.exe iexplore.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
Specification 788919754.pdf img ind.exeSpecification 788919754.pdf img ind.exepid process 3676 Specification 788919754.pdf img ind.exe 3676 Specification 788919754.pdf img ind.exe 3676 Specification 788919754.pdf img ind.exe 3676 Specification 788919754.pdf img ind.exe 3676 Specification 788919754.pdf img ind.exe 4016 Specification 788919754.pdf img ind.exe 4016 Specification 788919754.pdf img ind.exe 4016 Specification 788919754.pdf img ind.exe 4016 Specification 788919754.pdf img ind.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Specification 788919754.pdf img ind.exeiexplore.exedescription pid process Token: SeDebugPrivilege 3676 Specification 788919754.pdf img ind.exe Token: SeDebugPrivilege 1552 iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
Specification 788919754.pdf img ind.exeiexplore.exepid process 4016 Specification 788919754.pdf img ind.exe 1552 iexplore.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
Specification 788919754.pdf img ind.exeSpecification 788919754.pdf img ind.exedescription pid process target process PID 3676 wrote to memory of 3928 3676 Specification 788919754.pdf img ind.exe Specification 788919754.pdf img ind.exe PID 3676 wrote to memory of 3928 3676 Specification 788919754.pdf img ind.exe Specification 788919754.pdf img ind.exe PID 3676 wrote to memory of 3928 3676 Specification 788919754.pdf img ind.exe Specification 788919754.pdf img ind.exe PID 3676 wrote to memory of 4016 3676 Specification 788919754.pdf img ind.exe Specification 788919754.pdf img ind.exe PID 3676 wrote to memory of 4016 3676 Specification 788919754.pdf img ind.exe Specification 788919754.pdf img ind.exe PID 3676 wrote to memory of 4016 3676 Specification 788919754.pdf img ind.exe Specification 788919754.pdf img ind.exe PID 3676 wrote to memory of 4016 3676 Specification 788919754.pdf img ind.exe Specification 788919754.pdf img ind.exe PID 3676 wrote to memory of 4016 3676 Specification 788919754.pdf img ind.exe Specification 788919754.pdf img ind.exe PID 3676 wrote to memory of 4016 3676 Specification 788919754.pdf img ind.exe Specification 788919754.pdf img ind.exe PID 3676 wrote to memory of 4016 3676 Specification 788919754.pdf img ind.exe Specification 788919754.pdf img ind.exe PID 4016 wrote to memory of 1552 4016 Specification 788919754.pdf img ind.exe iexplore.exe PID 4016 wrote to memory of 1552 4016 Specification 788919754.pdf img ind.exe iexplore.exe PID 4016 wrote to memory of 1552 4016 Specification 788919754.pdf img ind.exe iexplore.exe PID 4016 wrote to memory of 1552 4016 Specification 788919754.pdf img ind.exe iexplore.exe PID 4016 wrote to memory of 1552 4016 Specification 788919754.pdf img ind.exe iexplore.exe PID 4016 wrote to memory of 1552 4016 Specification 788919754.pdf img ind.exe iexplore.exe PID 4016 wrote to memory of 1552 4016 Specification 788919754.pdf img ind.exe iexplore.exe PID 4016 wrote to memory of 1552 4016 Specification 788919754.pdf img ind.exe iexplore.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
Specification 788919754.pdf img ind.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Specification 788919754.pdf img ind.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Specification 788919754.pdf img ind.exe"C:\Users\Admin\AppData\Local\Temp\Specification 788919754.pdf img ind.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\Specification 788919754.pdf img ind.exe"{path}"2⤵PID:3928
-
-
C:\Users\Admin\AppData\Local\Temp\Specification 788919754.pdf img ind.exe"{path}"2⤵
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4016 -
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\Specification 788919754.pdf img ind.exe3⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1552
-
-