Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows7_x64 -
resource
win7 -
submitted
16-10-2020 10:39
Static task
static1
Behavioral task
behavioral1
Sample
RFQ_#76242788162.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
General
-
Target
RFQ_#76242788162.exe
-
Size
179KB
-
MD5
441ef18a2da7b635c7861e9a502a938b
-
SHA1
63721215f57495860838e078f0bb73d00ce4817a
-
SHA256
28b2e9be250b41e1f4ec167dff3620f09597b7292ad23f0c48a8d6cdcc388959
-
SHA512
e59fe8c48c52405ca03bf2f8ae63eb24dd236411e2ef0210ab8a1cd26faf906d0b13dd4f76ca9816e98b4bbbf8a7e8ed57588c631d9667119e1396525e95dd94
Malware Config
Extracted
Family
xpertrat
Version
3.0.10
Botnet
special X
C2
zytriew.duckdns.org:4141
Mutex
Y6K1I7G5-B5F3-V3F4-S5A6-T0V116U8H550
Signatures
-
XpertRAT Core Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1968-12-0x0000000000400000-0x0000000000443000-memory.dmp xpertrat behavioral1/memory/1968-13-0x0000000000401364-mapping.dmp xpertrat behavioral1/memory/1968-14-0x0000000000400000-0x0000000000443000-memory.dmp xpertrat -
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\Y6K1I7G5-B5F3-V3F4-S5A6-T0V116U8H550 = "C:\\Users\\Admin\\AppData\\Roaming\\Y6K1I7G5-B5F3-V3F4-S5A6-T0V116U8H550\\Y6K1I7G5-B5F3-V3F4-S5A6-T0V116U8H550.exe" iexplore.exe -
Processes:
RFQ_#76242788162.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" RFQ_#76242788162.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\Y6K1I7G5-B5F3-V3F4-S5A6-T0V116U8H550 = "C:\\Users\\Admin\\AppData\\Roaming\\Y6K1I7G5-B5F3-V3F4-S5A6-T0V116U8H550\\Y6K1I7G5-B5F3-V3F4-S5A6-T0V116U8H550.exe" iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Y6K1I7G5-B5F3-V3F4-S5A6-T0V116U8H550 = "C:\\Users\\Admin\\AppData\\Roaming\\Y6K1I7G5-B5F3-V3F4-S5A6-T0V116U8H550\\Y6K1I7G5-B5F3-V3F4-S5A6-T0V116U8H550.exe" iexplore.exe -
Processes:
RFQ_#76242788162.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RFQ_#76242788162.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
Processes:
RFQ_#76242788162.exepid process 1100 RFQ_#76242788162.exe 1100 RFQ_#76242788162.exe 1100 RFQ_#76242788162.exe 1100 RFQ_#76242788162.exe 1100 RFQ_#76242788162.exe 1100 RFQ_#76242788162.exe 1100 RFQ_#76242788162.exe 1100 RFQ_#76242788162.exe 1100 RFQ_#76242788162.exe 1100 RFQ_#76242788162.exe 1100 RFQ_#76242788162.exe 1100 RFQ_#76242788162.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
RFQ_#76242788162.exeRFQ_#76242788162.exedescription pid process target process PID 1100 set thread context of 1884 1100 RFQ_#76242788162.exe RFQ_#76242788162.exe PID 1884 set thread context of 1968 1884 RFQ_#76242788162.exe iexplore.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1936 1100 WerFault.exe RFQ_#76242788162.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1044 timeout.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
RFQ_#76242788162.exeRFQ_#76242788162.exeWerFault.exepid process 1100 RFQ_#76242788162.exe 1100 RFQ_#76242788162.exe 1100 RFQ_#76242788162.exe 1884 RFQ_#76242788162.exe 1884 RFQ_#76242788162.exe 1936 WerFault.exe 1936 WerFault.exe 1936 WerFault.exe 1936 WerFault.exe 1936 WerFault.exe 1884 RFQ_#76242788162.exe 1884 RFQ_#76242788162.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
RFQ_#76242788162.exeWerFault.exeiexplore.exedescription pid process Token: SeDebugPrivilege 1100 RFQ_#76242788162.exe Token: SeDebugPrivilege 1936 WerFault.exe Token: SeDebugPrivilege 1968 iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
RFQ_#76242788162.exeiexplore.exepid process 1884 RFQ_#76242788162.exe 1968 iexplore.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
RFQ_#76242788162.exeRFQ_#76242788162.exedescription pid process target process PID 1100 wrote to memory of 1044 1100 RFQ_#76242788162.exe timeout.exe PID 1100 wrote to memory of 1044 1100 RFQ_#76242788162.exe timeout.exe PID 1100 wrote to memory of 1044 1100 RFQ_#76242788162.exe timeout.exe PID 1100 wrote to memory of 1044 1100 RFQ_#76242788162.exe timeout.exe PID 1100 wrote to memory of 1884 1100 RFQ_#76242788162.exe RFQ_#76242788162.exe PID 1100 wrote to memory of 1884 1100 RFQ_#76242788162.exe RFQ_#76242788162.exe PID 1100 wrote to memory of 1884 1100 RFQ_#76242788162.exe RFQ_#76242788162.exe PID 1100 wrote to memory of 1884 1100 RFQ_#76242788162.exe RFQ_#76242788162.exe PID 1100 wrote to memory of 1884 1100 RFQ_#76242788162.exe RFQ_#76242788162.exe PID 1100 wrote to memory of 1884 1100 RFQ_#76242788162.exe RFQ_#76242788162.exe PID 1100 wrote to memory of 1884 1100 RFQ_#76242788162.exe RFQ_#76242788162.exe PID 1100 wrote to memory of 1884 1100 RFQ_#76242788162.exe RFQ_#76242788162.exe PID 1100 wrote to memory of 1936 1100 RFQ_#76242788162.exe WerFault.exe PID 1100 wrote to memory of 1936 1100 RFQ_#76242788162.exe WerFault.exe PID 1100 wrote to memory of 1936 1100 RFQ_#76242788162.exe WerFault.exe PID 1100 wrote to memory of 1936 1100 RFQ_#76242788162.exe WerFault.exe PID 1884 wrote to memory of 1968 1884 RFQ_#76242788162.exe iexplore.exe PID 1884 wrote to memory of 1968 1884 RFQ_#76242788162.exe iexplore.exe PID 1884 wrote to memory of 1968 1884 RFQ_#76242788162.exe iexplore.exe PID 1884 wrote to memory of 1968 1884 RFQ_#76242788162.exe iexplore.exe PID 1884 wrote to memory of 1968 1884 RFQ_#76242788162.exe iexplore.exe PID 1884 wrote to memory of 1968 1884 RFQ_#76242788162.exe iexplore.exe PID 1884 wrote to memory of 1968 1884 RFQ_#76242788162.exe iexplore.exe PID 1884 wrote to memory of 1968 1884 RFQ_#76242788162.exe iexplore.exe PID 1884 wrote to memory of 1968 1884 RFQ_#76242788162.exe iexplore.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
RFQ_#76242788162.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RFQ_#76242788162.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ_#76242788162.exe"C:\Users\Admin\AppData\Local\Temp\RFQ_#76242788162.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 42⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\RFQ_#76242788162.exe"C:\Users\Admin\AppData\Local\Temp\RFQ_#76242788162.exe"2⤵
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\RFQ_#76242788162.exe3⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1100 -s 15442⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1044-3-0x0000000000000000-mapping.dmp
-
memory/1100-1-0x0000000001230000-0x0000000001231000-memory.dmpFilesize
4KB
-
memory/1100-4-0x0000000000380000-0x00000000003B8000-memory.dmpFilesize
224KB
-
memory/1100-0-0x00000000744E0000-0x0000000074BCE000-memory.dmpFilesize
6.9MB
-
memory/1884-18-0x0000000000990000-0x0000000000994000-memory.dmpFilesize
16KB
-
memory/1884-5-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/1884-6-0x00000000004010B8-mapping.dmp
-
memory/1884-19-0x0000000002B30000-0x0000000002B34000-memory.dmpFilesize
16KB
-
memory/1936-10-0x0000000000000000-mapping.dmp
-
memory/1936-17-0x00000000026C0000-0x00000000026D1000-memory.dmpFilesize
68KB
-
memory/1936-11-0x0000000000940000-0x0000000000951000-memory.dmpFilesize
68KB
-
memory/1968-13-0x0000000000401364-mapping.dmp
-
memory/1968-14-0x0000000000400000-0x0000000000443000-memory.dmpFilesize
268KB
-
memory/1968-12-0x0000000000400000-0x0000000000443000-memory.dmpFilesize
268KB