Analysis
-
max time kernel
151s -
max time network
139s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
17-11-2020 15:36
Static task
static1
Behavioral task
behavioral1
Sample
099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe
Resource
win7v20201028
General
-
Target
099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe
-
Size
28KB
-
MD5
13d84033f65345d8a87391ec0eb6b482
-
SHA1
b6354b17def07e0ead0f90a30b50c9090e720e5f
-
SHA256
099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18
-
SHA512
5093353181b2c6cb0ec0c421e7e5b87e3e222fd6fb5e250bed960ebad1a0041be4e7ba412067e1c6d4eba6e1248c59022eef87c281346c507aa0ae8990fe285f
Malware Config
Extracted
xpertrat
3.0.10
special X
sandshoe.myfirewall.org:2054
sandshoe.myfirewall.org:4000
C7H2A8R6-A3X1-J1N8-N887-L0I1C4O6U0D4
Signatures
-
XpertRAT Core Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/556-13-0x0000000000400000-0x0000000000443000-memory.dmp xpertrat behavioral1/memory/556-14-0x0000000000401364-mapping.dmp xpertrat behavioral1/memory/556-15-0x0000000000400000-0x0000000000443000-memory.dmp xpertrat -
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\C7H2A8R6-A3X1-J1N8-N887-L0I1C4O6U0D4 = "C:\\Users\\Admin\\AppData\\Roaming\\C7H2A8R6-A3X1-J1N8-N887-L0I1C4O6U0D4\\C7H2A8R6-A3X1-J1N8-N887-L0I1C4O6U0D4.exe" iexplore.exe -
Processes:
099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
iexplore.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\C7H2A8R6-A3X1-J1N8-N887-L0I1C4O6U0D4 = "C:\\Users\\Admin\\AppData\\Roaming\\C7H2A8R6-A3X1-J1N8-N887-L0I1C4O6U0D4\\C7H2A8R6-A3X1-J1N8-N887-L0I1C4O6U0D4.exe" iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\C7H2A8R6-A3X1-J1N8-N887-L0I1C4O6U0D4 = "C:\\Users\\Admin\\AppData\\Roaming\\C7H2A8R6-A3X1-J1N8-N887-L0I1C4O6U0D4\\C7H2A8R6-A3X1-J1N8-N887-L0I1C4O6U0D4.exe" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run iexplore.exe -
Processes:
099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
Processes:
099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exepid process 848 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe 848 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe 848 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe 848 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe 848 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe 848 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe 848 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe 848 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe 848 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe 848 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe 848 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe 848 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exedescription pid process target process PID 848 set thread context of 1536 848 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe PID 1536 set thread context of 396 1536 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe iexplore.exe PID 1536 set thread context of 556 1536 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe iexplore.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1996 timeout.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exepid process 848 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe 848 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe 848 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe 1536 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe 1536 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe 1536 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe 1536 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe 1536 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe 1536 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exeiexplore.exedescription pid process Token: SeDebugPrivilege 848 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe Token: SeDebugPrivilege 556 iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exeiexplore.exepid process 1536 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe 556 iexplore.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exedescription pid process target process PID 848 wrote to memory of 1996 848 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe timeout.exe PID 848 wrote to memory of 1996 848 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe timeout.exe PID 848 wrote to memory of 1996 848 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe timeout.exe PID 848 wrote to memory of 1996 848 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe timeout.exe PID 848 wrote to memory of 1536 848 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe PID 848 wrote to memory of 1536 848 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe PID 848 wrote to memory of 1536 848 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe PID 848 wrote to memory of 1536 848 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe PID 848 wrote to memory of 1536 848 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe PID 848 wrote to memory of 1536 848 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe PID 848 wrote to memory of 1536 848 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe PID 848 wrote to memory of 1536 848 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe PID 1536 wrote to memory of 396 1536 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe iexplore.exe PID 1536 wrote to memory of 396 1536 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe iexplore.exe PID 1536 wrote to memory of 396 1536 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe iexplore.exe PID 1536 wrote to memory of 396 1536 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe iexplore.exe PID 1536 wrote to memory of 396 1536 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe iexplore.exe PID 1536 wrote to memory of 396 1536 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe iexplore.exe PID 1536 wrote to memory of 396 1536 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe iexplore.exe PID 1536 wrote to memory of 396 1536 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe iexplore.exe PID 1536 wrote to memory of 396 1536 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe iexplore.exe PID 1536 wrote to memory of 556 1536 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe iexplore.exe PID 1536 wrote to memory of 556 1536 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe iexplore.exe PID 1536 wrote to memory of 556 1536 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe iexplore.exe PID 1536 wrote to memory of 556 1536 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe iexplore.exe PID 1536 wrote to memory of 556 1536 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe iexplore.exe PID 1536 wrote to memory of 556 1536 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe iexplore.exe PID 1536 wrote to memory of 556 1536 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe iexplore.exe PID 1536 wrote to memory of 556 1536 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe iexplore.exe PID 1536 wrote to memory of 556 1536 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe iexplore.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe"C:\Users\Admin\AppData\Local\Temp\099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 52⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe"C:\Users\Admin\AppData\Local\Temp\099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe"2⤵
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe3⤵
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\099803578388c6f4a6a4904fdb0b8b8e77e7ee9c14eccbda79272baf92093e18.exe3⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/396-12-0x0000000000401364-mapping.dmp
-
memory/556-13-0x0000000000400000-0x0000000000443000-memory.dmpFilesize
268KB
-
memory/556-14-0x0000000000401364-mapping.dmp
-
memory/556-15-0x0000000000400000-0x0000000000443000-memory.dmpFilesize
268KB
-
memory/848-0-0x00000000748D0000-0x0000000074FBE000-memory.dmpFilesize
6.9MB
-
memory/848-1-0x000000000F9A0000-0x000000000F9A1000-memory.dmpFilesize
4KB
-
memory/848-4-0x0000000001DF0000-0x0000000001E29000-memory.dmpFilesize
228KB
-
memory/1536-5-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/1536-6-0x00000000004010B8-mapping.dmp
-
memory/1536-18-0x0000000000150000-0x0000000000154000-memory.dmpFilesize
16KB
-
memory/1536-19-0x0000000002840000-0x0000000002844000-memory.dmpFilesize
16KB
-
memory/1996-3-0x0000000000000000-mapping.dmp