Analysis

  • max time kernel
    119s
  • max time network
    147s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    29-11-2021 10:54

General

  • Target

    d5438415ed71322922b70ac85ad02f64.exe

  • Size

    172KB

  • MD5

    d5438415ed71322922b70ac85ad02f64

  • SHA1

    832cfa96f5ff034db65707f6781752441beaf0aa

  • SHA256

    3d7e2744ac50ae3ff7fcdbf97b4f70af8236ade6c3d2e82004f0641be304f83b

  • SHA512

    7f12be61ddb39cd357f817cf1c47110128ae2d962e9c1fcb947f8f7ed6084db5a3607f3edda06680e3d078c50a754859511cb69c0adac01360b51cee54925b6c

Malware Config

Signatures

  • UAC bypass 3 TTPs
  • Windows security bypass 2 TTPs
  • XpertRAT

    XpertRAT is a remote access trojan with various capabilities.

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d5438415ed71322922b70ac85ad02f64.exe
    "C:\Users\Admin\AppData\Local\Temp\d5438415ed71322922b70ac85ad02f64.exe"
    1⤵
    • Windows security modification
    • Checks whether UAC is enabled
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3152
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      C:\Users\Admin\AppData\Local\Temp\d5438415ed71322922b70ac85ad02f64.exe
      2⤵
      • Adds policy Run key to start application
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2592

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

3
T1089

Modify Registry

6
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2592-117-0x0000000000401364-mapping.dmp
  • memory/3152-115-0x00000000005A0000-0x00000000005A6000-memory.dmp
    Filesize

    24KB

  • memory/3152-116-0x00000000005A0000-0x00000000005AA000-memory.dmp
    Filesize

    40KB