Analysis

  • max time kernel
    4294210s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220223-en
  • submitted
    02-03-2022 03:32

General

  • Target

    e7ab0c483542652a8ba5df01c70148b7.exe

  • Size

    655KB

  • MD5

    e7ab0c483542652a8ba5df01c70148b7

  • SHA1

    fdfb0d76b28f2bf0e4b946c51fa2dd0f654ec259

  • SHA256

    39feefb57167dd5ed9c900fa4b18aa815b955396ea3a298a5588bd9946d6a10d

  • SHA512

    d24528a0572465c51d99247076f591737f60116e8bab9a877f7e5219d76b782383921c84cea395566e44e1160efd78974441648b6e60902b98a6d7246a01f6b9

Malware Config

Signatures

  • UAC bypass 3 TTPs
  • Windows security bypass 2 TTPs
  • XpertRAT

    XpertRAT is a remote access trojan with various capabilities.

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e7ab0c483542652a8ba5df01c70148b7.exe
    "C:\Users\Admin\AppData\Local\Temp\e7ab0c483542652a8ba5df01c70148b7.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:1164
    • C:\Users\Admin\AppData\Local\Temp\e7ab0c483542652a8ba5df01c70148b7.exe
      "C:\Users\Admin\AppData\Local\Temp\e7ab0c483542652a8ba5df01c70148b7.exe"
      2⤵
      • Windows security modification
      • Checks whether UAC is enabled
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:964
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        C:\Users\Admin\AppData\Local\Temp\e7ab0c483542652a8ba5df01c70148b7.exe
        3⤵
          PID:764
        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
          C:\Users\Admin\AppData\Local\Temp\e7ab0c483542652a8ba5df01c70148b7.exe
          3⤵
            PID:564
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            C:\Users\Admin\AppData\Local\Temp\e7ab0c483542652a8ba5df01c70148b7.exe
            3⤵
            • Adds policy Run key to start application
            • Adds Run key to start application
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:824
        • C:\Users\Admin\AppData\Local\Temp\e7ab0c483542652a8ba5df01c70148b7.exe
          "C:\Users\Admin\AppData\Local\Temp\e7ab0c483542652a8ba5df01c70148b7.exe" 2 964 259435871
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:320
          • C:\Users\Admin\AppData\Local\Temp\e7ab0c483542652a8ba5df01c70148b7.exe
            "C:\Users\Admin\AppData\Local\Temp\e7ab0c483542652a8ba5df01c70148b7.exe"
            3⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:1808
            • C:\Users\Admin\AppData\Local\Temp\e7ab0c483542652a8ba5df01c70148b7.exe
              "C:\Users\Admin\AppData\Local\Temp\e7ab0c483542652a8ba5df01c70148b7.exe"
              4⤵
              • Windows security modification
              • Checks whether UAC is enabled
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:1284
            • C:\Users\Admin\AppData\Local\Temp\e7ab0c483542652a8ba5df01c70148b7.exe
              "C:\Users\Admin\AppData\Local\Temp\e7ab0c483542652a8ba5df01c70148b7.exe" 2 1284 259510783
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:1076
              • C:\Users\Admin\AppData\Local\Temp\e7ab0c483542652a8ba5df01c70148b7.exe
                "C:\Users\Admin\AppData\Local\Temp\e7ab0c483542652a8ba5df01c70148b7.exe"
                5⤵
                  PID:1696

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/320-59-0x0000000000220000-0x0000000000221000-memory.dmp
          Filesize

          4KB

        • memory/964-58-0x0000000000400000-0x000000000042C000-memory.dmp
          Filesize

          176KB

        • memory/1076-66-0x0000000000220000-0x0000000000221000-memory.dmp
          Filesize

          4KB

        • memory/1164-54-0x00000000003B0000-0x00000000003B1000-memory.dmp
          Filesize

          4KB

        • memory/1164-55-0x0000000075BD1000-0x0000000075BD3000-memory.dmp
          Filesize

          8KB

        • memory/1284-65-0x0000000000400000-0x000000000042C000-memory.dmp
          Filesize

          176KB

        • memory/1808-61-0x0000000000220000-0x0000000000221000-memory.dmp
          Filesize

          4KB