Analysis

  • max time kernel
    167s
  • max time network
    173s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    15-04-2022 15:52

General

  • Target

    986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe

  • Size

    1014KB

  • MD5

    66b911f4bd33b3c563164c85b59f2e18

  • SHA1

    0ce658b5bdf3ccfa3140df8b9d2beb1562331ed1

  • SHA256

    986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8

  • SHA512

    050f19ec427b97850692e5ddd7f4076724e9e74c8b157e41257d00e867b1cebbf6faf5db7a2b7998a9c0bf89d13e891912d92c961c20024368debbbe07a0e0bc

Malware Config

Signatures

  • UAC bypass 3 TTPs
  • Windows security bypass 2 TTPs
  • XpertRAT

    XpertRAT is a remote access trojan with various capabilities.

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe
    "C:\Users\Admin\AppData\Local\Temp\986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:764
    • C:\Users\Admin\AppData\Local\Temp\986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe
      "C:\Users\Admin\AppData\Local\Temp\986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe"
      2⤵
      • Windows security modification
      • Checks whether UAC is enabled
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1008
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        C:\Users\Admin\AppData\Local\Temp\986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe
        3⤵
        • Adds policy Run key to start application
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1472
        • C:\Windows\SysWOW64\notepad.exe
          notepad.exe
          4⤵
          • Deletes itself
          PID:1564

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/764-54-0x00000000009A0000-0x0000000000AA2000-memory.dmp

    Filesize

    1.0MB

  • memory/764-55-0x0000000000275000-0x0000000000286000-memory.dmp

    Filesize

    68KB

  • memory/764-56-0x00000000048B0000-0x0000000004910000-memory.dmp

    Filesize

    384KB

  • memory/764-57-0x0000000000450000-0x000000000046C000-memory.dmp

    Filesize

    112KB

  • memory/1008-58-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/1008-59-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/1008-61-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/1008-64-0x00000000004010B8-mapping.dmp

  • memory/1008-63-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/1008-69-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/1564-71-0x0000000075DF1000-0x0000000075DF3000-memory.dmp

    Filesize

    8KB

  • memory/1564-70-0x0000000000000000-mapping.dmp