Analysis
-
max time kernel
148s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
07-07-2022 11:06
Static task
static1
Behavioral task
behavioral1
Sample
45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe
Resource
win10v2004-20220414-en
General
-
Target
45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe
-
Size
136KB
-
MD5
0c8d4181cfb8a34505b231c7d0fdc401
-
SHA1
ab6d29707a9121b2267d213cec0edbf0d9f896f1
-
SHA256
45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14
-
SHA512
d7f8e2a6d01f48f8591cbc297f1906416b810aa730e66c7618c9ab6d8e7ed1a68935bf38984b392c211a9d1186e1e8ba9f68ed7370f88b11b5568285adbb1a86
Malware Config
Signatures
-
Detect XtremeRAT payload 12 IoCs
Processes:
resource yara_rule behavioral1/memory/908-56-0x0000000010000000-0x0000000010047000-memory.dmp family_xtremerat behavioral1/memory/908-57-0x000000001000C664-mapping.dmp family_xtremerat behavioral1/memory/908-58-0x0000000010000000-0x0000000010047000-memory.dmp family_xtremerat behavioral1/memory/908-61-0x0000000010000000-0x0000000010047000-memory.dmp family_xtremerat behavioral1/memory/972-64-0x0000000000000000-mapping.dmp family_xtremerat behavioral1/memory/908-66-0x0000000010000000-0x0000000010047000-memory.dmp family_xtremerat behavioral1/memory/972-67-0x0000000010000000-0x0000000010047000-memory.dmp family_xtremerat behavioral1/memory/1980-71-0x0000000000000000-mapping.dmp family_xtremerat behavioral1/memory/908-72-0x0000000010000000-0x0000000010047000-memory.dmp family_xtremerat behavioral1/memory/1980-74-0x0000000010000000-0x0000000010047000-memory.dmp family_xtremerat behavioral1/memory/972-76-0x0000000010000000-0x0000000010047000-memory.dmp family_xtremerat behavioral1/memory/1980-77-0x0000000010000000-0x0000000010047000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Modifies Installed Components in the registry 2 TTPs 4 IoCs
Processes:
svchost.exenotepad.exedescription ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\Server.exe" svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} notepad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\Server.exe restart" notepad.exe -
Deletes itself 1 IoCs
Processes:
notepad.exepid Process 1980 notepad.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
notepad.exesvchost.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" notepad.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" svchost.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run notepad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" notepad.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run notepad.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exedescription pid Process procid_target PID 560 set thread context of 908 560 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 27 -
Drops file in Windows directory 3 IoCs
Processes:
notepad.exedescription ioc Process File created C:\Windows\InstallDir\Server.exe notepad.exe File opened for modification C:\Windows\InstallDir\ notepad.exe File opened for modification C:\Windows\InstallDir\Server.exe notepad.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exenotepad.exepid Process 560 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 1980 notepad.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exedescription pid Process procid_target PID 560 wrote to memory of 908 560 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 27 PID 560 wrote to memory of 908 560 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 27 PID 560 wrote to memory of 908 560 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 27 PID 560 wrote to memory of 908 560 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 27 PID 560 wrote to memory of 908 560 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 27 PID 560 wrote to memory of 908 560 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 27 PID 560 wrote to memory of 908 560 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 27 PID 560 wrote to memory of 908 560 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 27 PID 560 wrote to memory of 908 560 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 27 PID 560 wrote to memory of 908 560 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 27 PID 560 wrote to memory of 908 560 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 27 PID 560 wrote to memory of 908 560 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 27 PID 560 wrote to memory of 908 560 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 27 PID 560 wrote to memory of 908 560 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 27 PID 908 wrote to memory of 972 908 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 28 PID 908 wrote to memory of 972 908 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 28 PID 908 wrote to memory of 972 908 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 28 PID 908 wrote to memory of 972 908 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 28 PID 908 wrote to memory of 972 908 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 28 PID 908 wrote to memory of 1980 908 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 29 PID 908 wrote to memory of 1980 908 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 29 PID 908 wrote to memory of 1980 908 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 29 PID 908 wrote to memory of 1980 908 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 29 PID 908 wrote to memory of 1980 908 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe"C:\Users\Admin\AppData\Local\Temp\45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Users\Admin\AppData\Local\Temp\45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe"C:\Users\Admin\AppData\Local\Temp\45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- Modifies Installed Components in the registry
- Adds Run key to start application
PID:972
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- Modifies Installed Components in the registry
- Deletes itself
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1980
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD50c8d4181cfb8a34505b231c7d0fdc401
SHA1ab6d29707a9121b2267d213cec0edbf0d9f896f1
SHA25645b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14
SHA512d7f8e2a6d01f48f8591cbc297f1906416b810aa730e66c7618c9ab6d8e7ed1a68935bf38984b392c211a9d1186e1e8ba9f68ed7370f88b11b5568285adbb1a86