Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
11-08-2022 15:42
Static task
static1
Behavioral task
behavioral1
Sample
4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe
Resource
win10v2004-20220721-en
General
-
Target
4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe
-
Size
886KB
-
MD5
40eaca541433514a31508b7a328db6ef
-
SHA1
bca267e3a5007147c9c0cb44612bf6027b47ba76
-
SHA256
4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2
-
SHA512
3fa774f21f13b349e3474ba6da9d0835151d31847f2051f731d24a71e8e6b66be0d35d495b4db9bed7f1697c55533c141b2b70f8d94d53d3e7b50e6cc9ffbf24
Malware Config
Extracted
xtremerat
feelmepkudie.no-ip.org
Signatures
-
Detect XtremeRAT payload 11 IoCs
resource yara_rule behavioral2/memory/60-132-0x0000000000000000-mapping.dmp family_xtremerat behavioral2/memory/60-133-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral2/memory/60-134-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral2/memory/60-135-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral2/memory/1640-136-0x0000000000000000-mapping.dmp family_xtremerat behavioral2/memory/60-138-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral2/memory/1640-139-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral2/memory/4852-140-0x0000000000000000-mapping.dmp family_xtremerat behavioral2/memory/60-141-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral2/memory/4852-142-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral2/memory/4852-143-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2JE2C8F4-2VT5-K1NJ-HRTM-4K0C061TM2ID}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\WinUpdate\\Update.exe restart" svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{2JE2C8F4-2VT5-K1NJ-HRTM-4K0C061TM2ID} 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2JE2C8F4-2VT5-K1NJ-HRTM-4K0C061TM2ID}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\WinUpdate\\Update.exe restart" 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{2JE2C8F4-2VT5-K1NJ-HRTM-4K0C061TM2ID} svchost.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Facebook = "C:\\Users\\Admin\\AppData\\Local\\Temp\\WinUpdate\\Update.exe" 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE Key created \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\Software\Microsoft\Windows\CurrentVersion\Run 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE Set value (str) \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Facebook = "C:\\Users\\Admin\\AppData\\Local\\Temp\\WinUpdate\\Update.exe" 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Facebook = "C:\\Users\\Admin\\AppData\\Local\\Temp\\WinUpdate\\Update.exe" svchost.exe Key created \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\Software\Microsoft\Windows\CurrentVersion\Run svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Facebook = "C:\\Users\\Admin\\AppData\\Local\\Temp\\WinUpdate\\Update.exe" svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe File opened (read-only) \??\P: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe File opened (read-only) \??\Q: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe File opened (read-only) \??\V: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe File opened (read-only) \??\A: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe File opened (read-only) \??\H: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe File opened (read-only) \??\I: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe File opened (read-only) \??\K: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe File opened (read-only) \??\L: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe File opened (read-only) \??\R: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe File opened (read-only) \??\S: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe File opened (read-only) \??\U: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe File opened (read-only) \??\E: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe File opened (read-only) \??\F: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe File opened (read-only) \??\G: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe File opened (read-only) \??\M: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe File opened (read-only) \??\O: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe File opened (read-only) \??\W: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe File opened (read-only) \??\Y: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe File opened (read-only) \??\Z: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe File opened (read-only) \??\B: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe File opened (read-only) \??\J: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe File opened (read-only) \??\T: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe File opened (read-only) \??\X: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4064 set thread context of 60 4064 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe 83 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 4064 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe Token: SeCreatePagefilePrivilege 4064 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4064 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 4064 wrote to memory of 60 4064 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe 83 PID 4064 wrote to memory of 60 4064 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe 83 PID 4064 wrote to memory of 60 4064 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe 83 PID 4064 wrote to memory of 60 4064 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe 83 PID 4064 wrote to memory of 60 4064 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe 83 PID 4064 wrote to memory of 60 4064 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe 83 PID 4064 wrote to memory of 60 4064 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe 83 PID 4064 wrote to memory of 60 4064 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe 83 PID 4064 wrote to memory of 60 4064 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe 83 PID 4064 wrote to memory of 60 4064 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe 83 PID 4064 wrote to memory of 60 4064 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe 83 PID 4064 wrote to memory of 60 4064 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe 83 PID 4064 wrote to memory of 60 4064 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe 83 PID 60 wrote to memory of 1640 60 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 84 PID 60 wrote to memory of 1640 60 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 84 PID 60 wrote to memory of 1640 60 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 84 PID 60 wrote to memory of 1640 60 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 84 PID 60 wrote to memory of 4044 60 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 85 PID 60 wrote to memory of 4044 60 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 85 PID 60 wrote to memory of 4076 60 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 86 PID 60 wrote to memory of 4076 60 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 86 PID 60 wrote to memory of 4076 60 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 86 PID 60 wrote to memory of 3104 60 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 87 PID 60 wrote to memory of 3104 60 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 87 PID 60 wrote to memory of 1388 60 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 88 PID 60 wrote to memory of 1388 60 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 88 PID 60 wrote to memory of 1388 60 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 88 PID 60 wrote to memory of 4932 60 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 91 PID 60 wrote to memory of 4932 60 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 91 PID 60 wrote to memory of 4852 60 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 92 PID 60 wrote to memory of 4852 60 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 92 PID 60 wrote to memory of 4852 60 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 92 PID 60 wrote to memory of 4852 60 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe"C:\Users\Admin\AppData\Local\Temp\4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe"1⤵
- Enumerates connected drives
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE"C:\Users\Admin\AppData\Local\Temp\4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE"2⤵
- Modifies Installed Components in the registry
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- Modifies Installed Components in the registry
- Adds Run key to start application
PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4044
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:3104
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:1388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4932
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:4852
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
886KB
MD540eaca541433514a31508b7a328db6ef
SHA1bca267e3a5007147c9c0cb44612bf6027b47ba76
SHA2564adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2
SHA5123fa774f21f13b349e3474ba6da9d0835151d31847f2051f731d24a71e8e6b66be0d35d495b4db9bed7f1697c55533c141b2b70f8d94d53d3e7b50e6cc9ffbf24