Analysis
-
max time kernel
151s -
max time network
169s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
11-08-2022 15:42
Static task
static1
Behavioral task
behavioral1
Sample
45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe
Resource
win10v2004-20220721-en
General
-
Target
45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe
-
Size
136KB
-
MD5
0c8d4181cfb8a34505b231c7d0fdc401
-
SHA1
ab6d29707a9121b2267d213cec0edbf0d9f896f1
-
SHA256
45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14
-
SHA512
d7f8e2a6d01f48f8591cbc297f1906416b810aa730e66c7618c9ab6d8e7ed1a68935bf38984b392c211a9d1186e1e8ba9f68ed7370f88b11b5568285adbb1a86
Malware Config
Extracted
xtremerat
no-hack.zapto.org
np.camfrog-ir.zapto.org
camfrog-2r9.zapto.org
Signatures
-
Detect XtremeRAT payload 12 IoCs
Processes:
resource yara_rule behavioral1/memory/604-56-0x0000000010000000-0x0000000010047000-memory.dmp family_xtremerat behavioral1/memory/604-57-0x000000001000C664-mapping.dmp family_xtremerat behavioral1/memory/604-58-0x0000000010000000-0x0000000010047000-memory.dmp family_xtremerat behavioral1/memory/604-61-0x0000000010000000-0x0000000010047000-memory.dmp family_xtremerat behavioral1/memory/604-62-0x0000000010000000-0x0000000010047000-memory.dmp family_xtremerat behavioral1/memory/1996-66-0x0000000000000000-mapping.dmp family_xtremerat behavioral1/memory/940-70-0x0000000000000000-mapping.dmp family_xtremerat behavioral1/memory/604-71-0x0000000010000000-0x0000000010047000-memory.dmp family_xtremerat behavioral1/memory/940-73-0x0000000010000000-0x0000000010047000-memory.dmp family_xtremerat behavioral1/memory/1996-74-0x0000000010000000-0x0000000010047000-memory.dmp family_xtremerat behavioral1/memory/940-76-0x0000000010000000-0x0000000010047000-memory.dmp family_xtremerat behavioral1/memory/1996-77-0x0000000010000000-0x0000000010047000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Modifies Installed Components in the registry 2 TTPs 4 IoCs
Processes:
svchost.exenotepad.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\Server.exe" svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} notepad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\Server.exe restart" notepad.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} svchost.exe -
Deletes itself 1 IoCs
Processes:
notepad.exepid Process 940 notepad.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
notepad.exesvchost.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" notepad.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" svchost.exe Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Windows\CurrentVersion\Run svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run notepad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" notepad.exe Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Windows\CurrentVersion\Run notepad.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exedescription pid Process procid_target PID 1144 set thread context of 604 1144 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 28 -
Drops file in Windows directory 3 IoCs
Processes:
notepad.exedescription ioc Process File opened for modification C:\Windows\InstallDir\Server.exe notepad.exe File created C:\Windows\InstallDir\Server.exe notepad.exe File opened for modification C:\Windows\InstallDir\ notepad.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exenotepad.exepid Process 1144 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 940 notepad.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exedescription pid Process procid_target PID 1144 wrote to memory of 604 1144 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 28 PID 1144 wrote to memory of 604 1144 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 28 PID 1144 wrote to memory of 604 1144 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 28 PID 1144 wrote to memory of 604 1144 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 28 PID 1144 wrote to memory of 604 1144 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 28 PID 1144 wrote to memory of 604 1144 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 28 PID 1144 wrote to memory of 604 1144 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 28 PID 1144 wrote to memory of 604 1144 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 28 PID 1144 wrote to memory of 604 1144 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 28 PID 1144 wrote to memory of 604 1144 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 28 PID 1144 wrote to memory of 604 1144 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 28 PID 1144 wrote to memory of 604 1144 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 28 PID 1144 wrote to memory of 604 1144 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 28 PID 1144 wrote to memory of 604 1144 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 28 PID 604 wrote to memory of 1996 604 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 29 PID 604 wrote to memory of 1996 604 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 29 PID 604 wrote to memory of 1996 604 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 29 PID 604 wrote to memory of 1996 604 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 29 PID 604 wrote to memory of 1996 604 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 29 PID 604 wrote to memory of 940 604 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 30 PID 604 wrote to memory of 940 604 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 30 PID 604 wrote to memory of 940 604 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 30 PID 604 wrote to memory of 940 604 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 30 PID 604 wrote to memory of 940 604 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe"C:\Users\Admin\AppData\Local\Temp\45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe"C:\Users\Admin\AppData\Local\Temp\45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- Modifies Installed Components in the registry
- Adds Run key to start application
PID:1996
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- Modifies Installed Components in the registry
- Deletes itself
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:940
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD50c8d4181cfb8a34505b231c7d0fdc401
SHA1ab6d29707a9121b2267d213cec0edbf0d9f896f1
SHA25645b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14
SHA512d7f8e2a6d01f48f8591cbc297f1906416b810aa730e66c7618c9ab6d8e7ed1a68935bf38984b392c211a9d1186e1e8ba9f68ed7370f88b11b5568285adbb1a86