Resubmissions

11-08-2022 15:42

220811-s5qvmahafr 10

07-07-2022 11:06

220707-m7m9magch5 10

Analysis

  • max time kernel
    140s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220721-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-08-2022 15:42

General

  • Target

    45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe

  • Size

    136KB

  • MD5

    0c8d4181cfb8a34505b231c7d0fdc401

  • SHA1

    ab6d29707a9121b2267d213cec0edbf0d9f896f1

  • SHA256

    45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14

  • SHA512

    d7f8e2a6d01f48f8591cbc297f1906416b810aa730e66c7618c9ab6d8e7ed1a68935bf38984b392c211a9d1186e1e8ba9f68ed7370f88b11b5568285adbb1a86

Malware Config

Extracted

Family

xtremerat

C2

no-hack.zapto.org

np.camfrog-ir.zapto.org

camfrog-2r9.zapto.org

Signatures

  • Detect XtremeRAT payload 10 IoCs
  • XtremeRAT

    The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe
    "C:\Users\Admin\AppData\Local\Temp\45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3236
    • C:\Users\Admin\AppData\Local\Temp\45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe
      "C:\Users\Admin\AppData\Local\Temp\45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:632
      • C:\Windows\SysWOW64\svchost.exe
        svchost.exe
        3⤵
          PID:4608
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 480
            4⤵
            • Program crash
            PID:4912
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 488
            4⤵
            • Program crash
            PID:4640
        • C:\Windows\SysWOW64\notepad.exe
          notepad.exe
          3⤵
            PID:1428
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1428 -s 480
              4⤵
              • Program crash
              PID:2264
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1428 -s 200
              4⤵
              • Program crash
              PID:4932
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1428 -ip 1428
        1⤵
          PID:3304
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4608 -ip 4608
          1⤵
            PID:3880
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1428 -ip 1428
            1⤵
              PID:2580
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4608 -ip 4608
              1⤵
                PID:4900

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Discovery

              System Information Discovery

              1
              T1082

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • memory/632-133-0x0000000000000000-mapping.dmp
              • memory/632-135-0x0000000010000000-0x0000000010047000-memory.dmp
                Filesize

                284KB

              • memory/632-134-0x0000000010000000-0x0000000010047000-memory.dmp
                Filesize

                284KB

              • memory/632-137-0x0000000010000000-0x0000000010047000-memory.dmp
                Filesize

                284KB

              • memory/632-139-0x0000000010000000-0x0000000010047000-memory.dmp
                Filesize

                284KB

              • memory/632-140-0x0000000000400000-0x000000000046B000-memory.dmp
                Filesize

                428KB

              • memory/632-143-0x0000000010000000-0x0000000010047000-memory.dmp
                Filesize

                284KB

              • memory/1428-142-0x0000000000000000-mapping.dmp
              • memory/3236-136-0x0000000000400000-0x000000000046B000-memory.dmp
                Filesize

                428KB

              • memory/3236-130-0x0000000000400000-0x000000000046B000-memory.dmp
                Filesize

                428KB

              • memory/4608-138-0x0000000000000000-mapping.dmp
              • memory/4608-141-0x0000000010000000-0x0000000010047000-memory.dmp
                Filesize

                284KB

              • memory/4608-144-0x0000000010000000-0x0000000010047000-memory.dmp
                Filesize

                284KB