Analysis
-
max time kernel
140s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
11-08-2022 15:42
Static task
static1
Behavioral task
behavioral1
Sample
45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe
Resource
win10v2004-20220721-en
General
-
Target
45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe
-
Size
136KB
-
MD5
0c8d4181cfb8a34505b231c7d0fdc401
-
SHA1
ab6d29707a9121b2267d213cec0edbf0d9f896f1
-
SHA256
45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14
-
SHA512
d7f8e2a6d01f48f8591cbc297f1906416b810aa730e66c7618c9ab6d8e7ed1a68935bf38984b392c211a9d1186e1e8ba9f68ed7370f88b11b5568285adbb1a86
Malware Config
Extracted
xtremerat
no-hack.zapto.org
np.camfrog-ir.zapto.org
camfrog-2r9.zapto.org
Signatures
-
Detect XtremeRAT payload 10 IoCs
Processes:
resource yara_rule behavioral2/memory/632-133-0x0000000000000000-mapping.dmp family_xtremerat behavioral2/memory/632-135-0x0000000010000000-0x0000000010047000-memory.dmp family_xtremerat behavioral2/memory/632-134-0x0000000010000000-0x0000000010047000-memory.dmp family_xtremerat behavioral2/memory/632-137-0x0000000010000000-0x0000000010047000-memory.dmp family_xtremerat behavioral2/memory/4608-138-0x0000000000000000-mapping.dmp family_xtremerat behavioral2/memory/632-139-0x0000000010000000-0x0000000010047000-memory.dmp family_xtremerat behavioral2/memory/4608-141-0x0000000010000000-0x0000000010047000-memory.dmp family_xtremerat behavioral2/memory/1428-142-0x0000000000000000-mapping.dmp family_xtremerat behavioral2/memory/632-143-0x0000000010000000-0x0000000010047000-memory.dmp family_xtremerat behavioral2/memory/4608-144-0x0000000010000000-0x0000000010047000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exedescription pid Process procid_target PID 3236 set thread context of 632 3236 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 82 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target Process procid_target 2264 1428 WerFault.exe 84 4912 4608 WerFault.exe 83 4932 1428 WerFault.exe 84 4640 4608 WerFault.exe 83 -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exepid Process 3236 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exedescription pid Process procid_target PID 3236 wrote to memory of 632 3236 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 82 PID 3236 wrote to memory of 632 3236 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 82 PID 3236 wrote to memory of 632 3236 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 82 PID 3236 wrote to memory of 632 3236 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 82 PID 3236 wrote to memory of 632 3236 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 82 PID 3236 wrote to memory of 632 3236 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 82 PID 3236 wrote to memory of 632 3236 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 82 PID 3236 wrote to memory of 632 3236 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 82 PID 3236 wrote to memory of 632 3236 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 82 PID 3236 wrote to memory of 632 3236 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 82 PID 3236 wrote to memory of 632 3236 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 82 PID 3236 wrote to memory of 632 3236 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 82 PID 3236 wrote to memory of 632 3236 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 82 PID 632 wrote to memory of 4608 632 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 83 PID 632 wrote to memory of 4608 632 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 83 PID 632 wrote to memory of 4608 632 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 83 PID 632 wrote to memory of 4608 632 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 83 PID 632 wrote to memory of 1428 632 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 84 PID 632 wrote to memory of 1428 632 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 84 PID 632 wrote to memory of 1428 632 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 84 PID 632 wrote to memory of 1428 632 45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe"C:\Users\Admin\AppData\Local\Temp\45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Users\Admin\AppData\Local\Temp\45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe"C:\Users\Admin\AppData\Local\Temp\45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:4608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 4804⤵
- Program crash
PID:4912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 4884⤵
- Program crash
PID:4640
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵PID:1428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1428 -s 4804⤵
- Program crash
PID:2264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1428 -s 2004⤵
- Program crash
PID:4932
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1428 -ip 14281⤵PID:3304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4608 -ip 46081⤵PID:3880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1428 -ip 14281⤵PID:2580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4608 -ip 46081⤵PID:4900