Analysis
-
max time kernel
150s -
max time network
164s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 14:02
Static task
static1
Behavioral task
behavioral1
Sample
000b4632c1849889a989210d6794eaa9338379a416456755c2e00f1a1e939447.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
000b4632c1849889a989210d6794eaa9338379a416456755c2e00f1a1e939447.exe
Resource
win10v2004-20220812-en
General
-
Target
000b4632c1849889a989210d6794eaa9338379a416456755c2e00f1a1e939447.exe
-
Size
109KB
-
MD5
85cc2fe2f271f615bb4fe4b9107461c4
-
SHA1
f30cfec3c082a42a1623b4b024f31605e960c9ef
-
SHA256
000b4632c1849889a989210d6794eaa9338379a416456755c2e00f1a1e939447
-
SHA512
645cb2cbdff113f4eb49cbec63866770374f7fa85b6d22517f8760d33a748623adb640caead2279bbbd33f871b07a85f5740930640f3a1bc62d54821d903440c
-
SSDEEP
3072:YmBS5BuIPHxD8Un3lrn70YdyD2hSjZdxm:BYZpDrn15hkZdxm
Malware Config
Extracted
xtremerat
vvnv12.no-ip.biz
Signatures
-
Detect XtremeRAT payload 14 IoCs
resource yara_rule behavioral1/memory/1620-62-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/1620-63-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/1620-64-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/1620-61-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/1620-60-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/1620-66-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/1620-67-0x000000001000D0F4-mapping.dmp family_xtremerat behavioral1/memory/1620-68-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/1620-71-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/1264-74-0x0000000000000000-mapping.dmp family_xtremerat behavioral1/memory/1264-77-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/1620-76-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/1620-80-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/1264-81-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\Windows Genuine Update\\Advantage.exe" svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} 000b4632c1849889a989210d6794eaa9338379a416456755c2e00f1a1e939447.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\Windows Genuine Update\\Advantage.exe restart" 000b4632c1849889a989210d6794eaa9338379a416456755c2e00f1a1e939447.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run 000b4632c1849889a989210d6794eaa9338379a416456755c2e00f1a1e939447.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Genuine Update = "C:\\Windows\\Windows Genuine Update\\Advantage.exe" 000b4632c1849889a989210d6794eaa9338379a416456755c2e00f1a1e939447.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Genuine Update = "C:\\Windows\\Windows Genuine Update\\Advantage.exe" svchost.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Genuine Update = "C:\\Windows\\Windows Genuine Update\\Advantage.exe" svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 000b4632c1849889a989210d6794eaa9338379a416456755c2e00f1a1e939447.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Genuine Update = "C:\\Windows\\Windows Genuine Update\\Advantage.exe" 000b4632c1849889a989210d6794eaa9338379a416456755c2e00f1a1e939447.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1032 set thread context of 1620 1032 000b4632c1849889a989210d6794eaa9338379a416456755c2e00f1a1e939447.exe 28 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Windows Genuine Update\Advantage.exe 000b4632c1849889a989210d6794eaa9338379a416456755c2e00f1a1e939447.exe File opened for modification C:\Windows\Windows Genuine Update\ 000b4632c1849889a989210d6794eaa9338379a416456755c2e00f1a1e939447.exe File opened for modification C:\Windows\Windows Genuine Update\Advantage.exe 000b4632c1849889a989210d6794eaa9338379a416456755c2e00f1a1e939447.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1032 000b4632c1849889a989210d6794eaa9338379a416456755c2e00f1a1e939447.exe 1620 000b4632c1849889a989210d6794eaa9338379a416456755c2e00f1a1e939447.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1032 wrote to memory of 1620 1032 000b4632c1849889a989210d6794eaa9338379a416456755c2e00f1a1e939447.exe 28 PID 1032 wrote to memory of 1620 1032 000b4632c1849889a989210d6794eaa9338379a416456755c2e00f1a1e939447.exe 28 PID 1032 wrote to memory of 1620 1032 000b4632c1849889a989210d6794eaa9338379a416456755c2e00f1a1e939447.exe 28 PID 1032 wrote to memory of 1620 1032 000b4632c1849889a989210d6794eaa9338379a416456755c2e00f1a1e939447.exe 28 PID 1032 wrote to memory of 1620 1032 000b4632c1849889a989210d6794eaa9338379a416456755c2e00f1a1e939447.exe 28 PID 1032 wrote to memory of 1620 1032 000b4632c1849889a989210d6794eaa9338379a416456755c2e00f1a1e939447.exe 28 PID 1032 wrote to memory of 1620 1032 000b4632c1849889a989210d6794eaa9338379a416456755c2e00f1a1e939447.exe 28 PID 1032 wrote to memory of 1620 1032 000b4632c1849889a989210d6794eaa9338379a416456755c2e00f1a1e939447.exe 28 PID 1032 wrote to memory of 1620 1032 000b4632c1849889a989210d6794eaa9338379a416456755c2e00f1a1e939447.exe 28 PID 1032 wrote to memory of 1620 1032 000b4632c1849889a989210d6794eaa9338379a416456755c2e00f1a1e939447.exe 28 PID 1032 wrote to memory of 1620 1032 000b4632c1849889a989210d6794eaa9338379a416456755c2e00f1a1e939447.exe 28 PID 1032 wrote to memory of 1620 1032 000b4632c1849889a989210d6794eaa9338379a416456755c2e00f1a1e939447.exe 28 PID 1620 wrote to memory of 1264 1620 000b4632c1849889a989210d6794eaa9338379a416456755c2e00f1a1e939447.exe 29 PID 1620 wrote to memory of 1264 1620 000b4632c1849889a989210d6794eaa9338379a416456755c2e00f1a1e939447.exe 29 PID 1620 wrote to memory of 1264 1620 000b4632c1849889a989210d6794eaa9338379a416456755c2e00f1a1e939447.exe 29 PID 1620 wrote to memory of 1264 1620 000b4632c1849889a989210d6794eaa9338379a416456755c2e00f1a1e939447.exe 29 PID 1620 wrote to memory of 1264 1620 000b4632c1849889a989210d6794eaa9338379a416456755c2e00f1a1e939447.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\000b4632c1849889a989210d6794eaa9338379a416456755c2e00f1a1e939447.exe"C:\Users\Admin\AppData\Local\Temp\000b4632c1849889a989210d6794eaa9338379a416456755c2e00f1a1e939447.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\000b4632c1849889a989210d6794eaa9338379a416456755c2e00f1a1e939447.exe
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- Modifies Installed Components in the registry
- Adds Run key to start application
PID:1264
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
109KB
MD585cc2fe2f271f615bb4fe4b9107461c4
SHA1f30cfec3c082a42a1623b4b024f31605e960c9ef
SHA256000b4632c1849889a989210d6794eaa9338379a416456755c2e00f1a1e939447
SHA512645cb2cbdff113f4eb49cbec63866770374f7fa85b6d22517f8760d33a748623adb640caead2279bbbd33f871b07a85f5740930640f3a1bc62d54821d903440c