Analysis

  • max time kernel
    53s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/10/2022, 13:38

General

  • Target

    0337777df94ae1fcb5a4fe325f1c83da026eb5985dae8fec90230ccd3f56c092.exe

  • Size

    452KB

  • MD5

    93c97ad9849b96517b157c6634ac0c70

  • SHA1

    7a36c2739593ceb3b5f04fc91e3cf3497465364d

  • SHA256

    0337777df94ae1fcb5a4fe325f1c83da026eb5985dae8fec90230ccd3f56c092

  • SHA512

    cccb3f1eb1789c5f93420eb06042c4ecd03708701c65b379854400e5ab401c2117e593ee95a3bfb335d81691ae0e32a7d12b5fecb16f2ee1e78894ec81e8cfaa

  • SSDEEP

    6144:ebL0yiwta1lGuw8ylN3pPRELbgr5/iJd5hAy0nGE/xcEm/XfkbLmgRgrPd3iq:eP0yiwt7uvsTEIr5/0B/0nGEK/fr3i

Malware Config

Signatures

  • Detect XtremeRAT payload 1 IoCs
  • XtremeRAT

    The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0337777df94ae1fcb5a4fe325f1c83da026eb5985dae8fec90230ccd3f56c092.exe
    "C:\Users\Admin\AppData\Local\Temp\0337777df94ae1fcb5a4fe325f1c83da026eb5985dae8fec90230ccd3f56c092.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3968
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
      C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
      2⤵
        PID:620
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 620 -s 12
          3⤵
          • Program crash
          PID:4764
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 620 -ip 620
      1⤵
        PID:1320

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/620-134-0x0000000010000000-0x000000001004A000-memory.dmp

              Filesize

              296KB

            • memory/3968-132-0x00000000748E0000-0x0000000074E91000-memory.dmp

              Filesize

              5.7MB

            • memory/3968-135-0x00000000748E0000-0x0000000074E91000-memory.dmp

              Filesize

              5.7MB