Analysis

  • max time kernel
    147s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2022 04:54

General

  • Target

    79df6cbb29cb39554f1061d71437c0c5b6351a398abcece971653b90f7d13216.exe

  • Size

    1.4MB

  • MD5

    3046222c67a68d7cadabd19434355600

  • SHA1

    633f3b57954d2b2d7c37386af772dc199b3c6db7

  • SHA256

    79df6cbb29cb39554f1061d71437c0c5b6351a398abcece971653b90f7d13216

  • SHA512

    703dc8b72ec2bbafe4f8fa466b48b839af95a445df25c07b615d5471ba5bb6aad5ba76b66371bbb2d4d2426bbb09de88c9de017fee33b3be0007aa045b318b8e

  • SSDEEP

    24576:mUQZGjqqIaSb5rUoMGa7WATGC11Jk220gPgFKU0p82QcNZdsCAEKA3NHNEgsNPDS:mUJGqI5lbmD11JkfKop8Rc+CnaNYp

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 1 IoCs
  • XpertRAT

    XpertRAT is a remote access trojan with various capabilities.

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 14 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\79df6cbb29cb39554f1061d71437c0c5b6351a398abcece971653b90f7d13216.exe
    "C:\Users\Admin\AppData\Local\Temp\79df6cbb29cb39554f1061d71437c0c5b6351a398abcece971653b90f7d13216.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:896
    • C:\Users\Admin\AppData\Local\Temp\Black Inject.exe
      "C:\Users\Admin\AppData\Local\Temp\Black Inject.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:916
    • C:\Users\Admin\AppData\Local\Temp\DOWS.exe
      "C:\Users\Admin\AppData\Local\Temp\DOWS.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1448
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\FIX.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX0\FIX.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1712
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\FIX.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX0\FIX.exe"
          4⤵
          • UAC bypass
          • Windows security bypass
          • Executes dropped EXE
          • Loads dropped DLL
          • Windows security modification
          • Checks whether UAC is enabled
          • Suspicious use of SetThreadContext
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:1380
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            C:\Users\Admin\AppData\Local\Temp\RarSFX0\FIX.exe
            5⤵
            • Adds policy Run key to start application
            • Adds Run key to start application
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1912
            • C:\Windows\SysWOW64\notepad.exe
              notepad.exe
              6⤵
                PID:1884

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Black Inject.exe

      Filesize

      32KB

      MD5

      8e7f0ab5708ed0bb3a34c0b1246bd8ea

      SHA1

      3dfce2eefcbc240bef5ca5dc536ecd623efdc537

      SHA256

      a24eb7a3f9e1e8382a455b3eccce575632103738217444565088def6f96b353d

      SHA512

      52ef0312612e79fab1871e8446cfadee3929337baa198a40c67035b27895f5f347fb6bb68c3cb565b46daa5aea1792530889457a3888d7fa495241cde5a84ba9

    • C:\Users\Admin\AppData\Local\Temp\DOWS.exe

      Filesize

      704KB

      MD5

      8d021cccaf91e5e4364f293ac9141100

      SHA1

      e60fc2fda9b75cf3a421c6438f105b5ea1c48cb6

      SHA256

      2abe3651a9fcb76fc2bfc7d41b53d75a0c4afb44ad4f683ff875eff0f14214aa

      SHA512

      48b8c59745dba92b9e91aa3032ee3a4e0126c978a7986e2b55fac9c09d1b83b060f250b071876cf445a6d9e8601405a0ece3b06bee1dec3157b06233fd3e62ac

    • C:\Users\Admin\AppData\Local\Temp\DOWS.exe

      Filesize

      704KB

      MD5

      8d021cccaf91e5e4364f293ac9141100

      SHA1

      e60fc2fda9b75cf3a421c6438f105b5ea1c48cb6

      SHA256

      2abe3651a9fcb76fc2bfc7d41b53d75a0c4afb44ad4f683ff875eff0f14214aa

      SHA512

      48b8c59745dba92b9e91aa3032ee3a4e0126c978a7986e2b55fac9c09d1b83b060f250b071876cf445a6d9e8601405a0ece3b06bee1dec3157b06233fd3e62ac

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\FIX.exe

      Filesize

      564KB

      MD5

      5075ce722c570cd61ef5c674f3551876

      SHA1

      9cf84d95886042c3232b5b5eecebb094c160ff9b

      SHA256

      90b84c2dadd8a427f19e26887185852bef6b019815374b14e91ed6658f75a932

      SHA512

      a3bee59ca57d7a9cc4139fbfada81679f6495e9ef4135f26bca5b97188645b004f519eb6439b9b99605cdde928c7db2705622ae31520a2a10d7a151aa5a4cc40

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\FIX.exe

      Filesize

      564KB

      MD5

      5075ce722c570cd61ef5c674f3551876

      SHA1

      9cf84d95886042c3232b5b5eecebb094c160ff9b

      SHA256

      90b84c2dadd8a427f19e26887185852bef6b019815374b14e91ed6658f75a932

      SHA512

      a3bee59ca57d7a9cc4139fbfada81679f6495e9ef4135f26bca5b97188645b004f519eb6439b9b99605cdde928c7db2705622ae31520a2a10d7a151aa5a4cc40

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\FIX.exe

      Filesize

      564KB

      MD5

      5075ce722c570cd61ef5c674f3551876

      SHA1

      9cf84d95886042c3232b5b5eecebb094c160ff9b

      SHA256

      90b84c2dadd8a427f19e26887185852bef6b019815374b14e91ed6658f75a932

      SHA512

      a3bee59ca57d7a9cc4139fbfada81679f6495e9ef4135f26bca5b97188645b004f519eb6439b9b99605cdde928c7db2705622ae31520a2a10d7a151aa5a4cc40

    • \Users\Admin\AppData\Local\Temp\Black Inject.exe

      Filesize

      32KB

      MD5

      8e7f0ab5708ed0bb3a34c0b1246bd8ea

      SHA1

      3dfce2eefcbc240bef5ca5dc536ecd623efdc537

      SHA256

      a24eb7a3f9e1e8382a455b3eccce575632103738217444565088def6f96b353d

      SHA512

      52ef0312612e79fab1871e8446cfadee3929337baa198a40c67035b27895f5f347fb6bb68c3cb565b46daa5aea1792530889457a3888d7fa495241cde5a84ba9

    • \Users\Admin\AppData\Local\Temp\Black Inject.exe

      Filesize

      32KB

      MD5

      8e7f0ab5708ed0bb3a34c0b1246bd8ea

      SHA1

      3dfce2eefcbc240bef5ca5dc536ecd623efdc537

      SHA256

      a24eb7a3f9e1e8382a455b3eccce575632103738217444565088def6f96b353d

      SHA512

      52ef0312612e79fab1871e8446cfadee3929337baa198a40c67035b27895f5f347fb6bb68c3cb565b46daa5aea1792530889457a3888d7fa495241cde5a84ba9

    • \Users\Admin\AppData\Local\Temp\DOWS.exe

      Filesize

      704KB

      MD5

      8d021cccaf91e5e4364f293ac9141100

      SHA1

      e60fc2fda9b75cf3a421c6438f105b5ea1c48cb6

      SHA256

      2abe3651a9fcb76fc2bfc7d41b53d75a0c4afb44ad4f683ff875eff0f14214aa

      SHA512

      48b8c59745dba92b9e91aa3032ee3a4e0126c978a7986e2b55fac9c09d1b83b060f250b071876cf445a6d9e8601405a0ece3b06bee1dec3157b06233fd3e62ac

    • \Users\Admin\AppData\Local\Temp\RarSFX0\FIX.exe

      Filesize

      564KB

      MD5

      5075ce722c570cd61ef5c674f3551876

      SHA1

      9cf84d95886042c3232b5b5eecebb094c160ff9b

      SHA256

      90b84c2dadd8a427f19e26887185852bef6b019815374b14e91ed6658f75a932

      SHA512

      a3bee59ca57d7a9cc4139fbfada81679f6495e9ef4135f26bca5b97188645b004f519eb6439b9b99605cdde928c7db2705622ae31520a2a10d7a151aa5a4cc40

    • \Users\Admin\AppData\Local\Temp\RarSFX0\FIX.exe

      Filesize

      564KB

      MD5

      5075ce722c570cd61ef5c674f3551876

      SHA1

      9cf84d95886042c3232b5b5eecebb094c160ff9b

      SHA256

      90b84c2dadd8a427f19e26887185852bef6b019815374b14e91ed6658f75a932

      SHA512

      a3bee59ca57d7a9cc4139fbfada81679f6495e9ef4135f26bca5b97188645b004f519eb6439b9b99605cdde928c7db2705622ae31520a2a10d7a151aa5a4cc40

    • \Users\Admin\AppData\Local\Temp\RarSFX0\FIX.exe

      Filesize

      564KB

      MD5

      5075ce722c570cd61ef5c674f3551876

      SHA1

      9cf84d95886042c3232b5b5eecebb094c160ff9b

      SHA256

      90b84c2dadd8a427f19e26887185852bef6b019815374b14e91ed6658f75a932

      SHA512

      a3bee59ca57d7a9cc4139fbfada81679f6495e9ef4135f26bca5b97188645b004f519eb6439b9b99605cdde928c7db2705622ae31520a2a10d7a151aa5a4cc40

    • \Users\Admin\AppData\Local\Temp\RarSFX0\FIX.exe

      Filesize

      564KB

      MD5

      5075ce722c570cd61ef5c674f3551876

      SHA1

      9cf84d95886042c3232b5b5eecebb094c160ff9b

      SHA256

      90b84c2dadd8a427f19e26887185852bef6b019815374b14e91ed6658f75a932

      SHA512

      a3bee59ca57d7a9cc4139fbfada81679f6495e9ef4135f26bca5b97188645b004f519eb6439b9b99605cdde928c7db2705622ae31520a2a10d7a151aa5a4cc40

    • \Users\Admin\AppData\Local\Temp\RarSFX0\FIX.exe

      Filesize

      564KB

      MD5

      5075ce722c570cd61ef5c674f3551876

      SHA1

      9cf84d95886042c3232b5b5eecebb094c160ff9b

      SHA256

      90b84c2dadd8a427f19e26887185852bef6b019815374b14e91ed6658f75a932

      SHA512

      a3bee59ca57d7a9cc4139fbfada81679f6495e9ef4135f26bca5b97188645b004f519eb6439b9b99605cdde928c7db2705622ae31520a2a10d7a151aa5a4cc40

    • \Users\Admin\AppData\Local\Temp\RarSFX0\FIX.exe

      Filesize

      564KB

      MD5

      5075ce722c570cd61ef5c674f3551876

      SHA1

      9cf84d95886042c3232b5b5eecebb094c160ff9b

      SHA256

      90b84c2dadd8a427f19e26887185852bef6b019815374b14e91ed6658f75a932

      SHA512

      a3bee59ca57d7a9cc4139fbfada81679f6495e9ef4135f26bca5b97188645b004f519eb6439b9b99605cdde928c7db2705622ae31520a2a10d7a151aa5a4cc40

    • \Users\Admin\AppData\Local\Temp\RarSFX0\FIX.exe

      Filesize

      564KB

      MD5

      5075ce722c570cd61ef5c674f3551876

      SHA1

      9cf84d95886042c3232b5b5eecebb094c160ff9b

      SHA256

      90b84c2dadd8a427f19e26887185852bef6b019815374b14e91ed6658f75a932

      SHA512

      a3bee59ca57d7a9cc4139fbfada81679f6495e9ef4135f26bca5b97188645b004f519eb6439b9b99605cdde928c7db2705622ae31520a2a10d7a151aa5a4cc40

    • \Users\Admin\AppData\Local\Temp\RarSFX0\FIX.exe

      Filesize

      564KB

      MD5

      5075ce722c570cd61ef5c674f3551876

      SHA1

      9cf84d95886042c3232b5b5eecebb094c160ff9b

      SHA256

      90b84c2dadd8a427f19e26887185852bef6b019815374b14e91ed6658f75a932

      SHA512

      a3bee59ca57d7a9cc4139fbfada81679f6495e9ef4135f26bca5b97188645b004f519eb6439b9b99605cdde928c7db2705622ae31520a2a10d7a151aa5a4cc40

    • \Users\Admin\AppData\Local\Temp\RarSFX0\FIX.exe

      Filesize

      564KB

      MD5

      5075ce722c570cd61ef5c674f3551876

      SHA1

      9cf84d95886042c3232b5b5eecebb094c160ff9b

      SHA256

      90b84c2dadd8a427f19e26887185852bef6b019815374b14e91ed6658f75a932

      SHA512

      a3bee59ca57d7a9cc4139fbfada81679f6495e9ef4135f26bca5b97188645b004f519eb6439b9b99605cdde928c7db2705622ae31520a2a10d7a151aa5a4cc40

    • \Users\Admin\AppData\Local\Temp\RarSFX0\FIX.exe

      Filesize

      564KB

      MD5

      5075ce722c570cd61ef5c674f3551876

      SHA1

      9cf84d95886042c3232b5b5eecebb094c160ff9b

      SHA256

      90b84c2dadd8a427f19e26887185852bef6b019815374b14e91ed6658f75a932

      SHA512

      a3bee59ca57d7a9cc4139fbfada81679f6495e9ef4135f26bca5b97188645b004f519eb6439b9b99605cdde928c7db2705622ae31520a2a10d7a151aa5a4cc40

    • \Users\Admin\AppData\Local\Temp\RarSFX0\FIX.exe

      Filesize

      564KB

      MD5

      5075ce722c570cd61ef5c674f3551876

      SHA1

      9cf84d95886042c3232b5b5eecebb094c160ff9b

      SHA256

      90b84c2dadd8a427f19e26887185852bef6b019815374b14e91ed6658f75a932

      SHA512

      a3bee59ca57d7a9cc4139fbfada81679f6495e9ef4135f26bca5b97188645b004f519eb6439b9b99605cdde928c7db2705622ae31520a2a10d7a151aa5a4cc40

    • memory/896-67-0x0000000000020000-0x0000000000023000-memory.dmp

      Filesize

      12KB

    • memory/896-66-0x0000000000400000-0x00000000004CE000-memory.dmp

      Filesize

      824KB

    • memory/896-56-0x0000000075B41000-0x0000000075B43000-memory.dmp

      Filesize

      8KB

    • memory/916-59-0x0000000000000000-mapping.dmp

    • memory/1380-108-0x0000000000230000-0x000000000023D000-memory.dmp

      Filesize

      52KB

    • memory/1380-88-0x0000000000400000-0x000000000042B000-memory.dmp

      Filesize

      172KB

    • memory/1380-90-0x0000000000400000-0x000000000042B000-memory.dmp

      Filesize

      172KB

    • memory/1380-93-0x00000000004010B0-mapping.dmp

    • memory/1380-104-0x0000000000400000-0x000000000042B000-memory.dmp

      Filesize

      172KB

    • memory/1380-109-0x0000000000400000-0x000000000042B000-memory.dmp

      Filesize

      172KB

    • memory/1380-87-0x0000000000400000-0x000000000042B000-memory.dmp

      Filesize

      172KB

    • memory/1380-103-0x0000000000230000-0x00000000002D5000-memory.dmp

      Filesize

      660KB

    • memory/1380-92-0x0000000000400000-0x000000000042B000-memory.dmp

      Filesize

      172KB

    • memory/1448-77-0x0000000003300000-0x00000000033A5000-memory.dmp

      Filesize

      660KB

    • memory/1448-107-0x0000000003300000-0x000000000335D000-memory.dmp

      Filesize

      372KB

    • memory/1448-64-0x0000000000000000-mapping.dmp

    • memory/1712-74-0x0000000000000000-mapping.dmp

    • memory/1712-96-0x0000000000400000-0x00000000004A5000-memory.dmp

      Filesize

      660KB

    • memory/1712-85-0x0000000000240000-0x0000000000243000-memory.dmp

      Filesize

      12KB

    • memory/1712-78-0x0000000000400000-0x00000000004A5000-memory.dmp

      Filesize

      660KB

    • memory/1884-105-0x0000000000000000-mapping.dmp