Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/11/2022, 14:03

General

  • Target

    6d3f87f3abe501b3f48ffbb98cc9c6369386a0a06d001a3928d10ef49e66bfdb.exe

  • Size

    605KB

  • MD5

    3a9d22c436ba5595f37eb85fb63179f5

  • SHA1

    b5dd3f9223f82208b51d181c2e2bd8aef60c76ec

  • SHA256

    6d3f87f3abe501b3f48ffbb98cc9c6369386a0a06d001a3928d10ef49e66bfdb

  • SHA512

    3aac161a6fcd30df59253e6ce0a8fe155bea86c51d577e27f6abe1c01b8cf8f7e48381bf42793e79c9d9689b008ccafc4015ab567283d960c2691bbff6217031

  • SSDEEP

    12288:N5+UjLWwac3wzp/DLxcLkZQT+H0M7ozQ26:N5+4lJ3acLkZEY126

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • XtremeRAT

    The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

  • Adds policy Run key to start application 2 TTPs 16 IoCs
  • Executes dropped EXE 2 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 20 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 8 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d3f87f3abe501b3f48ffbb98cc9c6369386a0a06d001a3928d10ef49e66bfdb.exe
    "C:\Users\Admin\AppData\Local\Temp\6d3f87f3abe501b3f48ffbb98cc9c6369386a0a06d001a3928d10ef49e66bfdb.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1496
    • C:\Users\Admin\AppData\Local\Temp\6d3f87f3abe501b3f48ffbb98cc9c6369386a0a06d001a3928d10ef49e66bfdb.exe
      "C:\Users\Admin\AppData\Local\Temp\6d3f87f3abe501b3f48ffbb98cc9c6369386a0a06d001a3928d10ef49e66bfdb.exe"
      2⤵
      • Adds policy Run key to start application
      • Checks computer location settings
      • Adds Run key to start application
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3900
      • C:\Windows\SysWOW64\svchost.exe
        svchost.exe
        3⤵
          PID:3852
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
          3⤵
            PID:2888
          • C:\Windows\SysWOW64\explorer.exe
            explorer.exe
            3⤵
              PID:1756
            • C:\Windows\SysWOW64\explorer.exe
              explorer.exe
              3⤵
                PID:1476
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
                3⤵
                  PID:4524
                • C:\Windows\SysWOW64\explorer.exe
                  explorer.exe
                  3⤵
                    PID:4684
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
                    3⤵
                      PID:1420
                    • C:\Windows\SysWOW64\explorer.exe
                      explorer.exe
                      3⤵
                        PID:2892
                      • C:\Windows\SysWOW64\explorer.exe
                        explorer.exe
                        3⤵
                          PID:2636
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
                          3⤵
                            PID:4124
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
                            3⤵
                              PID:4668
                            • C:\Windows\SysWOW64\explorer.exe
                              explorer.exe
                              3⤵
                                PID:5032
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
                                3⤵
                                  PID:3568
                                • C:\Windows\SysWOW64\explorer.exe
                                  explorer.exe
                                  3⤵
                                    PID:2296
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
                                    3⤵
                                      PID:4368
                                    • C:\Windows\SysWOW64\explorer.exe
                                      explorer.exe
                                      3⤵
                                        PID:4316
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
                                        3⤵
                                          PID:1300
                                        • C:\Windows\SysWOW64\explorer.exe
                                          explorer.exe
                                          3⤵
                                            PID:3476
                                          • C:\Windows\SysWOW64\explorer.exe
                                            explorer.exe
                                            3⤵
                                              PID:4540
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
                                              3⤵
                                                PID:4520
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
                                                3⤵
                                                  PID:4104
                                                • C:\Windows\SysWOW64\explorer.exe
                                                  explorer.exe
                                                  3⤵
                                                    PID:4404
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
                                                    3⤵
                                                      PID:4904
                                                    • C:\Windows\SysWOW64\explorer.exe
                                                      explorer.exe
                                                      3⤵
                                                        PID:2596
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
                                                        3⤵
                                                          PID:3684
                                                        • C:\Windows\SysWOW64\explorer.exe
                                                          explorer.exe
                                                          3⤵
                                                            PID:3196
                                                          • C:\Windows\SysWOW64\explorer.exe
                                                            explorer.exe
                                                            3⤵
                                                              PID:4212
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
                                                              3⤵
                                                                PID:4132
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
                                                                3⤵
                                                                  PID:536
                                                                • C:\Windows\SysWOW64\explorer.exe
                                                                  explorer.exe
                                                                  3⤵
                                                                    PID:2200
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
                                                                    3⤵
                                                                      PID:2248
                                                                    • C:\Windows\SysWOW64\explorer.exe
                                                                      explorer.exe
                                                                      3⤵
                                                                        PID:448
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
                                                                        3⤵
                                                                          PID:1660
                                                                        • C:\Windows\SysWOW64\explorer.exe
                                                                          explorer.exe
                                                                          3⤵
                                                                            PID:1432
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
                                                                            3⤵
                                                                              PID:4492
                                                                            • C:\Windows\SysWOW64\explorer.exe
                                                                              explorer.exe
                                                                              3⤵
                                                                                PID:1748
                                                                              • C:\Users\Admin\AppData\Roaming\Acrobat Debugger\acrobtdeb.exe
                                                                                "C:\Users\Admin\AppData\Roaming\Acrobat Debugger\acrobtdeb.exe"
                                                                                3⤵
                                                                                • Executes dropped EXE
                                                                                • Suspicious use of SetThreadContext
                                                                                PID:1992
                                                                                • C:\Users\Admin\AppData\Roaming\Acrobat Debugger\acrobtdeb.exe
                                                                                  "C:\Users\Admin\AppData\Roaming\Acrobat Debugger\acrobtdeb.exe"
                                                                                  4⤵
                                                                                  • Adds policy Run key to start application
                                                                                  • Executes dropped EXE
                                                                                  • Adds Run key to start application
                                                                                  • Suspicious use of SetThreadContext
                                                                                  PID:3392
                                                                                  • C:\Windows\SysWOW64\svchost.exe
                                                                                    svchost.exe
                                                                                    5⤵
                                                                                    • Adds policy Run key to start application
                                                                                    • Adds Run key to start application
                                                                                    PID:3896
                                                                                  • C:\Windows\SysWOW64\explorer.exe
                                                                                    explorer.exe
                                                                                    5⤵
                                                                                    • Modifies WinLogon for persistence
                                                                                    • Adds policy Run key to start application
                                                                                    • Adds Run key to start application
                                                                                    • Checks SCSI registry key(s)
                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                    PID:2508
                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
                                                                                    5⤵
                                                                                      PID:2316

                                                                            Network

                                                                                  MITRE ATT&CK Enterprise v6

                                                                                  Replay Monitor

                                                                                  Loading Replay Monitor...

                                                                                  Downloads

                                                                                  • C:\Users\Admin\AppData\Roaming\Acrobat Debugger\acrobtdeb.exe

                                                                                    Filesize

                                                                                    605KB

                                                                                    MD5

                                                                                    3a9d22c436ba5595f37eb85fb63179f5

                                                                                    SHA1

                                                                                    b5dd3f9223f82208b51d181c2e2bd8aef60c76ec

                                                                                    SHA256

                                                                                    6d3f87f3abe501b3f48ffbb98cc9c6369386a0a06d001a3928d10ef49e66bfdb

                                                                                    SHA512

                                                                                    3aac161a6fcd30df59253e6ce0a8fe155bea86c51d577e27f6abe1c01b8cf8f7e48381bf42793e79c9d9689b008ccafc4015ab567283d960c2691bbff6217031

                                                                                  • C:\Users\Admin\AppData\Roaming\Acrobat Debugger\acrobtdeb.exe

                                                                                    Filesize

                                                                                    605KB

                                                                                    MD5

                                                                                    3a9d22c436ba5595f37eb85fb63179f5

                                                                                    SHA1

                                                                                    b5dd3f9223f82208b51d181c2e2bd8aef60c76ec

                                                                                    SHA256

                                                                                    6d3f87f3abe501b3f48ffbb98cc9c6369386a0a06d001a3928d10ef49e66bfdb

                                                                                    SHA512

                                                                                    3aac161a6fcd30df59253e6ce0a8fe155bea86c51d577e27f6abe1c01b8cf8f7e48381bf42793e79c9d9689b008ccafc4015ab567283d960c2691bbff6217031

                                                                                  • C:\Users\Admin\AppData\Roaming\Acrobat Debugger\acrobtdeb.exe

                                                                                    Filesize

                                                                                    605KB

                                                                                    MD5

                                                                                    3a9d22c436ba5595f37eb85fb63179f5

                                                                                    SHA1

                                                                                    b5dd3f9223f82208b51d181c2e2bd8aef60c76ec

                                                                                    SHA256

                                                                                    6d3f87f3abe501b3f48ffbb98cc9c6369386a0a06d001a3928d10ef49e66bfdb

                                                                                    SHA512

                                                                                    3aac161a6fcd30df59253e6ce0a8fe155bea86c51d577e27f6abe1c01b8cf8f7e48381bf42793e79c9d9689b008ccafc4015ab567283d960c2691bbff6217031

                                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\yaDYVN3nb\yaDYVN3nb.dat

                                                                                    Filesize

                                                                                    2B

                                                                                    MD5

                                                                                    93e00066d099c0485cfffa1359246d26

                                                                                    SHA1

                                                                                    bc69a773f37b2f2071e25f755a66d47b871e5d98

                                                                                    SHA256

                                                                                    3b271649a94ad5be4ef46ecbb6a4e7363e8498b7e69b751737bf30df2e0d1dde

                                                                                    SHA512

                                                                                    d3dfe508cacae7d36f13908134b5b438b87429fcf93ccb060bcfa346c04633a99e9ca497297418c969537be1da2405171982794055dd0f52e59a82720d3b3d02

                                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\yaDYVN3nb\yaDYVN3nb.nfo

                                                                                    Filesize

                                                                                    3KB

                                                                                    MD5

                                                                                    3cd65f58ae0f3e1b588c34eed4246a5f

                                                                                    SHA1

                                                                                    1523fbb4ec02295e9448eafbcb805318ac7b638c

                                                                                    SHA256

                                                                                    5d31801d466968640302995d1f84a3a8937ce109808f83e13d1c231f4ee2e9e3

                                                                                    SHA512

                                                                                    d8991f849637c16ce11defa42a29b682704231c5a77e22131aa4f5c0aa1bd44fb3fa3e41e5f54814b0bd7770b7d42315183219482dc63b3b712b97a7ba973894

                                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\yaDYVN3nb\yaDYVN3nb.nfo

                                                                                    Filesize

                                                                                    3KB

                                                                                    MD5

                                                                                    3cd65f58ae0f3e1b588c34eed4246a5f

                                                                                    SHA1

                                                                                    1523fbb4ec02295e9448eafbcb805318ac7b638c

                                                                                    SHA256

                                                                                    5d31801d466968640302995d1f84a3a8937ce109808f83e13d1c231f4ee2e9e3

                                                                                    SHA512

                                                                                    d8991f849637c16ce11defa42a29b682704231c5a77e22131aa4f5c0aa1bd44fb3fa3e41e5f54814b0bd7770b7d42315183219482dc63b3b712b97a7ba973894

                                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\yaDYVN3nb\yaDYVN3nb.svr

                                                                                    Filesize

                                                                                    356KB

                                                                                    MD5

                                                                                    a0eaa79f7fc06363a4be2586faf870c4

                                                                                    SHA1

                                                                                    4a917e5edeb6ef24d3254cc4736c51f3328819ac

                                                                                    SHA256

                                                                                    63d2efdbaadf9ab86413b83f868eefb6e1d0affc30081e3e2a10ea2605345ee3

                                                                                    SHA512

                                                                                    b79494de07f28cd64edccedf84a07fb4d7a791c04832c82d301846449f5fd138af0a7c9a0e0fc9f78c0302b4a9d0c9fcc63313370962c2ee622ecac525dec4b8

                                                                                  • memory/1476-138-0x0000000000400000-0x000000000046F000-memory.dmp

                                                                                    Filesize

                                                                                    444KB

                                                                                  • memory/2508-160-0x0000000001610000-0x000000000171F000-memory.dmp

                                                                                    Filesize

                                                                                    1.1MB

                                                                                  • memory/2508-155-0x0000000001610000-0x000000000171F000-memory.dmp

                                                                                    Filesize

                                                                                    1.1MB

                                                                                  • memory/2508-167-0x00000000016C5000-0x000000000171D000-memory.dmp

                                                                                    Filesize

                                                                                    352KB

                                                                                  • memory/2508-159-0x0000000001610000-0x000000000171F000-memory.dmp

                                                                                    Filesize

                                                                                    1.1MB

                                                                                  • memory/2508-158-0x0000000001610000-0x000000000171F000-memory.dmp

                                                                                    Filesize

                                                                                    1.1MB

                                                                                  • memory/2508-165-0x0000000001611000-0x00000000016C5000-memory.dmp

                                                                                    Filesize

                                                                                    720KB

                                                                                  • memory/2508-156-0x0000000001610000-0x000000000171F000-memory.dmp

                                                                                    Filesize

                                                                                    1.1MB

                                                                                  • memory/2508-164-0x00000000016C5000-0x000000000171D000-memory.dmp

                                                                                    Filesize

                                                                                    352KB

                                                                                  • memory/2508-154-0x0000000001610000-0x000000000171F000-memory.dmp

                                                                                    Filesize

                                                                                    1.1MB

                                                                                  • memory/2508-161-0x0000000001610000-0x000000000171F000-memory.dmp

                                                                                    Filesize

                                                                                    1.1MB

                                                                                  • memory/3392-149-0x0000000000400000-0x000000000046F000-memory.dmp

                                                                                    Filesize

                                                                                    444KB

                                                                                  • memory/3392-166-0x0000000000400000-0x000000000046F000-memory.dmp

                                                                                    Filesize

                                                                                    444KB

                                                                                  • memory/3896-151-0x0000000000400000-0x000000000046F000-memory.dmp

                                                                                    Filesize

                                                                                    444KB

                                                                                  • memory/3900-134-0x0000000000400000-0x000000000046F000-memory.dmp

                                                                                    Filesize

                                                                                    444KB

                                                                                  • memory/3900-133-0x0000000000400000-0x000000000046F000-memory.dmp

                                                                                    Filesize

                                                                                    444KB

                                                                                  • memory/3900-135-0x0000000000400000-0x000000000046F000-memory.dmp

                                                                                    Filesize

                                                                                    444KB

                                                                                  • memory/3900-136-0x0000000000400000-0x000000000046F000-memory.dmp

                                                                                    Filesize

                                                                                    444KB

                                                                                  • memory/3900-142-0x0000000000400000-0x000000000046F000-memory.dmp

                                                                                    Filesize

                                                                                    444KB