Analysis
-
max time kernel
158s -
max time network
209s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 14:34
Static task
static1
Behavioral task
behavioral1
Sample
39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe
Resource
win10v2004-20220812-en
General
-
Target
39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe
-
Size
519KB
-
MD5
b1415073293fa408b8c1a31bdc34fcc4
-
SHA1
37642c6145a1f451c88b710b8573bca7afa7ba81
-
SHA256
39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b
-
SHA512
b48214ddc7006268a2c2f273602b70e45aca4e909025e44b41b890455e527f94bbf36796fac7e0b1af656cefdfab5d79dff85d31b14f310990bba0c72fddb25b
-
SSDEEP
12288:RnCOMDRxONM9eVXeHwv70Kd5hLVxKHx6KoUur6iQafK:RnCjDFHVKd5bKofhc
Malware Config
Extracted
xtremerat
alertsdanish.bounceme.net
čalertsdanish.bounceme.net
Signatures
-
Detect XtremeRAT payload 16 IoCs
Processes:
resource yara_rule behavioral1/memory/968-59-0x0000000010000000-0x0000000010097000-memory.dmp family_xtremerat behavioral1/memory/968-60-0x0000000010000000-0x0000000010097000-memory.dmp family_xtremerat behavioral1/memory/968-61-0x0000000010000000-0x0000000010097000-memory.dmp family_xtremerat behavioral1/memory/968-62-0x0000000010000000-0x0000000010097000-memory.dmp family_xtremerat behavioral1/memory/968-63-0x0000000010000000-0x0000000010097000-memory.dmp family_xtremerat behavioral1/memory/968-65-0x0000000010000000-0x0000000010097000-memory.dmp family_xtremerat behavioral1/memory/968-66-0x000000001000D0F4-mapping.dmp family_xtremerat behavioral1/memory/968-67-0x0000000010000000-0x0000000010097000-memory.dmp family_xtremerat behavioral1/memory/968-69-0x0000000010000000-0x0000000010097000-memory.dmp family_xtremerat behavioral1/memory/968-70-0x0000000010000000-0x0000000010097000-memory.dmp family_xtremerat behavioral1/memory/668-73-0x0000000000000000-mapping.dmp family_xtremerat behavioral1/memory/684-77-0x0000000000000000-mapping.dmp family_xtremerat behavioral1/memory/968-80-0x0000000010000000-0x0000000010097000-memory.dmp family_xtremerat behavioral1/memory/684-83-0x0000000010000000-0x0000000010097000-memory.dmp family_xtremerat behavioral1/memory/668-84-0x0000000010000000-0x0000000010097000-memory.dmp family_xtremerat behavioral1/memory/668-87-0x0000000010000000-0x0000000010097000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Modifies Installed Components in the registry 2 TTPs 4 IoCs
Processes:
svchost.exeexplorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{TWDB4HK2-65MQ-224E-01L2-YY6624NJV2XC}\StubPath = "C:\\Windows\\InstallDir\\svchost.exe" svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{TWDB4HK2-65MQ-224E-01L2-YY6624NJV2XC} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{TWDB4HK2-65MQ-224E-01L2-YY6624NJV2XC}\StubPath = "C:\\Windows\\InstallDir\\svchost.exe restart" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{TWDB4HK2-65MQ-224E-01L2-YY6624NJV2XC} svchost.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
svchost.exeexplorer.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\svchost.exe" svchost.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\svchost.exe" svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\svchost.exe" explorer.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\svchost.exe" explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exedescription pid process target process PID 1324 set thread context of 968 1324 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE -
Drops file in Windows directory 5 IoCs
Processes:
39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXEexplorer.exedescription ioc process File created C:\Windows\210Moto-Azabu Hills Apt 2204 Rosbacher.pdf.exe 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE File created C:\Windows\210Moto-Azabu Hills Apt 2204 Rosbacher.pdf 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE File opened for modification C:\Windows\InstallDir\svchost.exe explorer.exe File created C:\Windows\InstallDir\svchost.exe explorer.exe File opened for modification C:\Windows\InstallDir\ explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exeexplorer.exeAcroRd32.exepid process 1324 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe 684 explorer.exe 276 AcroRd32.exe 276 AcroRd32.exe 276 AcroRd32.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXEdescription pid process target process PID 1324 wrote to memory of 968 1324 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE PID 1324 wrote to memory of 968 1324 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE PID 1324 wrote to memory of 968 1324 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE PID 1324 wrote to memory of 968 1324 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE PID 1324 wrote to memory of 968 1324 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE PID 1324 wrote to memory of 968 1324 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE PID 1324 wrote to memory of 968 1324 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE PID 1324 wrote to memory of 968 1324 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE PID 1324 wrote to memory of 968 1324 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE PID 1324 wrote to memory of 968 1324 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE PID 1324 wrote to memory of 968 1324 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE PID 1324 wrote to memory of 968 1324 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE PID 968 wrote to memory of 668 968 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE svchost.exe PID 968 wrote to memory of 668 968 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE svchost.exe PID 968 wrote to memory of 668 968 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE svchost.exe PID 968 wrote to memory of 668 968 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE svchost.exe PID 968 wrote to memory of 668 968 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE svchost.exe PID 968 wrote to memory of 684 968 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE explorer.exe PID 968 wrote to memory of 684 968 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE explorer.exe PID 968 wrote to memory of 684 968 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE explorer.exe PID 968 wrote to memory of 684 968 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE explorer.exe PID 968 wrote to memory of 684 968 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE explorer.exe PID 968 wrote to memory of 276 968 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE AcroRd32.exe PID 968 wrote to memory of 276 968 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE AcroRd32.exe PID 968 wrote to memory of 276 968 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE AcroRd32.exe PID 968 wrote to memory of 276 968 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE AcroRd32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe"C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE"C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- Modifies Installed Components in the registry
- Adds Run key to start application
PID:668 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:684 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Windows\210Moto-Azabu Hills Apt 2204 Rosbacher.pdf"3⤵
- Suspicious use of SetWindowsHookEx
PID:276
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
308KB
MD523bbd7c3a81207672ed44de64c7a3289
SHA1a190365064ad07ca95fcbe03c175b1ad575e1aa2
SHA256d23e94dfa47e49e83e3fbd60817e2cd20701ec1d06a4310845edfdb5f784b34d
SHA5124e1c7c423c6385376ab1bad1f660a8bb9bb9af0d94befcf65ceee7057dcc4991beb5abc4e4a5339c7c3b65a4ff60627b0381cc75cb1f1e9ae4c85ab93df397e4
-
Filesize
519KB
MD5b1415073293fa408b8c1a31bdc34fcc4
SHA137642c6145a1f451c88b710b8573bca7afa7ba81
SHA25639ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b
SHA512b48214ddc7006268a2c2f273602b70e45aca4e909025e44b41b890455e527f94bbf36796fac7e0b1af656cefdfab5d79dff85d31b14f310990bba0c72fddb25b