Analysis
-
max time kernel
202s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23/11/2022, 16:33
Behavioral task
behavioral1
Sample
الادبي.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
الادبي.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
العلمي.exe
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
العلمي.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
كل العراق.exe
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
كل العراق.exe
Resource
win10v2004-20221111-en
General
-
Target
كل العراق.exe
-
Size
33KB
-
MD5
b70997ea41e9fb816d988b684ced6a7d
-
SHA1
7e0d1615dcf3de8a924d1ef13e1e4f300356f41d
-
SHA256
7a0f359bedb66792219232f925f325680e85b8a0c95cc790b39c91621945f343
-
SHA512
1e20e00b03ec892118d6f3e2ab66763d3f83dd4570912ae1ed47093a5e3b163a9203f266ce812c84848438d39ac6a68d0788766eae1a9c5904c10c0bfce44808
-
SSDEEP
768:JMuijtHf5g7/IIG3bGcYDBSvFIWuePQtv66lgtzQD75z4v:CNW71rcYDAWeotvXlGUD
Malware Config
Extracted
xtremerat
iraq00964.no-ip.biz
Signatures
-
Detect XtremeRAT payload 5 IoCs
resource yara_rule behavioral5/memory/1584-55-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral5/memory/528-58-0x0000000000000000-mapping.dmp family_xtremerat behavioral5/memory/1584-60-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral5/memory/528-61-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral5/memory/528-62-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
resource yara_rule behavioral5/memory/1584-55-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral5/memory/1584-60-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral5/memory/528-61-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral5/memory/528-62-0x0000000010000000-0x000000001004D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1584 wrote to memory of 528 1584 كل العراق.exe 28 PID 1584 wrote to memory of 528 1584 كل العراق.exe 28 PID 1584 wrote to memory of 528 1584 كل العراق.exe 28 PID 1584 wrote to memory of 528 1584 كل العراق.exe 28 PID 1584 wrote to memory of 528 1584 كل العراق.exe 28 PID 1584 wrote to memory of 1032 1584 كل العراق.exe 29 PID 1584 wrote to memory of 1032 1584 كل العراق.exe 29 PID 1584 wrote to memory of 1032 1584 كل العراق.exe 29 PID 1584 wrote to memory of 1032 1584 كل العراق.exe 29 PID 1584 wrote to memory of 1032 1584 كل العراق.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\كل العراق.exe"C:\Users\Admin\AppData\Local\Temp\كل العراق.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:528
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:1032
-