Analysis
-
max time kernel
197s -
max time network
203s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2022, 16:33
Behavioral task
behavioral1
Sample
الادبي.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
الادبي.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
العلمي.exe
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
العلمي.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
كل العراق.exe
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
كل العراق.exe
Resource
win10v2004-20221111-en
General
-
Target
كل العراق.exe
-
Size
33KB
-
MD5
b70997ea41e9fb816d988b684ced6a7d
-
SHA1
7e0d1615dcf3de8a924d1ef13e1e4f300356f41d
-
SHA256
7a0f359bedb66792219232f925f325680e85b8a0c95cc790b39c91621945f343
-
SHA512
1e20e00b03ec892118d6f3e2ab66763d3f83dd4570912ae1ed47093a5e3b163a9203f266ce812c84848438d39ac6a68d0788766eae1a9c5904c10c0bfce44808
-
SSDEEP
768:JMuijtHf5g7/IIG3bGcYDBSvFIWuePQtv66lgtzQD75z4v:CNW71rcYDAWeotvXlGUD
Malware Config
Extracted
xtremerat
iraq00964.no-ip.biz
Signatures
-
Detect XtremeRAT payload 4 IoCs
resource yara_rule behavioral6/memory/4584-133-0x0000000000000000-mapping.dmp family_xtremerat behavioral6/memory/4584-134-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral6/memory/1120-135-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral6/memory/4584-136-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
resource yara_rule behavioral6/memory/1120-132-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral6/memory/4584-134-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral6/memory/1120-135-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral6/memory/4584-136-0x0000000010000000-0x000000001004D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 212 4584 WerFault.exe 83 2120 4584 WerFault.exe 83 -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1120 wrote to memory of 4584 1120 كل العراق.exe 83 PID 1120 wrote to memory of 4584 1120 كل العراق.exe 83 PID 1120 wrote to memory of 4584 1120 كل العراق.exe 83 PID 1120 wrote to memory of 4584 1120 كل العراق.exe 83 PID 1120 wrote to memory of 4364 1120 كل العراق.exe 84 PID 1120 wrote to memory of 4364 1120 كل العراق.exe 84 PID 1120 wrote to memory of 4364 1120 كل العراق.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\كل العراق.exe"C:\Users\Admin\AppData\Local\Temp\كل العراق.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:4584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4584 -s 4803⤵
- Program crash
PID:212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4584 -s 4883⤵
- Program crash
PID:2120
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵PID:4364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4584 -ip 45841⤵PID:428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4584 -ip 45841⤵PID:4772