Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 23:32
Static task
static1
Behavioral task
behavioral1
Sample
784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe
Resource
win10v2004-20220812-en
General
-
Target
784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe
-
Size
984KB
-
MD5
b9c359c50e9eae0510f482e9beb70a22
-
SHA1
e8557e38f7c292847fc17c890f55d2e7d38053c8
-
SHA256
784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087
-
SHA512
517ca9aa7c12c3d159e9ad1ff52724d9f0d6ab1c3455043833ad13d0107adfbb8c76569ea7a1217fb107ade3019f0ccb19582226c8aac593c12dfa25f3708ddc
-
SSDEEP
12288:YMXh9i82/wsLLC67/gjiMx585zHcF0CkoHYM0pk/bHLkXC7XrT4iiHyk7DHChxtg:YMxg/ZCu5oFZiM7DQXEd9ODHChXjHuyO
Malware Config
Signatures
-
Detect XtremeRAT payload 11 IoCs
Processes:
resource yara_rule behavioral1/memory/1764-60-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/1764-61-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/1764-62-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/1764-63-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/1764-64-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/1764-67-0x000000001000D0F4-mapping.dmp family_xtremerat behavioral1/memory/1764-70-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/1764-68-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/1764-66-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/1764-77-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/1764-78-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Wine 784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exepid process 1032 784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exedescription pid process target process PID 1032 set thread context of 1764 1032 784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe 784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exepid process 1032 784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe 1032 784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe 1032 784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe 1032 784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe 1032 784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exepid process 1032 784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe 1032 784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.execmd.exenet.exedescription pid process target process PID 1032 wrote to memory of 1592 1032 784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe cmd.exe PID 1032 wrote to memory of 1592 1032 784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe cmd.exe PID 1032 wrote to memory of 1592 1032 784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe cmd.exe PID 1032 wrote to memory of 1592 1032 784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe cmd.exe PID 1032 wrote to memory of 1764 1032 784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe 784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe PID 1032 wrote to memory of 1764 1032 784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe 784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe PID 1032 wrote to memory of 1764 1032 784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe 784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe PID 1032 wrote to memory of 1764 1032 784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe 784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe PID 1032 wrote to memory of 1764 1032 784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe 784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe PID 1032 wrote to memory of 1764 1032 784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe 784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe PID 1032 wrote to memory of 1764 1032 784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe 784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe PID 1032 wrote to memory of 1764 1032 784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe 784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe PID 1032 wrote to memory of 1764 1032 784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe 784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe PID 1032 wrote to memory of 1764 1032 784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe 784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe PID 1032 wrote to memory of 1764 1032 784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe 784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe PID 1032 wrote to memory of 1764 1032 784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe 784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe PID 1764 wrote to memory of 592 1764 784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe iexplore.exe PID 1764 wrote to memory of 592 1764 784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe iexplore.exe PID 1764 wrote to memory of 592 1764 784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe iexplore.exe PID 1764 wrote to memory of 592 1764 784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe iexplore.exe PID 1592 wrote to memory of 588 1592 cmd.exe net.exe PID 1592 wrote to memory of 588 1592 cmd.exe net.exe PID 1592 wrote to memory of 588 1592 cmd.exe net.exe PID 1592 wrote to memory of 588 1592 cmd.exe net.exe PID 588 wrote to memory of 688 588 net.exe net1.exe PID 588 wrote to memory of 688 588 net.exe net1.exe PID 588 wrote to memory of 688 588 net.exe net1.exe PID 588 wrote to memory of 688 588 net.exe net1.exe PID 1764 wrote to memory of 592 1764 784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe iexplore.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe"C:\Users\Admin\AppData\Local\Temp\784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\cmd.exe/c net stop MpsSvc2⤵
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵PID:688
-
C:\Users\Admin\AppData\Local\Temp\784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exeC:\Users\Admin\AppData\Local\Temp\784760025ab16be9cb04f1a5aed2dfbf46c1a3a5bf9415854c40975972ff6087.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:592