Analysis
-
max time kernel
31s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 18:57
Static task
static1
Behavioral task
behavioral1
Sample
cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe
Resource
win10v2004-20220812-en
General
-
Target
cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe
-
Size
980KB
-
MD5
409a8d80d84aa23fedb10b49160051d9
-
SHA1
4aa47235e60cfc78040360e9840c2f9a55f0d67a
-
SHA256
cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359
-
SHA512
2ebcba46759db8efff11490d2771057e9119ca6273fbc38f5a53b13916639d01532672620d9d27f2d9e5f221c48c2b45869fb8362a93d849eef7b18404dcab3a
-
SSDEEP
24576:YTLHLXccWMukmi4AQ7CsVbqQr/kV8u69fUg:QLMBRuQus/4V8uib
Malware Config
Signatures
-
Detect XtremeRAT payload 11 IoCs
Processes:
resource yara_rule behavioral1/memory/968-61-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/968-62-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/968-63-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/968-64-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/968-65-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/968-67-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/968-68-0x000000001000D0F4-mapping.dmp family_xtremerat behavioral1/memory/968-69-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/968-72-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/968-77-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/968-79-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Wine cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exepid process 1676 cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exedescription pid process target process PID 1676 set thread context of 968 1676 cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exepid process 1676 cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe 1676 cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe 1676 cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe 1676 cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe 1676 cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exepid process 1676 cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe 1676 cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.execmd.execfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exenet.exedescription pid process target process PID 1676 wrote to memory of 1740 1676 cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe cmd.exe PID 1676 wrote to memory of 1740 1676 cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe cmd.exe PID 1676 wrote to memory of 1740 1676 cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe cmd.exe PID 1676 wrote to memory of 1740 1676 cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe cmd.exe PID 1676 wrote to memory of 968 1676 cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe PID 1676 wrote to memory of 968 1676 cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe PID 1676 wrote to memory of 968 1676 cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe PID 1676 wrote to memory of 968 1676 cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe PID 1676 wrote to memory of 968 1676 cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe PID 1676 wrote to memory of 968 1676 cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe PID 1676 wrote to memory of 968 1676 cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe PID 1676 wrote to memory of 968 1676 cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe PID 1676 wrote to memory of 968 1676 cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe PID 1676 wrote to memory of 968 1676 cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe PID 1676 wrote to memory of 968 1676 cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe PID 1676 wrote to memory of 968 1676 cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe PID 1740 wrote to memory of 1764 1740 cmd.exe net.exe PID 1740 wrote to memory of 1764 1740 cmd.exe net.exe PID 1740 wrote to memory of 1764 1740 cmd.exe net.exe PID 1740 wrote to memory of 1764 1740 cmd.exe net.exe PID 968 wrote to memory of 1208 968 cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe iexplore.exe PID 968 wrote to memory of 1208 968 cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe iexplore.exe PID 968 wrote to memory of 1208 968 cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe iexplore.exe PID 968 wrote to memory of 1208 968 cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe iexplore.exe PID 1764 wrote to memory of 896 1764 net.exe net1.exe PID 1764 wrote to memory of 896 1764 net.exe net1.exe PID 1764 wrote to memory of 896 1764 net.exe net1.exe PID 1764 wrote to memory of 896 1764 net.exe net1.exe PID 968 wrote to memory of 1208 968 cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe iexplore.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe"C:\Users\Admin\AppData\Local\Temp\cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\cmd.exe/c net stop MpsSvc2⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exeC:\Users\Admin\AppData\Local\Temp\cfc440d88a6d4f34035e9a9b2cbe63e5628f01f0e893370cd66cdd9c9725e359.exe2⤵
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:1208