Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 12:42
Behavioral task
behavioral1
Sample
7cc0adc3e5901de13af13530fe7f12e8dc9b02f6a68072f170e89dce06dd11d7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7cc0adc3e5901de13af13530fe7f12e8dc9b02f6a68072f170e89dce06dd11d7.exe
Resource
win10v2004-20220901-en
General
-
Target
7cc0adc3e5901de13af13530fe7f12e8dc9b02f6a68072f170e89dce06dd11d7.exe
-
Size
5.9MB
-
MD5
2fbc0174ff722d1f00707e6a27e5dd80
-
SHA1
8a659170031f322b219281a4cc3ed6d47c3aee75
-
SHA256
7cc0adc3e5901de13af13530fe7f12e8dc9b02f6a68072f170e89dce06dd11d7
-
SHA512
c9f88b2cc414465badfb40e27c30c6eddc41311967e0c9ff10fba7fdf2b6cb777aa439cd55472383b51b88cd3c501b8c820ad591015d490910e6e1fdcdd48c2b
-
SSDEEP
49152:hYK3LcULK7n6FHbkDO8nqqh3vZuCRWDovqxXXGqQIBJotMMDqUSGm2td3r7EdUFe:8kyDNCWCEM+m2L7D30X2ys
Malware Config
Extracted
xtremerat
google1.no-ip.biz
Signatures
-
Detect XtremeRAT payload 8 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\system.exe family_xtremerat C:\Users\Admin\AppData\Local\Temp\system.exe family_xtremerat behavioral2/memory/1404-138-0x0000000000000000-mapping.dmp family_xtremerat C:\Windows\SysWOW64\Logs\system.exe family_xtremerat behavioral2/memory/1404-145-0x0000000000C80000-0x0000000000C94000-memory.dmp family_xtremerat behavioral2/memory/3368-156-0x0000000000000000-mapping.dmp family_xtremerat behavioral2/memory/3368-169-0x0000000000C80000-0x0000000000C94000-memory.dmp family_xtremerat behavioral2/memory/3368-395-0x0000000000C80000-0x0000000000C94000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Executes dropped EXE 3 IoCs
Processes:
VJumberSetup.exesystem.exeirsetup.exepid process 692 VJumberSetup.exe 3776 system.exe 2872 irsetup.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
Processes:
system.exesvchost.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{4D06FM6S-7L34-DFIW-C8UH-2132O0UNFRD0} system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4D06FM6S-7L34-DFIW-C8UH-2132O0UNFRD0}\StubPath = "C:\\Windows\\system32\\Logs\\system.exe restart" system.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{4D06FM6S-7L34-DFIW-C8UH-2132O0UNFRD0} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4D06FM6S-7L34-DFIW-C8UH-2132O0UNFRD0}\StubPath = "C:\\Windows\\system32\\Logs\\system.exe restart" svchost.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
7cc0adc3e5901de13af13530fe7f12e8dc9b02f6a68072f170e89dce06dd11d7.exeVJumberSetup.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 7cc0adc3e5901de13af13530fe7f12e8dc9b02f6a68072f170e89dce06dd11d7.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation VJumberSetup.exe -
Loads dropped DLL 3 IoCs
Processes:
irsetup.exepid process 2872 irsetup.exe 2872 irsetup.exe 2872 irsetup.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
svchost.exesystem.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Windows\\system32\\Logs\\system.exe" svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Windows\\system32\\Logs\\system.exe" system.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run system.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Windows\\system32\\Logs\\system.exe" system.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Windows\\system32\\Logs\\system.exe" svchost.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run svchost.exe -
Drops file in System32 directory 3 IoCs
Processes:
system.exedescription ioc process File created C:\Windows\SysWOW64\Logs\system.exe system.exe File opened for modification C:\Windows\SysWOW64\Logs\ system.exe File opened for modification C:\Windows\SysWOW64\Logs\system.exe system.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
irsetup.exenotepad.exepid process 2872 irsetup.exe 2872 irsetup.exe 2872 irsetup.exe 2872 irsetup.exe 3368 notepad.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
7cc0adc3e5901de13af13530fe7f12e8dc9b02f6a68072f170e89dce06dd11d7.exeVJumberSetup.exesystem.exedescription pid process target process PID 2532 wrote to memory of 692 2532 7cc0adc3e5901de13af13530fe7f12e8dc9b02f6a68072f170e89dce06dd11d7.exe VJumberSetup.exe PID 2532 wrote to memory of 692 2532 7cc0adc3e5901de13af13530fe7f12e8dc9b02f6a68072f170e89dce06dd11d7.exe VJumberSetup.exe PID 2532 wrote to memory of 692 2532 7cc0adc3e5901de13af13530fe7f12e8dc9b02f6a68072f170e89dce06dd11d7.exe VJumberSetup.exe PID 2532 wrote to memory of 3776 2532 7cc0adc3e5901de13af13530fe7f12e8dc9b02f6a68072f170e89dce06dd11d7.exe system.exe PID 2532 wrote to memory of 3776 2532 7cc0adc3e5901de13af13530fe7f12e8dc9b02f6a68072f170e89dce06dd11d7.exe system.exe PID 2532 wrote to memory of 3776 2532 7cc0adc3e5901de13af13530fe7f12e8dc9b02f6a68072f170e89dce06dd11d7.exe system.exe PID 692 wrote to memory of 2872 692 VJumberSetup.exe irsetup.exe PID 692 wrote to memory of 2872 692 VJumberSetup.exe irsetup.exe PID 692 wrote to memory of 2872 692 VJumberSetup.exe irsetup.exe PID 3776 wrote to memory of 1404 3776 system.exe svchost.exe PID 3776 wrote to memory of 1404 3776 system.exe svchost.exe PID 3776 wrote to memory of 1404 3776 system.exe svchost.exe PID 3776 wrote to memory of 1404 3776 system.exe svchost.exe PID 3776 wrote to memory of 224 3776 system.exe notepad.exe PID 3776 wrote to memory of 224 3776 system.exe notepad.exe PID 3776 wrote to memory of 224 3776 system.exe notepad.exe PID 3776 wrote to memory of 3640 3776 system.exe notepad.exe PID 3776 wrote to memory of 3640 3776 system.exe notepad.exe PID 3776 wrote to memory of 3640 3776 system.exe notepad.exe PID 3776 wrote to memory of 4164 3776 system.exe notepad.exe PID 3776 wrote to memory of 4164 3776 system.exe notepad.exe PID 3776 wrote to memory of 4164 3776 system.exe notepad.exe PID 3776 wrote to memory of 944 3776 system.exe notepad.exe PID 3776 wrote to memory of 944 3776 system.exe notepad.exe PID 3776 wrote to memory of 944 3776 system.exe notepad.exe PID 3776 wrote to memory of 3368 3776 system.exe notepad.exe PID 3776 wrote to memory of 3368 3776 system.exe notepad.exe PID 3776 wrote to memory of 3368 3776 system.exe notepad.exe PID 3776 wrote to memory of 3368 3776 system.exe notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7cc0adc3e5901de13af13530fe7f12e8dc9b02f6a68072f170e89dce06dd11d7.exe"C:\Users\Admin\AppData\Local\Temp\7cc0adc3e5901de13af13530fe7f12e8dc9b02f6a68072f170e89dce06dd11d7.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\VJumberSetup.exe"C:\Users\Admin\AppData\Local\Temp\VJumberSetup.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe"C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe" __IRAOFF:4194154 "__IRAFN:C:\Users\Admin\AppData\Local\Temp\VJumberSetup.exe" "__IRCT:0" "__IRTSS:0" "__IRSID:S-1-5-21-929662420-1054238289-2961194603-1000"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\system.exe"C:\Users\Admin\AppData\Local\Temp\system.exe"2⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- Modifies Installed Components in the registry
- Adds Run key to start application
PID:1404 -
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵PID:224
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵PID:3640
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵PID:4164
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- Suspicious use of SetWindowsHookEx
PID:3368 -
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵PID:944
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.8MB
MD5248ab47aff96773445d3589eb9bbd9ce
SHA116afa04e49dfb2fea335ce66da3de7230ea14bbd
SHA25698dac979c01fb0c200a9c82e20872d1138f8e62b4151c05c9ab2423c29747dbb
SHA51246300f099df863a723c25c8c484828e1bb45034de3005ca56912c4ad78d89dc906467a08d98b95494ae889a07916b8686508f2bbeab9f40d198a8b93501d3ddd
-
Filesize
5.8MB
MD5248ab47aff96773445d3589eb9bbd9ce
SHA116afa04e49dfb2fea335ce66da3de7230ea14bbd
SHA25698dac979c01fb0c200a9c82e20872d1138f8e62b4151c05c9ab2423c29747dbb
SHA51246300f099df863a723c25c8c484828e1bb45034de3005ca56912c4ad78d89dc906467a08d98b95494ae889a07916b8686508f2bbeab9f40d198a8b93501d3ddd
-
Filesize
3.6MB
MD5327eac1760485bcab9fc8cef7abe91ea
SHA1145f718b571f036cdce1b6640e433b82f1503080
SHA2569858685973ad1f5bde10121501fb6ca38928a1c0249659be12384907c2f2592f
SHA51247e1a9fc0d4f39d75c99f23823eec563a18b9d9932e4567f17e80748c8e6aafb19549f344f9183045c58f6ff131a3af3304cfc91ad945054209b3a4a43821703
-
Filesize
3.6MB
MD5327eac1760485bcab9fc8cef7abe91ea
SHA1145f718b571f036cdce1b6640e433b82f1503080
SHA2569858685973ad1f5bde10121501fb6ca38928a1c0249659be12384907c2f2592f
SHA51247e1a9fc0d4f39d75c99f23823eec563a18b9d9932e4567f17e80748c8e6aafb19549f344f9183045c58f6ff131a3af3304cfc91ad945054209b3a4a43821703
-
Filesize
301KB
MD51621ee6eb5d4a7d213ffcc01834c8c86
SHA12b43e5476ba8b9c2609f8c436f481032179898b2
SHA25680c3fa63c42043e1cd9baecb8fd1fb524ba7850eb02df4cc3500f70a88b24c2b
SHA5129ef40d5f1ac2c529f7a8f6c4582e30e8792da6dbdfb59ce48b8990fd8ebac734ad453bde5d668d9dd40688eb589a7d612857a45e62efddb3e072f1a1d5214634
-
Filesize
301KB
MD51621ee6eb5d4a7d213ffcc01834c8c86
SHA12b43e5476ba8b9c2609f8c436f481032179898b2
SHA25680c3fa63c42043e1cd9baecb8fd1fb524ba7850eb02df4cc3500f70a88b24c2b
SHA5129ef40d5f1ac2c529f7a8f6c4582e30e8792da6dbdfb59ce48b8990fd8ebac734ad453bde5d668d9dd40688eb589a7d612857a45e62efddb3e072f1a1d5214634
-
Filesize
318KB
MD54bcce2f6581bb46564155f3576028987
SHA15d24976dfc30d5fe09c7de1a4617cea3543296d4
SHA25694deef0a6a60213b3020334aede2eb5c7aa39286833a6699f8fd439c7cce63cf
SHA512a66f61a8a45c3086f48333891fb3f91535b1361c1c0dd196c91b56c89abdcbbc1d515d2c38e09a023a3845a93ac199871a2ef2fc4b5b72d96a529cbfd58bb76d
-
Filesize
318KB
MD54bcce2f6581bb46564155f3576028987
SHA15d24976dfc30d5fe09c7de1a4617cea3543296d4
SHA25694deef0a6a60213b3020334aede2eb5c7aa39286833a6699f8fd439c7cce63cf
SHA512a66f61a8a45c3086f48333891fb3f91535b1361c1c0dd196c91b56c89abdcbbc1d515d2c38e09a023a3845a93ac199871a2ef2fc4b5b72d96a529cbfd58bb76d
-
Filesize
47KB
MD544a9a3e400cff80b840afdf738e15e37
SHA1e5eb4c31c730ceb52da30f8665466fbe7574265c
SHA256d761144b3ede474222ef89a99179ce1ab88eee65cb54197a6d9c22706dc0cb15
SHA5123243068c0b480cf191734206cd5dc719075b89a26bdcd093377b3ba45965fe6a1a9859b0953cdb7712b210022e63ec6e0afe2e119378539c011020f7ddfd8a37
-
Filesize
47KB
MD544a9a3e400cff80b840afdf738e15e37
SHA1e5eb4c31c730ceb52da30f8665466fbe7574265c
SHA256d761144b3ede474222ef89a99179ce1ab88eee65cb54197a6d9c22706dc0cb15
SHA5123243068c0b480cf191734206cd5dc719075b89a26bdcd093377b3ba45965fe6a1a9859b0953cdb7712b210022e63ec6e0afe2e119378539c011020f7ddfd8a37
-
Filesize
47KB
MD544a9a3e400cff80b840afdf738e15e37
SHA1e5eb4c31c730ceb52da30f8665466fbe7574265c
SHA256d761144b3ede474222ef89a99179ce1ab88eee65cb54197a6d9c22706dc0cb15
SHA5123243068c0b480cf191734206cd5dc719075b89a26bdcd093377b3ba45965fe6a1a9859b0953cdb7712b210022e63ec6e0afe2e119378539c011020f7ddfd8a37