Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 12:42

General

  • Target

    7cc0adc3e5901de13af13530fe7f12e8dc9b02f6a68072f170e89dce06dd11d7.exe

  • Size

    5.9MB

  • MD5

    2fbc0174ff722d1f00707e6a27e5dd80

  • SHA1

    8a659170031f322b219281a4cc3ed6d47c3aee75

  • SHA256

    7cc0adc3e5901de13af13530fe7f12e8dc9b02f6a68072f170e89dce06dd11d7

  • SHA512

    c9f88b2cc414465badfb40e27c30c6eddc41311967e0c9ff10fba7fdf2b6cb777aa439cd55472383b51b88cd3c501b8c820ad591015d490910e6e1fdcdd48c2b

  • SSDEEP

    49152:hYK3LcULK7n6FHbkDO8nqqh3vZuCRWDovqxXXGqQIBJotMMDqUSGm2td3r7EdUFe:8kyDNCWCEM+m2L7D30X2ys

Malware Config

Extracted

Family

xtremerat

C2

google1.no-ip.biz

Signatures

  • Detect XtremeRAT payload 8 IoCs
  • XtremeRAT

    The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

  • Executes dropped EXE 3 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7cc0adc3e5901de13af13530fe7f12e8dc9b02f6a68072f170e89dce06dd11d7.exe
    "C:\Users\Admin\AppData\Local\Temp\7cc0adc3e5901de13af13530fe7f12e8dc9b02f6a68072f170e89dce06dd11d7.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2532
    • C:\Users\Admin\AppData\Local\Temp\VJumberSetup.exe
      "C:\Users\Admin\AppData\Local\Temp\VJumberSetup.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:692
      • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe
        "C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe" __IRAOFF:4194154 "__IRAFN:C:\Users\Admin\AppData\Local\Temp\VJumberSetup.exe" "__IRCT:0" "__IRTSS:0" "__IRSID:S-1-5-21-929662420-1054238289-2961194603-1000"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:2872
    • C:\Users\Admin\AppData\Local\Temp\system.exe
      "C:\Users\Admin\AppData\Local\Temp\system.exe"
      2⤵
      • Executes dropped EXE
      • Modifies Installed Components in the registry
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:3776
      • C:\Windows\SysWOW64\svchost.exe
        svchost.exe
        3⤵
        • Modifies Installed Components in the registry
        • Adds Run key to start application
        PID:1404
      • C:\Windows\SysWOW64\notepad.exe
        notepad.exe
        3⤵
          PID:224
        • C:\Windows\SysWOW64\notepad.exe
          notepad.exe
          3⤵
            PID:3640
          • C:\Windows\SysWOW64\notepad.exe
            notepad.exe
            3⤵
              PID:4164
            • C:\Windows\SysWOW64\notepad.exe
              notepad.exe
              3⤵
              • Suspicious use of SetWindowsHookEx
              PID:3368
            • C:\Windows\SysWOW64\notepad.exe
              notepad.exe
              3⤵
                PID:944

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\VJumberSetup.exe

            Filesize

            5.8MB

            MD5

            248ab47aff96773445d3589eb9bbd9ce

            SHA1

            16afa04e49dfb2fea335ce66da3de7230ea14bbd

            SHA256

            98dac979c01fb0c200a9c82e20872d1138f8e62b4151c05c9ab2423c29747dbb

            SHA512

            46300f099df863a723c25c8c484828e1bb45034de3005ca56912c4ad78d89dc906467a08d98b95494ae889a07916b8686508f2bbeab9f40d198a8b93501d3ddd

          • C:\Users\Admin\AppData\Local\Temp\VJumberSetup.exe

            Filesize

            5.8MB

            MD5

            248ab47aff96773445d3589eb9bbd9ce

            SHA1

            16afa04e49dfb2fea335ce66da3de7230ea14bbd

            SHA256

            98dac979c01fb0c200a9c82e20872d1138f8e62b4151c05c9ab2423c29747dbb

            SHA512

            46300f099df863a723c25c8c484828e1bb45034de3005ca56912c4ad78d89dc906467a08d98b95494ae889a07916b8686508f2bbeab9f40d198a8b93501d3ddd

          • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe

            Filesize

            3.6MB

            MD5

            327eac1760485bcab9fc8cef7abe91ea

            SHA1

            145f718b571f036cdce1b6640e433b82f1503080

            SHA256

            9858685973ad1f5bde10121501fb6ca38928a1c0249659be12384907c2f2592f

            SHA512

            47e1a9fc0d4f39d75c99f23823eec563a18b9d9932e4567f17e80748c8e6aafb19549f344f9183045c58f6ff131a3af3304cfc91ad945054209b3a4a43821703

          • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe

            Filesize

            3.6MB

            MD5

            327eac1760485bcab9fc8cef7abe91ea

            SHA1

            145f718b571f036cdce1b6640e433b82f1503080

            SHA256

            9858685973ad1f5bde10121501fb6ca38928a1c0249659be12384907c2f2592f

            SHA512

            47e1a9fc0d4f39d75c99f23823eec563a18b9d9932e4567f17e80748c8e6aafb19549f344f9183045c58f6ff131a3af3304cfc91ad945054209b3a4a43821703

          • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.skin

            Filesize

            301KB

            MD5

            1621ee6eb5d4a7d213ffcc01834c8c86

            SHA1

            2b43e5476ba8b9c2609f8c436f481032179898b2

            SHA256

            80c3fa63c42043e1cd9baecb8fd1fb524ba7850eb02df4cc3500f70a88b24c2b

            SHA512

            9ef40d5f1ac2c529f7a8f6c4582e30e8792da6dbdfb59ce48b8990fd8ebac734ad453bde5d668d9dd40688eb589a7d612857a45e62efddb3e072f1a1d5214634

          • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.skin

            Filesize

            301KB

            MD5

            1621ee6eb5d4a7d213ffcc01834c8c86

            SHA1

            2b43e5476ba8b9c2609f8c436f481032179898b2

            SHA256

            80c3fa63c42043e1cd9baecb8fd1fb524ba7850eb02df4cc3500f70a88b24c2b

            SHA512

            9ef40d5f1ac2c529f7a8f6c4582e30e8792da6dbdfb59ce48b8990fd8ebac734ad453bde5d668d9dd40688eb589a7d612857a45e62efddb3e072f1a1d5214634

          • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\lua5.1.dll

            Filesize

            318KB

            MD5

            4bcce2f6581bb46564155f3576028987

            SHA1

            5d24976dfc30d5fe09c7de1a4617cea3543296d4

            SHA256

            94deef0a6a60213b3020334aede2eb5c7aa39286833a6699f8fd439c7cce63cf

            SHA512

            a66f61a8a45c3086f48333891fb3f91535b1361c1c0dd196c91b56c89abdcbbc1d515d2c38e09a023a3845a93ac199871a2ef2fc4b5b72d96a529cbfd58bb76d

          • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\lua5.1.dll

            Filesize

            318KB

            MD5

            4bcce2f6581bb46564155f3576028987

            SHA1

            5d24976dfc30d5fe09c7de1a4617cea3543296d4

            SHA256

            94deef0a6a60213b3020334aede2eb5c7aa39286833a6699f8fd439c7cce63cf

            SHA512

            a66f61a8a45c3086f48333891fb3f91535b1361c1c0dd196c91b56c89abdcbbc1d515d2c38e09a023a3845a93ac199871a2ef2fc4b5b72d96a529cbfd58bb76d

          • C:\Users\Admin\AppData\Local\Temp\system.exe

            Filesize

            47KB

            MD5

            44a9a3e400cff80b840afdf738e15e37

            SHA1

            e5eb4c31c730ceb52da30f8665466fbe7574265c

            SHA256

            d761144b3ede474222ef89a99179ce1ab88eee65cb54197a6d9c22706dc0cb15

            SHA512

            3243068c0b480cf191734206cd5dc719075b89a26bdcd093377b3ba45965fe6a1a9859b0953cdb7712b210022e63ec6e0afe2e119378539c011020f7ddfd8a37

          • C:\Users\Admin\AppData\Local\Temp\system.exe

            Filesize

            47KB

            MD5

            44a9a3e400cff80b840afdf738e15e37

            SHA1

            e5eb4c31c730ceb52da30f8665466fbe7574265c

            SHA256

            d761144b3ede474222ef89a99179ce1ab88eee65cb54197a6d9c22706dc0cb15

            SHA512

            3243068c0b480cf191734206cd5dc719075b89a26bdcd093377b3ba45965fe6a1a9859b0953cdb7712b210022e63ec6e0afe2e119378539c011020f7ddfd8a37

          • C:\Windows\SysWOW64\Logs\system.exe

            Filesize

            47KB

            MD5

            44a9a3e400cff80b840afdf738e15e37

            SHA1

            e5eb4c31c730ceb52da30f8665466fbe7574265c

            SHA256

            d761144b3ede474222ef89a99179ce1ab88eee65cb54197a6d9c22706dc0cb15

            SHA512

            3243068c0b480cf191734206cd5dc719075b89a26bdcd093377b3ba45965fe6a1a9859b0953cdb7712b210022e63ec6e0afe2e119378539c011020f7ddfd8a37

          • memory/692-132-0x0000000000000000-mapping.dmp

          • memory/1404-138-0x0000000000000000-mapping.dmp

          • memory/1404-145-0x0000000000C80000-0x0000000000C94000-memory.dmp

            Filesize

            80KB

          • memory/2872-173-0x0000000000100000-0x00000000004BC000-memory.dmp

            Filesize

            3.7MB

          • memory/2872-181-0x00000000761F0000-0x00000000762CC000-memory.dmp

            Filesize

            880KB

          • memory/2872-140-0x0000000000000000-mapping.dmp

          • memory/2872-149-0x0000000010000000-0x0000000010053000-memory.dmp

            Filesize

            332KB

          • memory/2872-150-0x0000000000100000-0x00000000004BC000-memory.dmp

            Filesize

            3.7MB

          • memory/2872-152-0x0000000073FE0000-0x000000007400C000-memory.dmp

            Filesize

            176KB

          • memory/2872-151-0x0000000077950000-0x00000000779CA000-memory.dmp

            Filesize

            488KB

          • memory/2872-154-0x0000000077950000-0x00000000779CA000-memory.dmp

            Filesize

            488KB

          • memory/2872-155-0x0000000000100000-0x00000000004BC000-memory.dmp

            Filesize

            3.7MB

          • memory/2872-213-0x0000000073DF0000-0x0000000073F59000-memory.dmp

            Filesize

            1.4MB

          • memory/2872-157-0x0000000077950000-0x00000000779CA000-memory.dmp

            Filesize

            488KB

          • memory/2872-158-0x0000000077230000-0x0000000077255000-memory.dmp

            Filesize

            148KB

          • memory/2872-153-0x0000000000100000-0x00000000004BC000-memory.dmp

            Filesize

            3.7MB

          • memory/2872-159-0x0000000073FE0000-0x000000007400C000-memory.dmp

            Filesize

            176KB

          • memory/2872-160-0x0000000000100000-0x00000000004BC000-memory.dmp

            Filesize

            3.7MB

          • memory/2872-161-0x0000000077950000-0x00000000779CA000-memory.dmp

            Filesize

            488KB

          • memory/2872-162-0x0000000077230000-0x0000000077255000-memory.dmp

            Filesize

            148KB

          • memory/2872-163-0x0000000010000000-0x0000000010053000-memory.dmp

            Filesize

            332KB

          • memory/2872-164-0x0000000073FE0000-0x000000007400C000-memory.dmp

            Filesize

            176KB

          • memory/2872-165-0x0000000000100000-0x00000000004BC000-memory.dmp

            Filesize

            3.7MB

          • memory/2872-166-0x0000000010000000-0x0000000010053000-memory.dmp

            Filesize

            332KB

          • memory/2872-167-0x0000000000100000-0x00000000004BC000-memory.dmp

            Filesize

            3.7MB

          • memory/2872-168-0x0000000077230000-0x0000000077255000-memory.dmp

            Filesize

            148KB

          • memory/2872-170-0x0000000000100000-0x00000000004BC000-memory.dmp

            Filesize

            3.7MB

          • memory/2872-171-0x00000000760D0000-0x00000000761F0000-memory.dmp

            Filesize

            1.1MB

          • memory/2872-212-0x0000000074010000-0x0000000074220000-memory.dmp

            Filesize

            2.1MB

          • memory/2872-172-0x0000000077930000-0x0000000077949000-memory.dmp

            Filesize

            100KB

          • memory/2872-211-0x0000000073FE0000-0x000000007400C000-memory.dmp

            Filesize

            176KB

          • memory/2872-174-0x0000000075D80000-0x0000000075E2F000-memory.dmp

            Filesize

            700KB

          • memory/2872-175-0x0000000076660000-0x0000000076C13000-memory.dmp

            Filesize

            5.7MB

          • memory/2872-176-0x0000000076C30000-0x0000000076D13000-memory.dmp

            Filesize

            908KB

          • memory/2872-177-0x0000000073FE0000-0x000000007400C000-memory.dmp

            Filesize

            176KB

          • memory/2872-178-0x0000000074010000-0x0000000074220000-memory.dmp

            Filesize

            2.1MB

          • memory/2872-179-0x0000000073DF0000-0x0000000073F59000-memory.dmp

            Filesize

            1.4MB

          • memory/2872-180-0x0000000000100000-0x00000000004BC000-memory.dmp

            Filesize

            3.7MB

          • memory/2872-148-0x0000000077950000-0x00000000779CA000-memory.dmp

            Filesize

            488KB

          • memory/2872-182-0x0000000075D80000-0x0000000075E2F000-memory.dmp

            Filesize

            700KB

          • memory/2872-183-0x0000000076660000-0x0000000076C13000-memory.dmp

            Filesize

            5.7MB

          • memory/2872-184-0x0000000076C30000-0x0000000076D13000-memory.dmp

            Filesize

            908KB

          • memory/2872-186-0x0000000074010000-0x0000000074220000-memory.dmp

            Filesize

            2.1MB

          • memory/2872-185-0x0000000073FE0000-0x000000007400C000-memory.dmp

            Filesize

            176KB

          • memory/2872-187-0x0000000073DF0000-0x0000000073F59000-memory.dmp

            Filesize

            1.4MB

          • memory/2872-188-0x0000000075390000-0x0000000075404000-memory.dmp

            Filesize

            464KB

          • memory/2872-189-0x0000000000100000-0x00000000004BC000-memory.dmp

            Filesize

            3.7MB

          • memory/2872-190-0x0000000075D80000-0x0000000075E2F000-memory.dmp

            Filesize

            700KB

          • memory/2872-191-0x0000000076660000-0x0000000076C13000-memory.dmp

            Filesize

            5.7MB

          • memory/2872-192-0x0000000074010000-0x0000000074220000-memory.dmp

            Filesize

            2.1MB

          • memory/2872-193-0x0000000075390000-0x0000000075404000-memory.dmp

            Filesize

            464KB

          • memory/2872-194-0x0000000000100000-0x00000000004BC000-memory.dmp

            Filesize

            3.7MB

          • memory/2872-195-0x0000000075D80000-0x0000000075E2F000-memory.dmp

            Filesize

            700KB

          • memory/2872-197-0x0000000077230000-0x0000000077255000-memory.dmp

            Filesize

            148KB

          • memory/2872-198-0x0000000074010000-0x0000000074220000-memory.dmp

            Filesize

            2.1MB

          • memory/2872-196-0x0000000076660000-0x0000000076C13000-memory.dmp

            Filesize

            5.7MB

          • memory/2872-199-0x0000000075390000-0x0000000075404000-memory.dmp

            Filesize

            464KB

          • memory/2872-200-0x0000000000100000-0x00000000004BC000-memory.dmp

            Filesize

            3.7MB

          • memory/2872-201-0x0000000075D80000-0x0000000075E2F000-memory.dmp

            Filesize

            700KB

          • memory/2872-203-0x0000000073FE0000-0x000000007400C000-memory.dmp

            Filesize

            176KB

          • memory/2872-202-0x0000000076660000-0x0000000076C13000-memory.dmp

            Filesize

            5.7MB

          • memory/2872-205-0x0000000075390000-0x0000000075404000-memory.dmp

            Filesize

            464KB

          • memory/2872-204-0x0000000074010000-0x0000000074220000-memory.dmp

            Filesize

            2.1MB

          • memory/2872-206-0x0000000000100000-0x00000000004BC000-memory.dmp

            Filesize

            3.7MB

          • memory/2872-208-0x0000000075D80000-0x0000000075E2F000-memory.dmp

            Filesize

            700KB

          • memory/2872-207-0x00000000761F0000-0x00000000762CC000-memory.dmp

            Filesize

            880KB

          • memory/2872-209-0x0000000076660000-0x0000000076C13000-memory.dmp

            Filesize

            5.7MB

          • memory/2872-210-0x0000000076C30000-0x0000000076D13000-memory.dmp

            Filesize

            908KB

          • memory/3368-169-0x0000000000C80000-0x0000000000C94000-memory.dmp

            Filesize

            80KB

          • memory/3368-156-0x0000000000000000-mapping.dmp

          • memory/3368-395-0x0000000000C80000-0x0000000000C94000-memory.dmp

            Filesize

            80KB

          • memory/3776-135-0x0000000000000000-mapping.dmp