Analysis
-
max time kernel
143s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 05:38
Behavioral task
behavioral1
Sample
ba291652d57976cc0067e7a45710c2d89d839e59c86adcf678f51a4fade0680b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ba291652d57976cc0067e7a45710c2d89d839e59c86adcf678f51a4fade0680b.exe
Resource
win10v2004-20220812-en
General
-
Target
ba291652d57976cc0067e7a45710c2d89d839e59c86adcf678f51a4fade0680b.exe
-
Size
40KB
-
MD5
91653cf6fa863395ec63c1edee0258ef
-
SHA1
7ba7adc45b19b40c3715d3f23c846fd4a1441b37
-
SHA256
ba291652d57976cc0067e7a45710c2d89d839e59c86adcf678f51a4fade0680b
-
SHA512
0ce375f2ac766bc6de05d6664a1688f5f7409d463b4c734d9fb33e71fe4139e842fd9c491b5ad0ecd13fe20f74a9208cea8eac351744ae5a6a1a78532486ada3
-
SSDEEP
768:PE9hghdN12Ozhiow2Gkm6+cX/pBzNBwIldGzok:Pu+zMOlw2GkmSX/Bldaok
Malware Config
Signatures
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\InstallDir\Server.exe ba291652d57976cc0067e7a45710c2d89d839e59c86adcf678f51a4fade0680b.exe File created C:\Windows\InstallDir\Server.exe ba291652d57976cc0067e7a45710c2d89d839e59c86adcf678f51a4fade0680b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 780 ba291652d57976cc0067e7a45710c2d89d839e59c86adcf678f51a4fade0680b.exe