Analysis

  • max time kernel
    143s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 05:38

General

  • Target

    ba291652d57976cc0067e7a45710c2d89d839e59c86adcf678f51a4fade0680b.exe

  • Size

    40KB

  • MD5

    91653cf6fa863395ec63c1edee0258ef

  • SHA1

    7ba7adc45b19b40c3715d3f23c846fd4a1441b37

  • SHA256

    ba291652d57976cc0067e7a45710c2d89d839e59c86adcf678f51a4fade0680b

  • SHA512

    0ce375f2ac766bc6de05d6664a1688f5f7409d463b4c734d9fb33e71fe4139e842fd9c491b5ad0ecd13fe20f74a9208cea8eac351744ae5a6a1a78532486ada3

  • SSDEEP

    768:PE9hghdN12Ozhiow2Gkm6+cX/pBzNBwIldGzok:Pu+zMOlw2GkmSX/Bldaok

Malware Config

Signatures

  • XtremeRAT

    The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ba291652d57976cc0067e7a45710c2d89d839e59c86adcf678f51a4fade0680b.exe
    "C:\Users\Admin\AppData\Local\Temp\ba291652d57976cc0067e7a45710c2d89d839e59c86adcf678f51a4fade0680b.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    PID:780

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/780-54-0x0000000076121000-0x0000000076123000-memory.dmp

    Filesize

    8KB