Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2022 12:27

General

  • Target

    91c3880df0e705b267c198f4f15ba593a67db1f590f768e0b5b6176d3ce91b15.exe

  • Size

    119KB

  • MD5

    6a28e5d59704120b1fed4a972d7ad56e

  • SHA1

    e3dba778f11929b8616e45f2028b59052931e4cd

  • SHA256

    91c3880df0e705b267c198f4f15ba593a67db1f590f768e0b5b6176d3ce91b15

  • SHA512

    28d5a459224f22415ff161bd639327a5af040ac023ef0d8d0d73789f1d793dc1b1f436f5be149882a04364d7556a0c3ed17a7bc7e92b38464e6d8ed6f6bb3c85

  • SSDEEP

    1536:pgZut8Y0mh2VAaasBMfjrzpGUqVKpkhzRMecpqx+cnzkZ/qGjtc6B73Gdp+tIVRl:pQut/dzzpfqukhzvHkZ/qovBjG6gRl

Malware Config

Extracted

Family

xtremerat

C2

tsw.no-ip.biz

Signatures

  • Detect XtremeRAT payload 11 IoCs
  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • XtremeRAT

    The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Executes dropped EXE 5 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\91c3880df0e705b267c198f4f15ba593a67db1f590f768e0b5b6176d3ce91b15.exe
    "C:\Users\Admin\AppData\Local\Temp\91c3880df0e705b267c198f4f15ba593a67db1f590f768e0b5b6176d3ce91b15.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"
      2⤵
      • Executes dropped EXE
      • Deletes itself
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:984
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1188
      • C:\Users\Admin\AppData\Local\Temp\System\audioadg.exe
        "C:\Users\Admin\AppData\Local\Temp\System\audioadg.exe"
        3⤵
        • Adds policy Run key to start application
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1792
        • C:\Users\Admin\AppData\Local\Temp\System\Wmiprwsd.exe
          C:\Users\Admin\AppData\Local\Temp\System\Wmiprwsd.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:384
          • C:\Users\Admin\AppData\Local\Temp\System\Wmiprwsd.exe
            C:\Users\Admin\AppData\Local\Temp\System\Wmiprwsd.exe
            5⤵
            • Executes dropped EXE
            PID:1072

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\SysInfo.txt
    Filesize

    102B

    MD5

    8904b1262dd68fb84b689fc763abdd2a

    SHA1

    ccfda0d01fc656fbe3e356d7c24c1c25422ff9aa

    SHA256

    1c5a7073fb1eb3988a6ef165e2fa49df1d0096e251987abcd9d32d1aa65db821

    SHA512

    5552c83c38d045952d2b690b06e9d6abea48f8e8b451e3f9eac9737d8c1f3bca75c4449e1766c77ff12f1cc56adf04cf86fc168716ef747f8f65e5940f8066a9

  • C:\Users\Admin\AppData\Local\Temp\System\Wmiprwsd.exe
    Filesize

    119KB

    MD5

    6a28e5d59704120b1fed4a972d7ad56e

    SHA1

    e3dba778f11929b8616e45f2028b59052931e4cd

    SHA256

    91c3880df0e705b267c198f4f15ba593a67db1f590f768e0b5b6176d3ce91b15

    SHA512

    28d5a459224f22415ff161bd639327a5af040ac023ef0d8d0d73789f1d793dc1b1f436f5be149882a04364d7556a0c3ed17a7bc7e92b38464e6d8ed6f6bb3c85

  • C:\Users\Admin\AppData\Local\Temp\System\Wmiprwsd.exe
    Filesize

    119KB

    MD5

    6a28e5d59704120b1fed4a972d7ad56e

    SHA1

    e3dba778f11929b8616e45f2028b59052931e4cd

    SHA256

    91c3880df0e705b267c198f4f15ba593a67db1f590f768e0b5b6176d3ce91b15

    SHA512

    28d5a459224f22415ff161bd639327a5af040ac023ef0d8d0d73789f1d793dc1b1f436f5be149882a04364d7556a0c3ed17a7bc7e92b38464e6d8ed6f6bb3c85

  • C:\Users\Admin\AppData\Local\Temp\System\Wmiprwsd.exe
    Filesize

    119KB

    MD5

    6a28e5d59704120b1fed4a972d7ad56e

    SHA1

    e3dba778f11929b8616e45f2028b59052931e4cd

    SHA256

    91c3880df0e705b267c198f4f15ba593a67db1f590f768e0b5b6176d3ce91b15

    SHA512

    28d5a459224f22415ff161bd639327a5af040ac023ef0d8d0d73789f1d793dc1b1f436f5be149882a04364d7556a0c3ed17a7bc7e92b38464e6d8ed6f6bb3c85

  • C:\Users\Admin\AppData\Local\Temp\System\audioadg.exe
    Filesize

    11KB

    MD5

    1f9234338e847b29201862570c2a2a93

    SHA1

    8ed760481ce31b5d46ea85c9a44e8a3087dd2026

    SHA256

    5ce7899fc7539800b70a5e90254cf5b087f955f33bf30da909611e1ff9b009b7

    SHA512

    54ba3dff6d448a6f8298f3f58b0ef085a15a9e829ae54cd85c8643168314f9ccdb206a7ca0ceb82951b3d04d6b7134662c3c382304942d3caeee15267520ef65

  • C:\Users\Admin\AppData\Local\Temp\System\audioadg.exe
    Filesize

    11KB

    MD5

    1f9234338e847b29201862570c2a2a93

    SHA1

    8ed760481ce31b5d46ea85c9a44e8a3087dd2026

    SHA256

    5ce7899fc7539800b70a5e90254cf5b087f955f33bf30da909611e1ff9b009b7

    SHA512

    54ba3dff6d448a6f8298f3f58b0ef085a15a9e829ae54cd85c8643168314f9ccdb206a7ca0ceb82951b3d04d6b7134662c3c382304942d3caeee15267520ef65

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
    Filesize

    119KB

    MD5

    6a28e5d59704120b1fed4a972d7ad56e

    SHA1

    e3dba778f11929b8616e45f2028b59052931e4cd

    SHA256

    91c3880df0e705b267c198f4f15ba593a67db1f590f768e0b5b6176d3ce91b15

    SHA512

    28d5a459224f22415ff161bd639327a5af040ac023ef0d8d0d73789f1d793dc1b1f436f5be149882a04364d7556a0c3ed17a7bc7e92b38464e6d8ed6f6bb3c85

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
    Filesize

    119KB

    MD5

    6a28e5d59704120b1fed4a972d7ad56e

    SHA1

    e3dba778f11929b8616e45f2028b59052931e4cd

    SHA256

    91c3880df0e705b267c198f4f15ba593a67db1f590f768e0b5b6176d3ce91b15

    SHA512

    28d5a459224f22415ff161bd639327a5af040ac023ef0d8d0d73789f1d793dc1b1f436f5be149882a04364d7556a0c3ed17a7bc7e92b38464e6d8ed6f6bb3c85

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
    Filesize

    119KB

    MD5

    6a28e5d59704120b1fed4a972d7ad56e

    SHA1

    e3dba778f11929b8616e45f2028b59052931e4cd

    SHA256

    91c3880df0e705b267c198f4f15ba593a67db1f590f768e0b5b6176d3ce91b15

    SHA512

    28d5a459224f22415ff161bd639327a5af040ac023ef0d8d0d73789f1d793dc1b1f436f5be149882a04364d7556a0c3ed17a7bc7e92b38464e6d8ed6f6bb3c85

  • \Users\Admin\AppData\Local\Temp\System\Wmiprwsd.exe
    Filesize

    119KB

    MD5

    6a28e5d59704120b1fed4a972d7ad56e

    SHA1

    e3dba778f11929b8616e45f2028b59052931e4cd

    SHA256

    91c3880df0e705b267c198f4f15ba593a67db1f590f768e0b5b6176d3ce91b15

    SHA512

    28d5a459224f22415ff161bd639327a5af040ac023ef0d8d0d73789f1d793dc1b1f436f5be149882a04364d7556a0c3ed17a7bc7e92b38464e6d8ed6f6bb3c85

  • \Users\Admin\AppData\Local\Temp\System\Wmiprwsd.exe
    Filesize

    119KB

    MD5

    6a28e5d59704120b1fed4a972d7ad56e

    SHA1

    e3dba778f11929b8616e45f2028b59052931e4cd

    SHA256

    91c3880df0e705b267c198f4f15ba593a67db1f590f768e0b5b6176d3ce91b15

    SHA512

    28d5a459224f22415ff161bd639327a5af040ac023ef0d8d0d73789f1d793dc1b1f436f5be149882a04364d7556a0c3ed17a7bc7e92b38464e6d8ed6f6bb3c85

  • \Users\Admin\AppData\Local\Temp\System\Wmiprwsd.exe
    Filesize

    119KB

    MD5

    6a28e5d59704120b1fed4a972d7ad56e

    SHA1

    e3dba778f11929b8616e45f2028b59052931e4cd

    SHA256

    91c3880df0e705b267c198f4f15ba593a67db1f590f768e0b5b6176d3ce91b15

    SHA512

    28d5a459224f22415ff161bd639327a5af040ac023ef0d8d0d73789f1d793dc1b1f436f5be149882a04364d7556a0c3ed17a7bc7e92b38464e6d8ed6f6bb3c85

  • \Users\Admin\AppData\Local\Temp\System\audioadg.exe
    Filesize

    11KB

    MD5

    1f9234338e847b29201862570c2a2a93

    SHA1

    8ed760481ce31b5d46ea85c9a44e8a3087dd2026

    SHA256

    5ce7899fc7539800b70a5e90254cf5b087f955f33bf30da909611e1ff9b009b7

    SHA512

    54ba3dff6d448a6f8298f3f58b0ef085a15a9e829ae54cd85c8643168314f9ccdb206a7ca0ceb82951b3d04d6b7134662c3c382304942d3caeee15267520ef65

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
    Filesize

    119KB

    MD5

    6a28e5d59704120b1fed4a972d7ad56e

    SHA1

    e3dba778f11929b8616e45f2028b59052931e4cd

    SHA256

    91c3880df0e705b267c198f4f15ba593a67db1f590f768e0b5b6176d3ce91b15

    SHA512

    28d5a459224f22415ff161bd639327a5af040ac023ef0d8d0d73789f1d793dc1b1f436f5be149882a04364d7556a0c3ed17a7bc7e92b38464e6d8ed6f6bb3c85

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
    Filesize

    119KB

    MD5

    6a28e5d59704120b1fed4a972d7ad56e

    SHA1

    e3dba778f11929b8616e45f2028b59052931e4cd

    SHA256

    91c3880df0e705b267c198f4f15ba593a67db1f590f768e0b5b6176d3ce91b15

    SHA512

    28d5a459224f22415ff161bd639327a5af040ac023ef0d8d0d73789f1d793dc1b1f436f5be149882a04364d7556a0c3ed17a7bc7e92b38464e6d8ed6f6bb3c85

  • memory/384-109-0x00000000744F0000-0x0000000074A9B000-memory.dmp
    Filesize

    5.7MB

  • memory/384-88-0x0000000000000000-mapping.dmp
  • memory/384-112-0x00000000744F0000-0x0000000074A9B000-memory.dmp
    Filesize

    5.7MB

  • memory/984-71-0x00000000744F0000-0x0000000074A9B000-memory.dmp
    Filesize

    5.7MB

  • memory/984-58-0x0000000000000000-mapping.dmp
  • memory/984-110-0x00000000744F0000-0x0000000074A9B000-memory.dmp
    Filesize

    5.7MB

  • memory/1072-102-0x000000001000D0F4-mapping.dmp
  • memory/1072-107-0x0000000010001000-0x000000001000E000-memory.dmp
    Filesize

    52KB

  • memory/1188-72-0x0000000010000000-0x000000001004A000-memory.dmp
    Filesize

    296KB

  • memory/1188-81-0x0000000010000000-0x000000001004A000-memory.dmp
    Filesize

    296KB

  • memory/1188-79-0x0000000010000000-0x000000001004A000-memory.dmp
    Filesize

    296KB

  • memory/1188-73-0x0000000010000000-0x000000001004A000-memory.dmp
    Filesize

    296KB

  • memory/1188-77-0x000000001000D0F4-mapping.dmp
  • memory/1188-76-0x0000000010000000-0x000000001004A000-memory.dmp
    Filesize

    296KB

  • memory/1188-74-0x0000000010000000-0x000000001004A000-memory.dmp
    Filesize

    296KB

  • memory/1188-70-0x0000000010000000-0x000000001004A000-memory.dmp
    Filesize

    296KB

  • memory/1188-69-0x0000000010000000-0x000000001004A000-memory.dmp
    Filesize

    296KB

  • memory/1188-67-0x0000000010000000-0x000000001004A000-memory.dmp
    Filesize

    296KB

  • memory/1188-66-0x0000000010000000-0x000000001004A000-memory.dmp
    Filesize

    296KB

  • memory/1720-55-0x00000000744F0000-0x0000000074A9B000-memory.dmp
    Filesize

    5.7MB

  • memory/1720-54-0x0000000075BD1000-0x0000000075BD3000-memory.dmp
    Filesize

    8KB

  • memory/1720-64-0x00000000744F0000-0x0000000074A9B000-memory.dmp
    Filesize

    5.7MB

  • memory/1792-108-0x00000000744F0000-0x0000000074A9B000-memory.dmp
    Filesize

    5.7MB

  • memory/1792-83-0x0000000000000000-mapping.dmp
  • memory/1792-111-0x00000000744F0000-0x0000000074A9B000-memory.dmp
    Filesize

    5.7MB