Analysis

  • max time kernel
    187s
  • max time network
    240s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2022 18:03

General

  • Target

    f7e7d14fcd61ed9738bf247f1bf6a4b18c4f5e604d5701e70308a392650becd3.exe

  • Size

    172KB

  • MD5

    d7763589f710a8aab4d2dd419b40ae97

  • SHA1

    938c534051a7b99b1d1361f6a9f173de59477538

  • SHA256

    f7e7d14fcd61ed9738bf247f1bf6a4b18c4f5e604d5701e70308a392650becd3

  • SHA512

    72a15cfe59a27320b27d76f6541ce0a43d5d11365078c85ea5b8af4b005021be59ac293190ec47aab3c15288ad852a5fb931d772421852e87c63a78569772cff

  • SSDEEP

    3072:EEkzZTipDXMb3YJ2mT6K/+QVkeYEd7ZzkrcUpiynGNLmIXqThML:EzTips62izDkeYEHkcUpELmIX8hM

Malware Config

Signatures

  • Detect XtremeRAT payload 3 IoCs
  • XtremeRAT

    The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f7e7d14fcd61ed9738bf247f1bf6a4b18c4f5e604d5701e70308a392650becd3.exe
    "C:\Users\Admin\AppData\Local\Temp\f7e7d14fcd61ed9738bf247f1bf6a4b18c4f5e604d5701e70308a392650becd3.exe"
    1⤵
      PID:3396

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3396-132-0x0000000010000000-0x000000001004C000-memory.dmp

      Filesize

      304KB

    • memory/3396-134-0x0000000001FF0000-0x0000000001FF4000-memory.dmp

      Filesize

      16KB

    • memory/3396-133-0x0000000010000000-0x000000001004C000-memory.dmp

      Filesize

      304KB

    • memory/3396-135-0x0000000002030000-0x0000000002069000-memory.dmp

      Filesize

      228KB

    • memory/3396-136-0x0000000010000000-0x000000001004C000-memory.dmp

      Filesize

      304KB

    • memory/3396-137-0x0000000002030000-0x0000000002069000-memory.dmp

      Filesize

      228KB

    • memory/3396-138-0x0000000010000000-0x000000001004C000-memory.dmp

      Filesize

      304KB