Analysis

  • max time kernel
    190s
  • max time network
    231s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2022, 18:02

General

  • Target

    be503c9bd2a7e92c88049fbb0b662829472590b7381c44c53b60542d8646cd81.exe

  • Size

    752KB

  • MD5

    4112338bfece3d6750dfca05ff43f061

  • SHA1

    47dc0a5d8e3d451a0e89114b5539853691cd1108

  • SHA256

    be503c9bd2a7e92c88049fbb0b662829472590b7381c44c53b60542d8646cd81

  • SHA512

    5692e0d9daedfc8499a1284720558deabe03cfaa551c4df278809ae9424d41750dd8fcd8cd52078e0d71a29297ac171bbf19de13677e2e5bdad6750fb76481c5

  • SSDEEP

    12288:mkWAehJuqTtszUqKKnW0UvttLbp2YYPouUlGw1/EuaTP0JwV+G2rwhvihEw7Oifg:mkWAAuq5sz3BnR6zgYYPouUlGwhqQwEa

Malware Config

Extracted

Family

xtremerat

C2

harem.zapto.org

Signatures

  • Detect XtremeRAT payload 3 IoCs
  • XtremeRAT

    The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

  • Executes dropped EXE 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\be503c9bd2a7e92c88049fbb0b662829472590b7381c44c53b60542d8646cd81.exe
    "C:\Users\Admin\AppData\Local\Temp\be503c9bd2a7e92c88049fbb0b662829472590b7381c44c53b60542d8646cd81.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4212
    • C:\Users\Admin\AppData\Local\Temp\qawa.exe
      "C:\Users\Admin\AppData\Local\Temp\qawa.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:224
      • C:\Users\Admin\AppData\Local\Temp\server.exe
        "C:\Users\Admin\AppData\Local\Temp\server.exe" cd$
        3⤵
        • Executes dropped EXE
        • Modifies Installed Components in the registry
        • Adds Run key to start application
        • Drops file in System32 directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3124
        • C:\Windows\SysWOW64\svchost.exe
          svchost.exe
          4⤵
            PID:3732
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3732 -s 504
              5⤵
              • Program crash
              PID:3980
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3732 -s 512
              5⤵
              • Program crash
              PID:1116
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x370 0x374
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2436
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3732 -ip 3732
      1⤵
        PID:4412
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3732 -ip 3732
        1⤵
          PID:2616

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\qawa.exe

          Filesize

          549KB

          MD5

          7f0f33b361bf1b35e32e8fa2ac1abdfd

          SHA1

          b1e547b8595296b1958e7c2ce5e23446038fb1f1

          SHA256

          ad1c3fc784175994dfbf050e0358c46e61ecf5a64e64404f54bc806f4b0289f6

          SHA512

          8bb7d9b4f6b7678bbf6c779950d33a67d4e7161d3ddf1b3dc3d502a2ebd6debe75375331c7bf207f6633a0a507608f4adb755a66aebe6a8ed46b55614c7a4519

        • C:\Users\Admin\AppData\Local\Temp\qawa.exe

          Filesize

          549KB

          MD5

          7f0f33b361bf1b35e32e8fa2ac1abdfd

          SHA1

          b1e547b8595296b1958e7c2ce5e23446038fb1f1

          SHA256

          ad1c3fc784175994dfbf050e0358c46e61ecf5a64e64404f54bc806f4b0289f6

          SHA512

          8bb7d9b4f6b7678bbf6c779950d33a67d4e7161d3ddf1b3dc3d502a2ebd6debe75375331c7bf207f6633a0a507608f4adb755a66aebe6a8ed46b55614c7a4519

        • C:\Users\Admin\AppData\Local\Temp\server.exe

          Filesize

          33KB

          MD5

          6584ed4d4c8f69ba710b148b1c161b45

          SHA1

          74a4ed8ed90f18554968516a0399adb8f1930025

          SHA256

          67f781c9fcb71fc27986a478e1a683a626eaa36e52c8659b6354734d4df6c6ef

          SHA512

          797f471cda9682db2689cc8cbe8f172df046caffa967134e841c03a4be4e62c4094a37fa4ef3490939c4aacd3eee358f78e1a6e099e6bc8c983fc9fa98dcfcc2

        • C:\Users\Admin\AppData\Local\Temp\server.exe

          Filesize

          33KB

          MD5

          6584ed4d4c8f69ba710b148b1c161b45

          SHA1

          74a4ed8ed90f18554968516a0399adb8f1930025

          SHA256

          67f781c9fcb71fc27986a478e1a683a626eaa36e52c8659b6354734d4df6c6ef

          SHA512

          797f471cda9682db2689cc8cbe8f172df046caffa967134e841c03a4be4e62c4094a37fa4ef3490939c4aacd3eee358f78e1a6e099e6bc8c983fc9fa98dcfcc2

        • memory/224-136-0x0000000000400000-0x0000000000596000-memory.dmp

          Filesize

          1.6MB

        • memory/3124-140-0x0000000010000000-0x000000001004D000-memory.dmp

          Filesize

          308KB

        • memory/3732-142-0x0000000010000000-0x000000001004D000-memory.dmp

          Filesize

          308KB

        • memory/3732-143-0x0000000010000000-0x000000001004D000-memory.dmp

          Filesize

          308KB