Analysis
-
max time kernel
190s -
max time network
231s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 18:02
Static task
static1
Behavioral task
behavioral1
Sample
be503c9bd2a7e92c88049fbb0b662829472590b7381c44c53b60542d8646cd81.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
be503c9bd2a7e92c88049fbb0b662829472590b7381c44c53b60542d8646cd81.exe
Resource
win10v2004-20221111-en
General
-
Target
be503c9bd2a7e92c88049fbb0b662829472590b7381c44c53b60542d8646cd81.exe
-
Size
752KB
-
MD5
4112338bfece3d6750dfca05ff43f061
-
SHA1
47dc0a5d8e3d451a0e89114b5539853691cd1108
-
SHA256
be503c9bd2a7e92c88049fbb0b662829472590b7381c44c53b60542d8646cd81
-
SHA512
5692e0d9daedfc8499a1284720558deabe03cfaa551c4df278809ae9424d41750dd8fcd8cd52078e0d71a29297ac171bbf19de13677e2e5bdad6750fb76481c5
-
SSDEEP
12288:mkWAehJuqTtszUqKKnW0UvttLbp2YYPouUlGw1/EuaTP0JwV+G2rwhvihEw7Oifg:mkWAAuq5sz3BnR6zgYYPouUlGwhqQwEa
Malware Config
Extracted
xtremerat
harem.zapto.org
Signatures
-
Detect XtremeRAT payload 3 IoCs
resource yara_rule behavioral2/memory/3732-141-0x0000000000000000-mapping.dmp family_xtremerat behavioral2/memory/3732-142-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/3732-143-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Executes dropped EXE 2 IoCs
pid Process 224 qawa.exe 3124 server.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{52TONPJO-IQM6-J352-4D45-01OX22PP5463} server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{52TONPJO-IQM6-J352-4D45-01OX22PP5463}\StubPath = "C:\\Windows\\system32\\InstallDir\\Server.exe restart" server.exe -
resource yara_rule behavioral2/files/0x00040000000225f8-134.dat upx behavioral2/files/0x00040000000225f8-135.dat upx behavioral2/memory/224-136-0x0000000000400000-0x0000000000596000-memory.dmp upx behavioral2/files/0x0007000000023177-138.dat upx behavioral2/files/0x0007000000023177-139.dat upx behavioral2/memory/3124-140-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/3732-142-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/3732-143-0x0000000010000000-0x000000001004D000-memory.dmp upx -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation be503c9bd2a7e92c88049fbb0b662829472590b7381c44c53b60542d8646cd81.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation qawa.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\InstallDir\\Server.exe" server.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run server.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\InstallDir\\Server.exe" server.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run server.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\InstallDir\Server.exe server.exe File created C:\Windows\SysWOW64\InstallDir\Server.exe server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3980 3732 WerFault.exe 87 1116 3732 WerFault.exe 87 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 224 qawa.exe 224 qawa.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 224 qawa.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2436 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2436 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 224 qawa.exe 224 qawa.exe 3124 server.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4212 wrote to memory of 224 4212 be503c9bd2a7e92c88049fbb0b662829472590b7381c44c53b60542d8646cd81.exe 82 PID 4212 wrote to memory of 224 4212 be503c9bd2a7e92c88049fbb0b662829472590b7381c44c53b60542d8646cd81.exe 82 PID 4212 wrote to memory of 224 4212 be503c9bd2a7e92c88049fbb0b662829472590b7381c44c53b60542d8646cd81.exe 82 PID 224 wrote to memory of 3124 224 qawa.exe 84 PID 224 wrote to memory of 3124 224 qawa.exe 84 PID 224 wrote to memory of 3124 224 qawa.exe 84 PID 3124 wrote to memory of 3732 3124 server.exe 87 PID 3124 wrote to memory of 3732 3124 server.exe 87 PID 3124 wrote to memory of 3732 3124 server.exe 87 PID 3124 wrote to memory of 3732 3124 server.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\be503c9bd2a7e92c88049fbb0b662829472590b7381c44c53b60542d8646cd81.exe"C:\Users\Admin\AppData\Local\Temp\be503c9bd2a7e92c88049fbb0b662829472590b7381c44c53b60542d8646cd81.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\qawa.exe"C:\Users\Admin\AppData\Local\Temp\qawa.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe" cd$3⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵PID:3732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3732 -s 5045⤵
- Program crash
PID:3980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3732 -s 5125⤵
- Program crash
PID:1116
-
-
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x370 0x3741⤵
- Suspicious use of AdjustPrivilegeToken
PID:2436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3732 -ip 37321⤵PID:4412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3732 -ip 37321⤵PID:2616
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
549KB
MD57f0f33b361bf1b35e32e8fa2ac1abdfd
SHA1b1e547b8595296b1958e7c2ce5e23446038fb1f1
SHA256ad1c3fc784175994dfbf050e0358c46e61ecf5a64e64404f54bc806f4b0289f6
SHA5128bb7d9b4f6b7678bbf6c779950d33a67d4e7161d3ddf1b3dc3d502a2ebd6debe75375331c7bf207f6633a0a507608f4adb755a66aebe6a8ed46b55614c7a4519
-
Filesize
549KB
MD57f0f33b361bf1b35e32e8fa2ac1abdfd
SHA1b1e547b8595296b1958e7c2ce5e23446038fb1f1
SHA256ad1c3fc784175994dfbf050e0358c46e61ecf5a64e64404f54bc806f4b0289f6
SHA5128bb7d9b4f6b7678bbf6c779950d33a67d4e7161d3ddf1b3dc3d502a2ebd6debe75375331c7bf207f6633a0a507608f4adb755a66aebe6a8ed46b55614c7a4519
-
Filesize
33KB
MD56584ed4d4c8f69ba710b148b1c161b45
SHA174a4ed8ed90f18554968516a0399adb8f1930025
SHA25667f781c9fcb71fc27986a478e1a683a626eaa36e52c8659b6354734d4df6c6ef
SHA512797f471cda9682db2689cc8cbe8f172df046caffa967134e841c03a4be4e62c4094a37fa4ef3490939c4aacd3eee358f78e1a6e099e6bc8c983fc9fa98dcfcc2
-
Filesize
33KB
MD56584ed4d4c8f69ba710b148b1c161b45
SHA174a4ed8ed90f18554968516a0399adb8f1930025
SHA25667f781c9fcb71fc27986a478e1a683a626eaa36e52c8659b6354734d4df6c6ef
SHA512797f471cda9682db2689cc8cbe8f172df046caffa967134e841c03a4be4e62c4094a37fa4ef3490939c4aacd3eee358f78e1a6e099e6bc8c983fc9fa98dcfcc2