Analysis
-
max time kernel
151s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 23:27
Behavioral task
behavioral1
Sample
94761823818df0f756c26082e55af289d706ea22b927730a8e18aa72393475ee.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
94761823818df0f756c26082e55af289d706ea22b927730a8e18aa72393475ee.exe
Resource
win10v2004-20220812-en
General
-
Target
94761823818df0f756c26082e55af289d706ea22b927730a8e18aa72393475ee.exe
-
Size
430KB
-
MD5
0d825739298426f4fb430778ccf563ec
-
SHA1
503f325e2f13e6a3a8339f78e90a5368b4f4d81f
-
SHA256
94761823818df0f756c26082e55af289d706ea22b927730a8e18aa72393475ee
-
SHA512
1a6c28b7615f6da08afcfd29a5d3db12c758bdb93f008232275d619e821bbca7580fedb017164075860d5c4c3a92fb7dd7d1c35ed2a282ba14ff5b14aa67bf38
-
SSDEEP
12288:f9BvctM85t35JPNJj2WzoRLQYRYzmYs9T6PS0M:fD0tM85tbNJjldeYiYsRZN
Malware Config
Extracted
xtremerat
sasitina.no-ip.org
Signatures
-
Detect XtremeRAT payload 3 IoCs
resource yara_rule behavioral2/memory/4880-137-0x0000000000000000-mapping.dmp family_xtremerat behavioral2/memory/4960-139-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/4880-141-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Executes dropped EXE 1 IoCs
pid Process 4960 Sdat.exe -
resource yara_rule behavioral2/memory/3232-132-0x0000000000400000-0x00000000004B1000-memory.dmp upx behavioral2/memory/3232-133-0x0000000000400000-0x00000000004B1000-memory.dmp upx behavioral2/files/0x0004000000000721-135.dat upx behavioral2/files/0x0004000000000721-136.dat upx behavioral2/memory/4960-139-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/3232-140-0x0000000000400000-0x00000000004B1000-memory.dmp upx behavioral2/memory/4880-141-0x0000000010000000-0x000000001004D000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 94761823818df0f756c26082e55af289d706ea22b927730a8e18aa72393475ee.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/3232-133-0x0000000000400000-0x00000000004B1000-memory.dmp autoit_exe behavioral2/memory/3232-140-0x0000000000400000-0x00000000004B1000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1488 4880 WerFault.exe 83 1940 4880 WerFault.exe 83 -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4380 PING.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3232 wrote to memory of 4960 3232 94761823818df0f756c26082e55af289d706ea22b927730a8e18aa72393475ee.exe 82 PID 3232 wrote to memory of 4960 3232 94761823818df0f756c26082e55af289d706ea22b927730a8e18aa72393475ee.exe 82 PID 3232 wrote to memory of 4960 3232 94761823818df0f756c26082e55af289d706ea22b927730a8e18aa72393475ee.exe 82 PID 4960 wrote to memory of 4880 4960 Sdat.exe 83 PID 4960 wrote to memory of 4880 4960 Sdat.exe 83 PID 4960 wrote to memory of 4880 4960 Sdat.exe 83 PID 4960 wrote to memory of 4880 4960 Sdat.exe 83 PID 4960 wrote to memory of 4780 4960 Sdat.exe 84 PID 4960 wrote to memory of 4780 4960 Sdat.exe 84 PID 3232 wrote to memory of 3128 3232 94761823818df0f756c26082e55af289d706ea22b927730a8e18aa72393475ee.exe 86 PID 3232 wrote to memory of 3128 3232 94761823818df0f756c26082e55af289d706ea22b927730a8e18aa72393475ee.exe 86 PID 3232 wrote to memory of 3128 3232 94761823818df0f756c26082e55af289d706ea22b927730a8e18aa72393475ee.exe 86 PID 4960 wrote to memory of 4780 4960 Sdat.exe 84 PID 3128 wrote to memory of 4380 3128 cmd.exe 89 PID 3128 wrote to memory of 4380 3128 cmd.exe 89 PID 3128 wrote to memory of 4380 3128 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\94761823818df0f756c26082e55af289d706ea22b927730a8e18aa72393475ee.exe"C:\Users\Admin\AppData\Local\Temp\94761823818df0f756c26082e55af289d706ea22b927730a8e18aa72393475ee.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Users\Admin\AppData\Roaming\Sdat.exeC:\Users\Admin\AppData\Roaming\Sdat.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:4880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4880 -s 4884⤵
- Program crash
PID:1488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4880 -s 4964⤵
- Program crash
PID:1940
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4780
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 0.0.0.1 -n 1 -w 1000 & del 94761823818df0f756c26082e55af289d706ea22b927730a8e18aa72393475ee.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Windows\SysWOW64\PING.EXEping 0.0.0.1 -n 1 -w 10003⤵
- Runs ping.exe
PID:4380
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4880 -ip 48801⤵PID:2088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4880 -ip 48801⤵PID:3476
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD59e335df87dca03edc149e087bfc9eccf
SHA1d40d44af505d92edd88960dd11a0dcba845a2d0e
SHA256da40fb78b1340e0bb8a357b09911296b29b4dd444f59e0eeac011fc9840b332f
SHA5126bfb4783189727eec09ae1f5249f4c0de7b69faaf204a6d02e5002ea6a6b0f7d215d9413c13aa6fcd517fc094d071eae2a6956c1f89860631f56418ddc53fe39
-
Filesize
33KB
MD59e335df87dca03edc149e087bfc9eccf
SHA1d40d44af505d92edd88960dd11a0dcba845a2d0e
SHA256da40fb78b1340e0bb8a357b09911296b29b4dd444f59e0eeac011fc9840b332f
SHA5126bfb4783189727eec09ae1f5249f4c0de7b69faaf204a6d02e5002ea6a6b0f7d215d9413c13aa6fcd517fc094d071eae2a6956c1f89860631f56418ddc53fe39