Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 10:41
Static task
static1
Behavioral task
behavioral1
Sample
9a0b75dd14192726868b36bec94af30659e7f56edb5a94ec0211668e0672da74.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9a0b75dd14192726868b36bec94af30659e7f56edb5a94ec0211668e0672da74.exe
Resource
win10v2004-20220812-en
General
-
Target
9a0b75dd14192726868b36bec94af30659e7f56edb5a94ec0211668e0672da74.exe
-
Size
568KB
-
MD5
25e4604ad1befcfd562a254a4e4961ec
-
SHA1
4fbdb4bd7f043950e31e33669e31aa9334ed08e1
-
SHA256
9a0b75dd14192726868b36bec94af30659e7f56edb5a94ec0211668e0672da74
-
SHA512
50270f32b17f3550a498e80f32d586697541c59fad76478e0db78497b6f219bc078376d254bb5f5235fcd882a9c8e53fe7de8ce34cdde16ab94609b7ecbad9ce
-
SSDEEP
384:ug2JvTv+HdNpOFmagBRyRrhnbUQ3ZkDl7jdaVcrOF:uDJvKYFmabf5kDlMciF
Malware Config
Extracted
xtremerat
vpndodo.sytes.net
Signatures
-
Detect XtremeRAT payload 17 IoCs
resource yara_rule behavioral1/memory/848-59-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/848-60-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/848-61-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/848-62-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/848-63-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/848-65-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/848-66-0x000000001000D0F4-mapping.dmp family_xtremerat behavioral1/memory/848-67-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/848-69-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/848-70-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/2008-73-0x0000000000000000-mapping.dmp family_xtremerat behavioral1/memory/1304-77-0x0000000000000000-mapping.dmp family_xtremerat behavioral1/memory/848-78-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/1304-80-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/2008-81-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/1304-83-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/2008-84-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{1HS25B07-MKKY-18QN-RF55-2X0BL54274GB} calc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1HS25B07-MKKY-18QN-RF55-2X0BL54274GB}\StubPath = "C:\\Windows\\microsofts\\microsoft.exe restart" calc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{1HS25B07-MKKY-18QN-RF55-2X0BL54274GB} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1HS25B07-MKKY-18QN-RF55-2X0BL54274GB}\StubPath = "C:\\Windows\\microsofts\\microsoft.exe" svchost.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\microsofts\\microsoft.exe" svchost.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\microsofts\\microsoft.exe" svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run calc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\microsofts\\microsoft.exe" calc.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run calc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\microsofts\\microsoft.exe" calc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1504 set thread context of 848 1504 9a0b75dd14192726868b36bec94af30659e7f56edb5a94ec0211668e0672da74.exe 27 -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\microsofts\microsoft.exe calc.exe File created C:\Windows\microsofts\microsoft.exe calc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1504 9a0b75dd14192726868b36bec94af30659e7f56edb5a94ec0211668e0672da74.exe 1304 calc.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1504 wrote to memory of 848 1504 9a0b75dd14192726868b36bec94af30659e7f56edb5a94ec0211668e0672da74.exe 27 PID 1504 wrote to memory of 848 1504 9a0b75dd14192726868b36bec94af30659e7f56edb5a94ec0211668e0672da74.exe 27 PID 1504 wrote to memory of 848 1504 9a0b75dd14192726868b36bec94af30659e7f56edb5a94ec0211668e0672da74.exe 27 PID 1504 wrote to memory of 848 1504 9a0b75dd14192726868b36bec94af30659e7f56edb5a94ec0211668e0672da74.exe 27 PID 1504 wrote to memory of 848 1504 9a0b75dd14192726868b36bec94af30659e7f56edb5a94ec0211668e0672da74.exe 27 PID 1504 wrote to memory of 848 1504 9a0b75dd14192726868b36bec94af30659e7f56edb5a94ec0211668e0672da74.exe 27 PID 1504 wrote to memory of 848 1504 9a0b75dd14192726868b36bec94af30659e7f56edb5a94ec0211668e0672da74.exe 27 PID 1504 wrote to memory of 848 1504 9a0b75dd14192726868b36bec94af30659e7f56edb5a94ec0211668e0672da74.exe 27 PID 1504 wrote to memory of 848 1504 9a0b75dd14192726868b36bec94af30659e7f56edb5a94ec0211668e0672da74.exe 27 PID 1504 wrote to memory of 848 1504 9a0b75dd14192726868b36bec94af30659e7f56edb5a94ec0211668e0672da74.exe 27 PID 1504 wrote to memory of 848 1504 9a0b75dd14192726868b36bec94af30659e7f56edb5a94ec0211668e0672da74.exe 27 PID 1504 wrote to memory of 848 1504 9a0b75dd14192726868b36bec94af30659e7f56edb5a94ec0211668e0672da74.exe 27 PID 848 wrote to memory of 2008 848 9a0b75dd14192726868b36bec94af30659e7f56edb5a94ec0211668e0672da74.exe 28 PID 848 wrote to memory of 2008 848 9a0b75dd14192726868b36bec94af30659e7f56edb5a94ec0211668e0672da74.exe 28 PID 848 wrote to memory of 2008 848 9a0b75dd14192726868b36bec94af30659e7f56edb5a94ec0211668e0672da74.exe 28 PID 848 wrote to memory of 2008 848 9a0b75dd14192726868b36bec94af30659e7f56edb5a94ec0211668e0672da74.exe 28 PID 848 wrote to memory of 2008 848 9a0b75dd14192726868b36bec94af30659e7f56edb5a94ec0211668e0672da74.exe 28 PID 848 wrote to memory of 1304 848 9a0b75dd14192726868b36bec94af30659e7f56edb5a94ec0211668e0672da74.exe 29 PID 848 wrote to memory of 1304 848 9a0b75dd14192726868b36bec94af30659e7f56edb5a94ec0211668e0672da74.exe 29 PID 848 wrote to memory of 1304 848 9a0b75dd14192726868b36bec94af30659e7f56edb5a94ec0211668e0672da74.exe 29 PID 848 wrote to memory of 1304 848 9a0b75dd14192726868b36bec94af30659e7f56edb5a94ec0211668e0672da74.exe 29 PID 848 wrote to memory of 1304 848 9a0b75dd14192726868b36bec94af30659e7f56edb5a94ec0211668e0672da74.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a0b75dd14192726868b36bec94af30659e7f56edb5a94ec0211668e0672da74.exe"C:\Users\Admin\AppData\Local\Temp\9a0b75dd14192726868b36bec94af30659e7f56edb5a94ec0211668e0672da74.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\9a0b75dd14192726868b36bec94af30659e7f56edb5a94ec0211668e0672da74.exeC:\Users\Admin\AppData\Local\Temp\9a0b75dd14192726868b36bec94af30659e7f56edb5a94ec0211668e0672da74.exe2⤵
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- Modifies Installed Components in the registry
- Adds Run key to start application
PID:2008
-
-
C:\Windows\SysWOW64\calc.execalc.exe3⤵
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1304
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
568KB
MD525e4604ad1befcfd562a254a4e4961ec
SHA14fbdb4bd7f043950e31e33669e31aa9334ed08e1
SHA2569a0b75dd14192726868b36bec94af30659e7f56edb5a94ec0211668e0672da74
SHA51250270f32b17f3550a498e80f32d586697541c59fad76478e0db78497b6f219bc078376d254bb5f5235fcd882a9c8e53fe7de8ce34cdde16ab94609b7ecbad9ce