Analysis
-
max time kernel
266s -
max time network
364s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 10:49
Static task
static1
Behavioral task
behavioral1
Sample
97ad592f5bc5bdd7920f322ef9bea8a6eef9198ee46f46a4d114ff54c926097f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
97ad592f5bc5bdd7920f322ef9bea8a6eef9198ee46f46a4d114ff54c926097f.exe
Resource
win10v2004-20220901-en
General
-
Target
97ad592f5bc5bdd7920f322ef9bea8a6eef9198ee46f46a4d114ff54c926097f.exe
-
Size
69KB
-
MD5
54d37a0bf6862350be8ba31a88e7c91c
-
SHA1
eaf1fadc671b4e1afdc87f2dd25fe26e32cd0acb
-
SHA256
97ad592f5bc5bdd7920f322ef9bea8a6eef9198ee46f46a4d114ff54c926097f
-
SHA512
12cb9578cb146d3acc04a55e650ab0be77102a2955de4c23c57d0f118fd6c4bc6c412a940261c3107e18fd04127f12cc7d638a8c84d4cd5f47f435e77b571719
-
SSDEEP
1536:rGxvCUew0tWmedelq8PyZ6vU6X3xDoP2pt8Hm6KfIN:rG1NevOelq8KZ6vLpZYG9m
Malware Config
Extracted
xtremerat
sl-s7.no-ip.org
Signatures
-
Detect XtremeRAT payload 8 IoCs
resource yara_rule behavioral1/memory/1768-73-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral1/memory/1768-74-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral1/memory/1060-78-0x0000000000000000-mapping.dmp family_xtremerat behavioral1/memory/1060-80-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral1/memory/960-83-0x0000000000000000-mapping.dmp family_xtremerat behavioral1/memory/1768-84-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral1/memory/960-86-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral1/memory/1060-88-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{PR6AR3W4-SVR2-UB47-125H-I58F31ECO6E0} notepad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{PR6AR3W4-SVR2-UB47-125H-I58F31ECO6E0}\StubPath = "C:\\Windows\\InstallDir\\Server.exe restart" notepad.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{PR6AR3W4-SVR2-UB47-125H-I58F31ECO6E0} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{PR6AR3W4-SVR2-UB47-125H-I58F31ECO6E0}\StubPath = "C:\\Windows\\InstallDir\\Server.exe" svchost.exe -
resource yara_rule behavioral1/memory/1768-64-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/1768-66-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/1768-67-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/1768-72-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/1768-73-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/1768-74-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/1060-80-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/1768-84-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/960-86-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/1060-88-0x0000000010000000-0x000000001004D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" svchost.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run notepad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" notepad.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" notepad.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1348 set thread context of 1684 1348 97ad592f5bc5bdd7920f322ef9bea8a6eef9198ee46f46a4d114ff54c926097f.exe 28 PID 1684 set thread context of 1768 1684 97ad592f5bc5bdd7920f322ef9bea8a6eef9198ee46f46a4d114ff54c926097f.EXE 29 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\InstallDir\Server.exe notepad.exe File created C:\Windows\InstallDir\Server.exe notepad.exe File opened for modification C:\Windows\InstallDir\ notepad.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1348 97ad592f5bc5bdd7920f322ef9bea8a6eef9198ee46f46a4d114ff54c926097f.exe 1684 97ad592f5bc5bdd7920f322ef9bea8a6eef9198ee46f46a4d114ff54c926097f.EXE 960 notepad.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1348 wrote to memory of 1684 1348 97ad592f5bc5bdd7920f322ef9bea8a6eef9198ee46f46a4d114ff54c926097f.exe 28 PID 1348 wrote to memory of 1684 1348 97ad592f5bc5bdd7920f322ef9bea8a6eef9198ee46f46a4d114ff54c926097f.exe 28 PID 1348 wrote to memory of 1684 1348 97ad592f5bc5bdd7920f322ef9bea8a6eef9198ee46f46a4d114ff54c926097f.exe 28 PID 1348 wrote to memory of 1684 1348 97ad592f5bc5bdd7920f322ef9bea8a6eef9198ee46f46a4d114ff54c926097f.exe 28 PID 1348 wrote to memory of 1684 1348 97ad592f5bc5bdd7920f322ef9bea8a6eef9198ee46f46a4d114ff54c926097f.exe 28 PID 1348 wrote to memory of 1684 1348 97ad592f5bc5bdd7920f322ef9bea8a6eef9198ee46f46a4d114ff54c926097f.exe 28 PID 1348 wrote to memory of 1684 1348 97ad592f5bc5bdd7920f322ef9bea8a6eef9198ee46f46a4d114ff54c926097f.exe 28 PID 1348 wrote to memory of 1684 1348 97ad592f5bc5bdd7920f322ef9bea8a6eef9198ee46f46a4d114ff54c926097f.exe 28 PID 1348 wrote to memory of 1684 1348 97ad592f5bc5bdd7920f322ef9bea8a6eef9198ee46f46a4d114ff54c926097f.exe 28 PID 1684 wrote to memory of 1768 1684 97ad592f5bc5bdd7920f322ef9bea8a6eef9198ee46f46a4d114ff54c926097f.EXE 29 PID 1684 wrote to memory of 1768 1684 97ad592f5bc5bdd7920f322ef9bea8a6eef9198ee46f46a4d114ff54c926097f.EXE 29 PID 1684 wrote to memory of 1768 1684 97ad592f5bc5bdd7920f322ef9bea8a6eef9198ee46f46a4d114ff54c926097f.EXE 29 PID 1684 wrote to memory of 1768 1684 97ad592f5bc5bdd7920f322ef9bea8a6eef9198ee46f46a4d114ff54c926097f.EXE 29 PID 1684 wrote to memory of 1768 1684 97ad592f5bc5bdd7920f322ef9bea8a6eef9198ee46f46a4d114ff54c926097f.EXE 29 PID 1684 wrote to memory of 1768 1684 97ad592f5bc5bdd7920f322ef9bea8a6eef9198ee46f46a4d114ff54c926097f.EXE 29 PID 1684 wrote to memory of 1768 1684 97ad592f5bc5bdd7920f322ef9bea8a6eef9198ee46f46a4d114ff54c926097f.EXE 29 PID 1684 wrote to memory of 1768 1684 97ad592f5bc5bdd7920f322ef9bea8a6eef9198ee46f46a4d114ff54c926097f.EXE 29 PID 1768 wrote to memory of 1060 1768 97ad592f5bc5bdd7920f322ef9bea8a6eef9198ee46f46a4d114ff54c926097f.exe 30 PID 1768 wrote to memory of 1060 1768 97ad592f5bc5bdd7920f322ef9bea8a6eef9198ee46f46a4d114ff54c926097f.exe 30 PID 1768 wrote to memory of 1060 1768 97ad592f5bc5bdd7920f322ef9bea8a6eef9198ee46f46a4d114ff54c926097f.exe 30 PID 1768 wrote to memory of 1060 1768 97ad592f5bc5bdd7920f322ef9bea8a6eef9198ee46f46a4d114ff54c926097f.exe 30 PID 1768 wrote to memory of 1060 1768 97ad592f5bc5bdd7920f322ef9bea8a6eef9198ee46f46a4d114ff54c926097f.exe 30 PID 1768 wrote to memory of 960 1768 97ad592f5bc5bdd7920f322ef9bea8a6eef9198ee46f46a4d114ff54c926097f.exe 31 PID 1768 wrote to memory of 960 1768 97ad592f5bc5bdd7920f322ef9bea8a6eef9198ee46f46a4d114ff54c926097f.exe 31 PID 1768 wrote to memory of 960 1768 97ad592f5bc5bdd7920f322ef9bea8a6eef9198ee46f46a4d114ff54c926097f.exe 31 PID 1768 wrote to memory of 960 1768 97ad592f5bc5bdd7920f322ef9bea8a6eef9198ee46f46a4d114ff54c926097f.exe 31 PID 1768 wrote to memory of 960 1768 97ad592f5bc5bdd7920f322ef9bea8a6eef9198ee46f46a4d114ff54c926097f.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\97ad592f5bc5bdd7920f322ef9bea8a6eef9198ee46f46a4d114ff54c926097f.exe"C:\Users\Admin\AppData\Local\Temp\97ad592f5bc5bdd7920f322ef9bea8a6eef9198ee46f46a4d114ff54c926097f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\97ad592f5bc5bdd7920f322ef9bea8a6eef9198ee46f46a4d114ff54c926097f.EXE"C:\Users\Admin\AppData\Local\Temp\97ad592f5bc5bdd7920f322ef9bea8a6eef9198ee46f46a4d114ff54c926097f.EXE"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\97ad592f5bc5bdd7920f322ef9bea8a6eef9198ee46f46a4d114ff54c926097f.exeC:\Users\Admin\AppData\Local\Temp\97ad592f5bc5bdd7920f322ef9bea8a6eef9198ee46f46a4d114ff54c926097f.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- Modifies Installed Components in the registry
- Adds Run key to start application
PID:1060
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe4⤵
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:960
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69KB
MD554d37a0bf6862350be8ba31a88e7c91c
SHA1eaf1fadc671b4e1afdc87f2dd25fe26e32cd0acb
SHA25697ad592f5bc5bdd7920f322ef9bea8a6eef9198ee46f46a4d114ff54c926097f
SHA51212cb9578cb146d3acc04a55e650ab0be77102a2955de4c23c57d0f118fd6c4bc6c412a940261c3107e18fd04127f12cc7d638a8c84d4cd5f47f435e77b571719