Analysis
-
max time kernel
167s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 11:56
Behavioral task
behavioral1
Sample
1c6404896446ead2f7bc9d0657bdc2a4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1c6404896446ead2f7bc9d0657bdc2a4.exe
Resource
win10v2004-20231215-en
General
-
Target
1c6404896446ead2f7bc9d0657bdc2a4.exe
-
Size
44KB
-
MD5
1c6404896446ead2f7bc9d0657bdc2a4
-
SHA1
1e638f1cae9ed0e3d8ac425a7daf696017677a3b
-
SHA256
5aee0a99ba309f814a9de46e14fb0fd0ec1c731bdca2b553f1ef1fec20788fb1
-
SHA512
7e9b0fa9c896164829ff47bada824434ec795a85ca55f90640cf5e5e8791435595a17736ef2941e8ec009ac052758f7ef36b38ffe4543c0b1d415df62051c3e3
-
SSDEEP
768:rBr+tjFqTPkAlfztB1lr6an3smTA8uvm2DfOTwYPIjzofDa:FyRUHlrL1lr6an3TLuvm2buQXofDa
Malware Config
Signatures
-
Detect XtremeRAT payload 3 IoCs
resource yara_rule behavioral1/memory/2260-5-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/2736-6-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/2260-8-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2260 svchost.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2736 wrote to memory of 2260 2736 1c6404896446ead2f7bc9d0657bdc2a4.exe 20 PID 2736 wrote to memory of 2260 2736 1c6404896446ead2f7bc9d0657bdc2a4.exe 20 PID 2736 wrote to memory of 2260 2736 1c6404896446ead2f7bc9d0657bdc2a4.exe 20 PID 2736 wrote to memory of 2260 2736 1c6404896446ead2f7bc9d0657bdc2a4.exe 20 PID 2736 wrote to memory of 2260 2736 1c6404896446ead2f7bc9d0657bdc2a4.exe 20