Analysis
-
max time kernel
150s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 11:17
Static task
static1
Behavioral task
behavioral1
Sample
6a2bb639c02897b993b052c85ee2a97a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6a2bb639c02897b993b052c85ee2a97a.exe
Resource
win10v2004-20231215-en
General
-
Target
6a2bb639c02897b993b052c85ee2a97a.exe
-
Size
113KB
-
MD5
6a2bb639c02897b993b052c85ee2a97a
-
SHA1
11c7466f23e3decc44f3a1b45be099fb1d72d9f7
-
SHA256
68f17e4507f407e91909244688aa968fcd42aa700eb16b17f5066023dcafb5d7
-
SHA512
80a8f012fc7678f84e5c6689aa0f3a1dea9aa1be185075dee5612f92b27bdc9d4d252ac891dd9d70de602e38cbe0a217ba4ddfd7bb5ec6322def5bc53429dbce
-
SSDEEP
1536:kC5p7b0RGwWtTYGUFwMeAur6vcOAFpRJNF+75DUSvHgMpvP5D9xOPcJS7:kIdo8tEMF+ErFnJkUmAMVRccJS7
Malware Config
Extracted
xtremerat
x0n1rlz.no-ip.biz
Signatures
-
Detect XtremeRAT payload 8 IoCs
resource yara_rule behavioral2/memory/1528-3-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/1528-4-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/1528-6-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/1528-7-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/4184-8-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/1528-11-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/4184-12-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/1528-13-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{1N556FP8-O3W3-30W5-22WD-A725R111KXS5} 6a2bb639c02897b993b052c85ee2a97a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1N556FP8-O3W3-30W5-22WD-A725R111KXS5}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Gadgets\\Sidebar.exe restart" 6a2bb639c02897b993b052c85ee2a97a.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Gadgets = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Gadgets\\Sidebar.exe" 6a2bb639c02897b993b052c85ee2a97a.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Gadgets = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Gadgets\\Sidebar.exe" 6a2bb639c02897b993b052c85ee2a97a.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Gadget = "%Gadget%" 6a2bb639c02897b993b052c85ee2a97a.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 848 set thread context of 1528 848 6a2bb639c02897b993b052c85ee2a97a.exe 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1636 4184 WerFault.exe 92 1352 4184 WerFault.exe 92 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 848 6a2bb639c02897b993b052c85ee2a97a.exe 1528 6a2bb639c02897b993b052c85ee2a97a.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 848 wrote to memory of 1528 848 6a2bb639c02897b993b052c85ee2a97a.exe 91 PID 848 wrote to memory of 1528 848 6a2bb639c02897b993b052c85ee2a97a.exe 91 PID 848 wrote to memory of 1528 848 6a2bb639c02897b993b052c85ee2a97a.exe 91 PID 848 wrote to memory of 1528 848 6a2bb639c02897b993b052c85ee2a97a.exe 91 PID 848 wrote to memory of 1528 848 6a2bb639c02897b993b052c85ee2a97a.exe 91 PID 848 wrote to memory of 1528 848 6a2bb639c02897b993b052c85ee2a97a.exe 91 PID 848 wrote to memory of 1528 848 6a2bb639c02897b993b052c85ee2a97a.exe 91 PID 848 wrote to memory of 1528 848 6a2bb639c02897b993b052c85ee2a97a.exe 91 PID 848 wrote to memory of 1528 848 6a2bb639c02897b993b052c85ee2a97a.exe 91 PID 848 wrote to memory of 1528 848 6a2bb639c02897b993b052c85ee2a97a.exe 91 PID 848 wrote to memory of 1528 848 6a2bb639c02897b993b052c85ee2a97a.exe 91 PID 848 wrote to memory of 1528 848 6a2bb639c02897b993b052c85ee2a97a.exe 91 PID 848 wrote to memory of 1528 848 6a2bb639c02897b993b052c85ee2a97a.exe 91 PID 1528 wrote to memory of 4184 1528 6a2bb639c02897b993b052c85ee2a97a.exe 92 PID 1528 wrote to memory of 4184 1528 6a2bb639c02897b993b052c85ee2a97a.exe 92 PID 1528 wrote to memory of 4184 1528 6a2bb639c02897b993b052c85ee2a97a.exe 92 PID 1528 wrote to memory of 4184 1528 6a2bb639c02897b993b052c85ee2a97a.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a2bb639c02897b993b052c85ee2a97a.exe"C:\Users\Admin\AppData\Local\Temp\6a2bb639c02897b993b052c85ee2a97a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Users\Admin\AppData\Local\Temp\6a2bb639c02897b993b052c85ee2a97a.exeC:\Users\Admin\AppData\Local\Temp\6a2bb639c02897b993b052c85ee2a97a.exe2⤵
- Modifies Installed Components in the registry
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:4184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4184 -s 4804⤵
- Program crash
PID:1636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4184 -s 5044⤵
- Program crash
PID:1352
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4184 -ip 41841⤵PID:2568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4184 -ip 41841⤵PID:4012