Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01-02-2024 04:53
Behavioral task
behavioral1
Sample
85fb2cf0bc9834f4e9db89f1dc08cfe0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
85fb2cf0bc9834f4e9db89f1dc08cfe0.exe
Resource
win10v2004-20231215-en
General
-
Target
85fb2cf0bc9834f4e9db89f1dc08cfe0.exe
-
Size
62KB
-
MD5
85fb2cf0bc9834f4e9db89f1dc08cfe0
-
SHA1
5edc1744524ec7873ef87ee370770d442508d0cf
-
SHA256
58189800a4f2a35b31cedebd4c553371f7e723a08fb9229b2f54922230d70c0e
-
SHA512
773be66b63f6d414cfe981dcec675048aba3feed14cb413b283c2d287eb81c7183134cf97e0358f66d78b394830017041eab8df1027aeadcb69b324a50ecdf31
-
SSDEEP
1536:OT8qDqQ8K9MK3tGjbNwPZ66AXHWTl5NX3L5va:sqMyKdcXXHW5/5va
Malware Config
Extracted
xtremerat
11hack1.no-ip.biz
,,11hack11.no-ip.biz
耀]瞌袸瞌袌瞌糨jouba.no-ip.biz
Signatures
-
Detect XtremeRAT payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4764-0-0x0000000010000000-0x0000000010047000-memory.dmp family_xtremerat behavioral2/memory/1928-1-0x0000000010000000-0x0000000010047000-memory.dmp family_xtremerat behavioral2/memory/4764-2-0x0000000010000000-0x0000000010047000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target Process procid_target 4948 4764 WerFault.exe 32 3960 4764 WerFault.exe 32 -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
85fb2cf0bc9834f4e9db89f1dc08cfe0.exedescription pid Process procid_target PID 1928 wrote to memory of 4764 1928 85fb2cf0bc9834f4e9db89f1dc08cfe0.exe 32 PID 1928 wrote to memory of 4764 1928 85fb2cf0bc9834f4e9db89f1dc08cfe0.exe 32 PID 1928 wrote to memory of 4764 1928 85fb2cf0bc9834f4e9db89f1dc08cfe0.exe 32 PID 1928 wrote to memory of 4764 1928 85fb2cf0bc9834f4e9db89f1dc08cfe0.exe 32 PID 1928 wrote to memory of 3172 1928 85fb2cf0bc9834f4e9db89f1dc08cfe0.exe 36 PID 1928 wrote to memory of 3172 1928 85fb2cf0bc9834f4e9db89f1dc08cfe0.exe 36 PID 1928 wrote to memory of 3172 1928 85fb2cf0bc9834f4e9db89f1dc08cfe0.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\85fb2cf0bc9834f4e9db89f1dc08cfe0.exe"C:\Users\Admin\AppData\Local\Temp\85fb2cf0bc9834f4e9db89f1dc08cfe0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:4764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4764 -s 4803⤵
- Program crash
PID:4948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4764 -s 5043⤵
- Program crash
PID:3960
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵PID:3172
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4764 -ip 47641⤵PID:4256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4764 -ip 47641⤵PID:2312