Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2024 23:35
Behavioral task
behavioral1
Sample
8ad18924201c75b4b7848e78759ef9f9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8ad18924201c75b4b7848e78759ef9f9.exe
Resource
win10v2004-20231215-en
General
-
Target
8ad18924201c75b4b7848e78759ef9f9.exe
-
Size
62KB
-
MD5
8ad18924201c75b4b7848e78759ef9f9
-
SHA1
9ad279ec42f4cf653a00e8554da07fa6e863f7f3
-
SHA256
b1592817fa10cc2ff2a9bf5ffb28cfe0fd05a17532b120454f2a85a43df68954
-
SHA512
37b71fea29d23c713ac0f088cbb5038b244f5f97682793b3bd693e3d2d36b252f8f422400171ffb8b6997fd94726c90fc4b8450e9446d24969f68cb4cd6f8165
-
SSDEEP
1536:KT8qDqQ8K9MK3tGjbNwPZ6oAXHWul5NX3yBQ:QqMyKdcZXHWw7
Malware Config
Extracted
xtremerat
11hack1.no-ip.biz
11hack11.no-ip.biz
饼⣨.jouba.no-ip.biz
Signatures
-
Detect XtremeRAT payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4484-0-0x0000000010000000-0x0000000010047000-memory.dmp family_xtremerat behavioral2/memory/4408-1-0x0000000010000000-0x0000000010047000-memory.dmp family_xtremerat behavioral2/memory/4484-2-0x0000000010000000-0x0000000010047000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target Process procid_target 2680 4484 WerFault.exe 84 1868 4484 WerFault.exe 84 -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
8ad18924201c75b4b7848e78759ef9f9.exedescription pid Process procid_target PID 4408 wrote to memory of 4484 4408 8ad18924201c75b4b7848e78759ef9f9.exe 84 PID 4408 wrote to memory of 4484 4408 8ad18924201c75b4b7848e78759ef9f9.exe 84 PID 4408 wrote to memory of 4484 4408 8ad18924201c75b4b7848e78759ef9f9.exe 84 PID 4408 wrote to memory of 4484 4408 8ad18924201c75b4b7848e78759ef9f9.exe 84 PID 4408 wrote to memory of 3476 4408 8ad18924201c75b4b7848e78759ef9f9.exe 85 PID 4408 wrote to memory of 3476 4408 8ad18924201c75b4b7848e78759ef9f9.exe 85 PID 4408 wrote to memory of 3476 4408 8ad18924201c75b4b7848e78759ef9f9.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ad18924201c75b4b7848e78759ef9f9.exe"C:\Users\Admin\AppData\Local\Temp\8ad18924201c75b4b7848e78759ef9f9.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:4484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 4803⤵
- Program crash
PID:2680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 5043⤵
- Program crash
PID:1868
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵PID:3476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 4484 -ip 44841⤵PID:4660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4484 -ip 44841⤵PID:3876