Analysis
-
max time kernel
134s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2024 12:57
Behavioral task
behavioral1
Sample
899245c956fc6316fc07b07cbd355eeb.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
899245c956fc6316fc07b07cbd355eeb.exe
Resource
win10v2004-20231215-en
General
-
Target
899245c956fc6316fc07b07cbd355eeb.exe
-
Size
65KB
-
MD5
899245c956fc6316fc07b07cbd355eeb
-
SHA1
73357f18c832516bb4cc36a2427641fce7328837
-
SHA256
a3b940007040c2f2f7036b4b321ca564081762be8455aea095ee51ec8472decd
-
SHA512
fd65d581c7fc0761583b5eefbed2d17cbb38df561bdcd03e7cc58d67562e2acc5e329291189151a7c4411f83c927e61dfa0feebecc7f798c49e2dd2685067897
-
SSDEEP
1536:eZvEEEHZklBfdIp/XPHkRDiibI1qkSZZZ3m:eZvEvWffOp/XPERD/bQU
Malware Config
Extracted
xtremerat
elhadi-bouakaz23.no-ip.biz
Signatures
-
Detect XtremeRAT payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3776-1-0x0000000010000000-0x000000001005A000-memory.dmp family_xtremerat behavioral2/memory/4412-2-0x0000000010000000-0x000000001005A000-memory.dmp family_xtremerat behavioral2/memory/3776-3-0x0000000010000000-0x000000001005A000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Processes:
resource yara_rule behavioral2/memory/4412-0-0x0000000010000000-0x000000001005A000-memory.dmp upx behavioral2/memory/3776-1-0x0000000010000000-0x000000001005A000-memory.dmp upx behavioral2/memory/4412-2-0x0000000010000000-0x000000001005A000-memory.dmp upx behavioral2/memory/3776-3-0x0000000010000000-0x000000001005A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target Process procid_target 1776 3776 WerFault.exe 84 2316 3776 WerFault.exe 84 -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
899245c956fc6316fc07b07cbd355eeb.exedescription pid Process procid_target PID 4412 wrote to memory of 3776 4412 899245c956fc6316fc07b07cbd355eeb.exe 84 PID 4412 wrote to memory of 3776 4412 899245c956fc6316fc07b07cbd355eeb.exe 84 PID 4412 wrote to memory of 3776 4412 899245c956fc6316fc07b07cbd355eeb.exe 84 PID 4412 wrote to memory of 3776 4412 899245c956fc6316fc07b07cbd355eeb.exe 84 PID 4412 wrote to memory of 4484 4412 899245c956fc6316fc07b07cbd355eeb.exe 85 PID 4412 wrote to memory of 4484 4412 899245c956fc6316fc07b07cbd355eeb.exe 85 PID 4412 wrote to memory of 4484 4412 899245c956fc6316fc07b07cbd355eeb.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\899245c956fc6316fc07b07cbd355eeb.exe"C:\Users\Admin\AppData\Local\Temp\899245c956fc6316fc07b07cbd355eeb.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:3776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3776 -s 4843⤵
- Program crash
PID:1776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3776 -s 5003⤵
- Program crash
PID:2316
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵PID:4484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3776 -ip 37761⤵PID:1248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3776 -ip 37761⤵PID:2364