Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12/02/2024, 11:48

General

  • Target

    971548addc373b70e70c748ddb279cfd.exe

  • Size

    885KB

  • MD5

    971548addc373b70e70c748ddb279cfd

  • SHA1

    0e77d592c9a243a172a4d72069f07b6d79a7209d

  • SHA256

    215b3350b74a68b685582e93b42c4763c6626df94cc2243281bf997d7d83d581

  • SHA512

    c98b06ffc9b809b7ddd22a35d5dade65b080268ca76f7b836d9110e7140056d0db022b1e8f06ff99713aec33565e82c0a1b338caf2d0c18a30a3b8da17e9a1b0

  • SSDEEP

    12288:s2cjEJnk5y6/FOD1ho6zWD07N0RoG5XS6SarFLhzFAkNoDF/UE5VmKT+A/ixVDN:spjEJ5cO5h/7N0RtpfFAkNkFzBZ

Malware Config

Extracted

Family

xtremerat

C2

Ꟙstabilhayko.no-ip.org

Signatures

  • Detect XtremeRAT payload 7 IoCs
  • XtremeRAT

    The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\971548addc373b70e70c748ddb279cfd.exe
    "C:\Users\Admin\AppData\Local\Temp\971548addc373b70e70c748ddb279cfd.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:776
    • C:\Users\Admin\AppData\Local\Temp\971548addc373b70e70c748ddb279cfd.exe
      C:\Users\Admin\AppData\Local\Temp\971548addc373b70e70c748ddb279cfd.exe
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2284
      • C:\Windows\SysWOW64\svchost.exe
        svchost.exe
        3⤵
          PID:2144
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          3⤵
            PID:2152
          • C:\Windows\SysWOW64\372mYNET.EXE
            "C:\Windows\system32\372mYNET.EXE"
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2676
            • C:\Users\Admin\AppData\Roaming\svchostei.exe
              "C:\Users\Admin\AppData\Roaming\svchostei.exe"
              4⤵
              • Executes dropped EXE
              • Adds Run key to start application
              PID:2992

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • \Windows\SysWOW64\372mYNET.EXE

        Filesize

        11KB

        MD5

        6752d654cbaf37dc2ca6539019f62ba3

        SHA1

        1db60d9831fa818a39b60b6843f2dc431110ca4c

        SHA256

        1021676e9ed6507fe9d814b2b65fc613812fc3e89fbf7b17ba06f792663a985f

        SHA512

        2d595f14a0b16218176f5916960184d8dd2b51bf040086d3b8c2bff93c08159973bd3d40ff7c6de9206780e9b7d1bd9a4fcd9d206aa42548d84e3aadca254c2f

      • \Windows\SysWOW64\zorluadm.dll

        Filesize

        1.3MB

        MD5

        df5c622697dc8c743f3884914a9e4d99

        SHA1

        cdfc6345080dfa9c45d323f15532ad9274385d2f

        SHA256

        0ca52bc5cf854e274e15ba07df97b2e75ec4e1fc2d90f23676da7fa3c95da089

        SHA512

        59867bb9608c250661a6eb823f06c907d334eb4f638b04f21cf10213e5163035c37261f5213642c703dd382871a5d3ae764839c1b93e18e833d85ac0e3409f90

      • memory/776-8-0x0000000002E50000-0x0000000002F57000-memory.dmp

        Filesize

        1.0MB

      • memory/776-11-0x0000000000400000-0x0000000000506800-memory.dmp

        Filesize

        1.0MB

      • memory/776-0-0x0000000000400000-0x0000000000506800-memory.dmp

        Filesize

        1.0MB

      • memory/2144-13-0x0000000010000000-0x000000001004D000-memory.dmp

        Filesize

        308KB

      • memory/2144-15-0x0000000010000000-0x000000001004D000-memory.dmp

        Filesize

        308KB

      • memory/2144-37-0x0000000010000000-0x000000001004D000-memory.dmp

        Filesize

        308KB

      • memory/2284-10-0x0000000010000000-0x000000001004D000-memory.dmp

        Filesize

        308KB

      • memory/2284-9-0x0000000000400000-0x0000000000506800-memory.dmp

        Filesize

        1.0MB

      • memory/2284-7-0x0000000010000000-0x000000001004D000-memory.dmp

        Filesize

        308KB

      • memory/2284-12-0x0000000010000000-0x000000001004D000-memory.dmp

        Filesize

        308KB

      • memory/2284-6-0x0000000010000000-0x000000001004D000-memory.dmp

        Filesize

        308KB

      • memory/2284-26-0x0000000010000000-0x000000001004D000-memory.dmp

        Filesize

        308KB