Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-02-2024 10:03
Behavioral task
behavioral1
Sample
a8e16ca2915a735400afe5b59b15c464.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a8e16ca2915a735400afe5b59b15c464.exe
Resource
win10v2004-20240226-en
General
-
Target
a8e16ca2915a735400afe5b59b15c464.exe
-
Size
62KB
-
MD5
a8e16ca2915a735400afe5b59b15c464
-
SHA1
f13c6458d7158a8b2f42a0afdbaffbbe5bce3ae6
-
SHA256
ab3d4bf9e5b0fec50ef9380ff641f29d4b356d37adc1a331e84fcb353161b4cb
-
SHA512
62e7428b6d08bf86fb0b145a858f70b0a3a4347cfef356770d86a862e06a1c4592c3e63919b98774125c24f398c1a238bc56b0ba0656a20a8363f628460c4a85
-
SSDEEP
768:Jyxsv4Mb+dRdSxEHj1WDFK/UlBfeaMMFYmGphIYe/dzMAHe0sz:JZvEEEHZklBfen11IYgMAHBU
Malware Config
Signatures
-
Detect XtremeRAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1040-1-0x0000000010000000-0x000000001005E000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Processes:
resource yara_rule behavioral1/memory/1040-0-0x0000000010000000-0x000000001005E000-memory.dmp upx behavioral1/memory/1040-1-0x0000000010000000-0x000000001005E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
a8e16ca2915a735400afe5b59b15c464.exedescription pid process target process PID 1040 wrote to memory of 2176 1040 a8e16ca2915a735400afe5b59b15c464.exe iexplore.exe PID 1040 wrote to memory of 2176 1040 a8e16ca2915a735400afe5b59b15c464.exe iexplore.exe PID 1040 wrote to memory of 2176 1040 a8e16ca2915a735400afe5b59b15c464.exe iexplore.exe PID 1040 wrote to memory of 2176 1040 a8e16ca2915a735400afe5b59b15c464.exe iexplore.exe PID 1040 wrote to memory of 2176 1040 a8e16ca2915a735400afe5b59b15c464.exe iexplore.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8e16ca2915a735400afe5b59b15c464.exe"C:\Users\Admin\AppData\Local\Temp\a8e16ca2915a735400afe5b59b15c464.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2176