Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-03-2024 01:10
Behavioral task
behavioral1
Sample
c495953180f7fc6443f0f39f929a1bc8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c495953180f7fc6443f0f39f929a1bc8.exe
Resource
win10v2004-20240226-en
General
-
Target
c495953180f7fc6443f0f39f929a1bc8.exe
-
Size
33KB
-
MD5
c495953180f7fc6443f0f39f929a1bc8
-
SHA1
a51b78b7525ae5fe3e2481a817f9643c02b7a4f7
-
SHA256
a098bb1baa5083b3f0d9400aab0ab5ceb7c761ae88032d1bb0f533b63fe43e2f
-
SHA512
bb41d29df4002ce0ae3eec895a9da0687843c1948e094b7fbc4ec943ad0126582d2b156f379d55eae24fd4572ab07fcfba638319cf265da515329dc3145c84be
-
SSDEEP
768:pMuijtHf5g7/IIG3bGcYDBSvFIWuePQtv66lRiJ3j2RK/cu:iNW71rcYDAWeotvXl8p2cc
Malware Config
Extracted
xtremerat
degarrada.no-ip.org
Signatures
-
Detect XtremeRAT payload 4 IoCs
resource yara_rule behavioral1/memory/2156-0-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral1/memory/2572-3-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral1/memory/2156-4-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral1/memory/2572-5-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
resource yara_rule behavioral1/memory/2156-0-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/2572-3-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/2156-4-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/2572-5-0x0000000010000000-0x000000001004D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2572 2156 c495953180f7fc6443f0f39f929a1bc8.exe 28 PID 2156 wrote to memory of 2572 2156 c495953180f7fc6443f0f39f929a1bc8.exe 28 PID 2156 wrote to memory of 2572 2156 c495953180f7fc6443f0f39f929a1bc8.exe 28 PID 2156 wrote to memory of 2572 2156 c495953180f7fc6443f0f39f929a1bc8.exe 28 PID 2156 wrote to memory of 2572 2156 c495953180f7fc6443f0f39f929a1bc8.exe 28 PID 2156 wrote to memory of 2228 2156 c495953180f7fc6443f0f39f929a1bc8.exe 29 PID 2156 wrote to memory of 2228 2156 c495953180f7fc6443f0f39f929a1bc8.exe 29 PID 2156 wrote to memory of 2228 2156 c495953180f7fc6443f0f39f929a1bc8.exe 29 PID 2156 wrote to memory of 2228 2156 c495953180f7fc6443f0f39f929a1bc8.exe 29 PID 2156 wrote to memory of 2228 2156 c495953180f7fc6443f0f39f929a1bc8.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c495953180f7fc6443f0f39f929a1bc8.exe"C:\Users\Admin\AppData\Local\Temp\c495953180f7fc6443f0f39f929a1bc8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:2572
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2228
-