Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 02:20
Behavioral task
behavioral1
Sample
715b2f4ff6ffc1dbf997cdca5e05014c.exe
Resource
win7-20240704-en
General
-
Target
715b2f4ff6ffc1dbf997cdca5e05014c.exe
-
Size
254KB
-
MD5
715b2f4ff6ffc1dbf997cdca5e05014c
-
SHA1
8623d032ef652736e0b12100a9b41a1a3f1ba1c9
-
SHA256
460e8b4e5244700ee4529b840251edf89ce173fda6460ec9a44936a0546387d4
-
SHA512
29c4db5cfdca57c8641978a767c9b0a34848bed0e6ca758a4a58a04e2e9aa115ca010945aa76bfe983b4fa1e31e8e4dc07e83895bfa0c414390e5c5c63043887
-
SSDEEP
6144:ZBIj6f6ZnW1Tl2hwJT/u+51PVljjxCCfnXouoh:jIjTnWTf/v51PrHAAX5e
Malware Config
Signatures
-
Detect XtremeRAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3924-7-0x0000000000C80000-0x0000000000CB5000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
Processes:
715b2f4ff6ffc1dbf997cdca5e05014c.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{023PNXR5-3W43-2A8A-G474-I5065R17YKG7} 715b2f4ff6ffc1dbf997cdca5e05014c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{023PNXR5-3W43-2A8A-G474-I5065R17YKG7}\StubPath = "C:\\Windows\\system32\\InstallDir\\Server.exe restart" 715b2f4ff6ffc1dbf997cdca5e05014c.exe -
Processes:
resource yara_rule behavioral2/memory/3924-0-0x0000000000C80000-0x0000000000CB5000-memory.dmp upx behavioral2/memory/3924-7-0x0000000000C80000-0x0000000000CB5000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
715b2f4ff6ffc1dbf997cdca5e05014c.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\InstallDir\\Server.exe" 715b2f4ff6ffc1dbf997cdca5e05014c.exe Set value (str) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\InstallDir\\Server.exe" 715b2f4ff6ffc1dbf997cdca5e05014c.exe -
Drops file in System32 directory 2 IoCs
Processes:
715b2f4ff6ffc1dbf997cdca5e05014c.exedescription ioc process File opened for modification C:\Windows\SysWOW64\InstallDir\Server.exe 715b2f4ff6ffc1dbf997cdca5e05014c.exe File created C:\Windows\SysWOW64\InstallDir\Server.exe 715b2f4ff6ffc1dbf997cdca5e05014c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
715b2f4ff6ffc1dbf997cdca5e05014c.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 715b2f4ff6ffc1dbf997cdca5e05014c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
715b2f4ff6ffc1dbf997cdca5e05014c.exepid process 3924 715b2f4ff6ffc1dbf997cdca5e05014c.exe -
Suspicious use of WriteProcessMemory 37 IoCs
Processes:
715b2f4ff6ffc1dbf997cdca5e05014c.exedescription pid process target process PID 3924 wrote to memory of 848 3924 715b2f4ff6ffc1dbf997cdca5e05014c.exe msedge.exe PID 3924 wrote to memory of 848 3924 715b2f4ff6ffc1dbf997cdca5e05014c.exe msedge.exe PID 3924 wrote to memory of 848 3924 715b2f4ff6ffc1dbf997cdca5e05014c.exe msedge.exe PID 3924 wrote to memory of 4388 3924 715b2f4ff6ffc1dbf997cdca5e05014c.exe msedge.exe PID 3924 wrote to memory of 4388 3924 715b2f4ff6ffc1dbf997cdca5e05014c.exe msedge.exe PID 3924 wrote to memory of 4396 3924 715b2f4ff6ffc1dbf997cdca5e05014c.exe msedge.exe PID 3924 wrote to memory of 4396 3924 715b2f4ff6ffc1dbf997cdca5e05014c.exe msedge.exe PID 3924 wrote to memory of 4396 3924 715b2f4ff6ffc1dbf997cdca5e05014c.exe msedge.exe PID 3924 wrote to memory of 3880 3924 715b2f4ff6ffc1dbf997cdca5e05014c.exe msedge.exe PID 3924 wrote to memory of 3880 3924 715b2f4ff6ffc1dbf997cdca5e05014c.exe msedge.exe PID 3924 wrote to memory of 516 3924 715b2f4ff6ffc1dbf997cdca5e05014c.exe msedge.exe PID 3924 wrote to memory of 516 3924 715b2f4ff6ffc1dbf997cdca5e05014c.exe msedge.exe PID 3924 wrote to memory of 516 3924 715b2f4ff6ffc1dbf997cdca5e05014c.exe msedge.exe PID 3924 wrote to memory of 2040 3924 715b2f4ff6ffc1dbf997cdca5e05014c.exe msedge.exe PID 3924 wrote to memory of 2040 3924 715b2f4ff6ffc1dbf997cdca5e05014c.exe msedge.exe PID 3924 wrote to memory of 1228 3924 715b2f4ff6ffc1dbf997cdca5e05014c.exe msedge.exe PID 3924 wrote to memory of 1228 3924 715b2f4ff6ffc1dbf997cdca5e05014c.exe msedge.exe PID 3924 wrote to memory of 1228 3924 715b2f4ff6ffc1dbf997cdca5e05014c.exe msedge.exe PID 3924 wrote to memory of 4072 3924 715b2f4ff6ffc1dbf997cdca5e05014c.exe msedge.exe PID 3924 wrote to memory of 4072 3924 715b2f4ff6ffc1dbf997cdca5e05014c.exe msedge.exe PID 3924 wrote to memory of 4656 3924 715b2f4ff6ffc1dbf997cdca5e05014c.exe msedge.exe PID 3924 wrote to memory of 4656 3924 715b2f4ff6ffc1dbf997cdca5e05014c.exe msedge.exe PID 3924 wrote to memory of 4656 3924 715b2f4ff6ffc1dbf997cdca5e05014c.exe msedge.exe PID 3924 wrote to memory of 4596 3924 715b2f4ff6ffc1dbf997cdca5e05014c.exe msedge.exe PID 3924 wrote to memory of 4596 3924 715b2f4ff6ffc1dbf997cdca5e05014c.exe msedge.exe PID 3924 wrote to memory of 4880 3924 715b2f4ff6ffc1dbf997cdca5e05014c.exe msedge.exe PID 3924 wrote to memory of 4880 3924 715b2f4ff6ffc1dbf997cdca5e05014c.exe msedge.exe PID 3924 wrote to memory of 4880 3924 715b2f4ff6ffc1dbf997cdca5e05014c.exe msedge.exe PID 3924 wrote to memory of 792 3924 715b2f4ff6ffc1dbf997cdca5e05014c.exe msedge.exe PID 3924 wrote to memory of 792 3924 715b2f4ff6ffc1dbf997cdca5e05014c.exe msedge.exe PID 3924 wrote to memory of 3484 3924 715b2f4ff6ffc1dbf997cdca5e05014c.exe msedge.exe PID 3924 wrote to memory of 3484 3924 715b2f4ff6ffc1dbf997cdca5e05014c.exe msedge.exe PID 3924 wrote to memory of 3484 3924 715b2f4ff6ffc1dbf997cdca5e05014c.exe msedge.exe PID 3924 wrote to memory of 3236 3924 715b2f4ff6ffc1dbf997cdca5e05014c.exe msedge.exe PID 3924 wrote to memory of 3236 3924 715b2f4ff6ffc1dbf997cdca5e05014c.exe msedge.exe PID 3924 wrote to memory of 4080 3924 715b2f4ff6ffc1dbf997cdca5e05014c.exe msedge.exe PID 3924 wrote to memory of 4080 3924 715b2f4ff6ffc1dbf997cdca5e05014c.exe msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\715b2f4ff6ffc1dbf997cdca5e05014c.exe"C:\Users\Admin\AppData\Local\Temp\715b2f4ff6ffc1dbf997cdca5e05014c.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵PID:848
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵PID:4388
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵PID:4396
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵PID:3880
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵PID:516
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵PID:2040
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵PID:1228
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵PID:4072
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵PID:4656
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵PID:4596
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵PID:4880
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵PID:792
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵PID:3484
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵PID:3236
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵PID:4080
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1