Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-01-2025 19:39
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20240903-en
General
-
Target
sample.exe
-
Size
39KB
-
MD5
f49720377b99b63148ea58af59500e1c
-
SHA1
8c6c28eebfb561ee42b86b87c38c63db08306670
-
SHA256
1b5d7a30ee1b398082624912e0f27c6a5c7eb52f5cd5f7f2f6b1308b58313be4
-
SHA512
7ff9d1dc33ae0d58db7a7b0ec790af6aac5aeca4b950cf11070c88bb190da229b5f073af7de38a2be425b23e9146f3a7323d4b5daf39d1f12bcc12c8620bf12b
-
SSDEEP
768:BMuijtHf5g7/IIG3bGcYDBSvFIWuePQtv66lYQtzug2GnpFgG:qNW71rcYDAWeotvXlY2KInpB
Malware Config
Extracted
xtremerat
kasmsss.no-ip.biz
Signatures
-
Detect XtremeRAT payload 3 IoCs
resource yara_rule behavioral1/memory/2756-3-0x0000000010000000-0x0000000010050000-memory.dmp family_xtremerat behavioral1/memory/2708-4-0x0000000010000000-0x0000000010050000-memory.dmp family_xtremerat behavioral1/memory/2756-5-0x0000000010000000-0x0000000010050000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
resource yara_rule behavioral1/memory/2708-0-0x0000000010000000-0x0000000010050000-memory.dmp upx behavioral1/memory/2756-3-0x0000000010000000-0x0000000010050000-memory.dmp upx behavioral1/memory/2708-4-0x0000000010000000-0x0000000010050000-memory.dmp upx behavioral1/memory/2756-5-0x0000000010000000-0x0000000010050000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sample.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2756 2708 sample.exe 30 PID 2708 wrote to memory of 2756 2708 sample.exe 30 PID 2708 wrote to memory of 2756 2708 sample.exe 30 PID 2708 wrote to memory of 2756 2708 sample.exe 30 PID 2708 wrote to memory of 2756 2708 sample.exe 30 PID 2708 wrote to memory of 2712 2708 sample.exe 31 PID 2708 wrote to memory of 2712 2708 sample.exe 31 PID 2708 wrote to memory of 2712 2708 sample.exe 31 PID 2708 wrote to memory of 2712 2708 sample.exe 31 PID 2708 wrote to memory of 2712 2708 sample.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\sample.exe"C:\Users\Admin\AppData\Local\Temp\sample.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- System Location Discovery: System Language Discovery
PID:2756
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2712
-