Analysis
-
max time kernel
92s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 12:48
Static task
static1
Behavioral task
behavioral1
Sample
0297e08c1b57115dfaa5a88450484e0c9cbce36d0170d0e973e9a86e2fefde8bN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0297e08c1b57115dfaa5a88450484e0c9cbce36d0170d0e973e9a86e2fefde8bN.exe
Resource
win10v2004-20241007-en
General
-
Target
0297e08c1b57115dfaa5a88450484e0c9cbce36d0170d0e973e9a86e2fefde8bN.exe
-
Size
822KB
-
MD5
6c32dc814220163427d9b8f18d4d7490
-
SHA1
5ab3ecfbad3d795c0c33c6745c85902759cbbb70
-
SHA256
0297e08c1b57115dfaa5a88450484e0c9cbce36d0170d0e973e9a86e2fefde8b
-
SHA512
bc25c97b003501780b3b23708a557f9d38c5cf359fdfe271aaf66cabc5503ea40cfd4b472e6bd60048237b0e49958e477e54562e5eb9fb58f700812292595051
-
SSDEEP
12288:U69zDWz/xwNqdlbrIX3JALF1QbOagrEGgtNryyCJuDT/PNa0AYQ/Hyw2Eq:U2DW/xbHX2YIbCQsu3/PNL7Q/HyVEq
Malware Config
Extracted
xtremerat
far3on.zapto.org
Signatures
-
Detect XtremeRAT payload 4 IoCs
resource yara_rule behavioral2/files/0x000c000000023bb3-6.dat family_xtremerat behavioral2/memory/1192-8-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/1776-9-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/1192-10-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Executes dropped EXE 1 IoCs
pid Process 1776 server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4480 1192 WerFault.exe 83 4724 1192 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1848 wrote to memory of 1776 1848 0297e08c1b57115dfaa5a88450484e0c9cbce36d0170d0e973e9a86e2fefde8bN.exe 82 PID 1848 wrote to memory of 1776 1848 0297e08c1b57115dfaa5a88450484e0c9cbce36d0170d0e973e9a86e2fefde8bN.exe 82 PID 1848 wrote to memory of 1776 1848 0297e08c1b57115dfaa5a88450484e0c9cbce36d0170d0e973e9a86e2fefde8bN.exe 82 PID 1776 wrote to memory of 1192 1776 server.exe 83 PID 1776 wrote to memory of 1192 1776 server.exe 83 PID 1776 wrote to memory of 1192 1776 server.exe 83 PID 1776 wrote to memory of 1192 1776 server.exe 83 PID 1776 wrote to memory of 3592 1776 server.exe 84 PID 1776 wrote to memory of 3592 1776 server.exe 84 PID 1776 wrote to memory of 3592 1776 server.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\0297e08c1b57115dfaa5a88450484e0c9cbce36d0170d0e973e9a86e2fefde8bN.exe"C:\Users\Admin\AppData\Local\Temp\0297e08c1b57115dfaa5a88450484e0c9cbce36d0170d0e973e9a86e2fefde8bN.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\server.exeC:\Users\Admin\AppData\Local\Temp/server.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- System Location Discovery: System Language Discovery
PID:1192 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 4804⤵
- Program crash
PID:4480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 5004⤵
- Program crash
PID:4724
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:3592
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1192 -ip 11921⤵PID:2724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1192 -ip 11921⤵PID:3060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD512d27499021448c874136d36fbe339d5
SHA1c03f7073cea41da612affc49dd078a8c7b2f341e
SHA256c280699f7288524fb66a248100124757ad41c7d10585632b5363c79200f93ea1
SHA5125e93611008cfbe5c22b7e5846bfa706e583215f3bd32b4cd1e6e77d730046cf850477a9683e1b60a2d10e1868d4a397585f09083555278c0f8eab449cd6ba4c7