Analysis
-
max time kernel
119s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
07-01-2025 18:03
Static task
static1
Behavioral task
behavioral1
Sample
a6016a5b7157970918f2b3b85d7355a4dfb6f8a325146a79d87e24eefb1ec6a8.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a6016a5b7157970918f2b3b85d7355a4dfb6f8a325146a79d87e24eefb1ec6a8.exe
Resource
win10v2004-20241007-en
General
-
Target
a6016a5b7157970918f2b3b85d7355a4dfb6f8a325146a79d87e24eefb1ec6a8.exe
-
Size
823KB
-
MD5
f1bd85dc3f579f451d3b60e25e9d68e4
-
SHA1
cbd2f880a5852ea094560ce14de7d2e4dceab067
-
SHA256
a6016a5b7157970918f2b3b85d7355a4dfb6f8a325146a79d87e24eefb1ec6a8
-
SHA512
d6b855b2cbf6fa27ac845d6483ba79c9ebe50603d5f760b9789a0a1a8f9b1ffcfdcee45b7c3e26f330e5f6dcde57acd407176d76ef3f67966318da5b4e7e8ff3
-
SSDEEP
12288:U69zDWz/xwNqdlbrIX3JALF1QbOagrEGgtNryyCJuDT/PNa0AYQ/Hyw2Ee:U2DW/xbHX2YIbCQsu3/PNL7Q/HyVEe
Malware Config
Extracted
xtremerat
far3on.zapto.org
Signatures
-
Detect XtremeRAT payload 4 IoCs
resource yara_rule behavioral1/files/0x0009000000018b28-7.dat family_xtremerat behavioral1/memory/2900-12-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/2396-13-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/2900-14-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Executes dropped EXE 1 IoCs
pid Process 2396 server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2396 2548 a6016a5b7157970918f2b3b85d7355a4dfb6f8a325146a79d87e24eefb1ec6a8.exe 30 PID 2548 wrote to memory of 2396 2548 a6016a5b7157970918f2b3b85d7355a4dfb6f8a325146a79d87e24eefb1ec6a8.exe 30 PID 2548 wrote to memory of 2396 2548 a6016a5b7157970918f2b3b85d7355a4dfb6f8a325146a79d87e24eefb1ec6a8.exe 30 PID 2548 wrote to memory of 2396 2548 a6016a5b7157970918f2b3b85d7355a4dfb6f8a325146a79d87e24eefb1ec6a8.exe 30 PID 2396 wrote to memory of 2900 2396 server.exe 31 PID 2396 wrote to memory of 2900 2396 server.exe 31 PID 2396 wrote to memory of 2900 2396 server.exe 31 PID 2396 wrote to memory of 2900 2396 server.exe 31 PID 2396 wrote to memory of 2900 2396 server.exe 31 PID 2396 wrote to memory of 2988 2396 server.exe 32 PID 2396 wrote to memory of 2988 2396 server.exe 32 PID 2396 wrote to memory of 2988 2396 server.exe 32 PID 2396 wrote to memory of 2988 2396 server.exe 32 PID 2396 wrote to memory of 2988 2396 server.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6016a5b7157970918f2b3b85d7355a4dfb6f8a325146a79d87e24eefb1ec6a8.exe"C:\Users\Admin\AppData\Local\Temp\a6016a5b7157970918f2b3b85d7355a4dfb6f8a325146a79d87e24eefb1ec6a8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\server.exeC:\Users\Admin\AppData\Local\Temp/server.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- System Location Discovery: System Language Discovery
PID:2900
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2988
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD512d27499021448c874136d36fbe339d5
SHA1c03f7073cea41da612affc49dd078a8c7b2f341e
SHA256c280699f7288524fb66a248100124757ad41c7d10585632b5363c79200f93ea1
SHA5125e93611008cfbe5c22b7e5846bfa706e583215f3bd32b4cd1e6e77d730046cf850477a9683e1b60a2d10e1868d4a397585f09083555278c0f8eab449cd6ba4c7