Analysis
-
max time kernel
93s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 18:03
Static task
static1
Behavioral task
behavioral1
Sample
a6016a5b7157970918f2b3b85d7355a4dfb6f8a325146a79d87e24eefb1ec6a8.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a6016a5b7157970918f2b3b85d7355a4dfb6f8a325146a79d87e24eefb1ec6a8.exe
Resource
win10v2004-20241007-en
General
-
Target
a6016a5b7157970918f2b3b85d7355a4dfb6f8a325146a79d87e24eefb1ec6a8.exe
-
Size
823KB
-
MD5
f1bd85dc3f579f451d3b60e25e9d68e4
-
SHA1
cbd2f880a5852ea094560ce14de7d2e4dceab067
-
SHA256
a6016a5b7157970918f2b3b85d7355a4dfb6f8a325146a79d87e24eefb1ec6a8
-
SHA512
d6b855b2cbf6fa27ac845d6483ba79c9ebe50603d5f760b9789a0a1a8f9b1ffcfdcee45b7c3e26f330e5f6dcde57acd407176d76ef3f67966318da5b4e7e8ff3
-
SSDEEP
12288:U69zDWz/xwNqdlbrIX3JALF1QbOagrEGgtNryyCJuDT/PNa0AYQ/Hyw2Ee:U2DW/xbHX2YIbCQsu3/PNL7Q/HyVEe
Malware Config
Extracted
xtremerat
far3on.zapto.org
Signatures
-
Detect XtremeRAT payload 4 IoCs
resource yara_rule behavioral2/files/0x0008000000023c99-6.dat family_xtremerat behavioral2/memory/2600-8-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/3352-9-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/2600-11-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Executes dropped EXE 1 IoCs
pid Process 3352 server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 216 2600 WerFault.exe 83 544 2600 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1916 wrote to memory of 3352 1916 a6016a5b7157970918f2b3b85d7355a4dfb6f8a325146a79d87e24eefb1ec6a8.exe 82 PID 1916 wrote to memory of 3352 1916 a6016a5b7157970918f2b3b85d7355a4dfb6f8a325146a79d87e24eefb1ec6a8.exe 82 PID 1916 wrote to memory of 3352 1916 a6016a5b7157970918f2b3b85d7355a4dfb6f8a325146a79d87e24eefb1ec6a8.exe 82 PID 3352 wrote to memory of 2600 3352 server.exe 83 PID 3352 wrote to memory of 2600 3352 server.exe 83 PID 3352 wrote to memory of 2600 3352 server.exe 83 PID 3352 wrote to memory of 2600 3352 server.exe 83 PID 3352 wrote to memory of 3960 3352 server.exe 84 PID 3352 wrote to memory of 3960 3352 server.exe 84 PID 3352 wrote to memory of 3960 3352 server.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6016a5b7157970918f2b3b85d7355a4dfb6f8a325146a79d87e24eefb1ec6a8.exe"C:\Users\Admin\AppData\Local\Temp\a6016a5b7157970918f2b3b85d7355a4dfb6f8a325146a79d87e24eefb1ec6a8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\server.exeC:\Users\Admin\AppData\Local\Temp/server.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- System Location Discovery: System Language Discovery
PID:2600 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 4804⤵
- Program crash
PID:216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 4884⤵
- Program crash
PID:544
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:3960
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2600 -ip 26001⤵PID:3600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2600 -ip 26001⤵PID:2932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD512d27499021448c874136d36fbe339d5
SHA1c03f7073cea41da612affc49dd078a8c7b2f341e
SHA256c280699f7288524fb66a248100124757ad41c7d10585632b5363c79200f93ea1
SHA5125e93611008cfbe5c22b7e5846bfa706e583215f3bd32b4cd1e6e77d730046cf850477a9683e1b60a2d10e1868d4a397585f09083555278c0f8eab449cd6ba4c7