Analysis

  • max time kernel
    119s
  • max time network
    113s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    07-01-2025 19:57

General

  • Target

    672a8fca53d99c0c9e9402061018507d0d05f670548ea675441d1a232d0ca320.exe

  • Size

    248KB

  • MD5

    0138d319a76965e25bc48d8244c2ccf7

  • SHA1

    e03fdf949bcc3c96abd897b4008c4ca7c4d4a332

  • SHA256

    672a8fca53d99c0c9e9402061018507d0d05f670548ea675441d1a232d0ca320

  • SHA512

    2e1e3fb376093431c1c3a6b8282c6ac328925880124df7a49fa13f272e1826047239058eda5b6210233f4fa695be87ba42f03a7491ed82c9ff9da416b215c193

  • SSDEEP

    3072:2pQjMB7q0pvVT3oKSDHmCh1ot3rtAypzFi+cpm7spchKH0JuBQw8HpPt8oWJRMHD:dP0T7oKuHVet3JAYC29wUlt8nJWHD

Malware Config

Signatures

  • Detect XtremeRAT payload 16 IoCs
  • XtremeRAT

    The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

  • Xtremerat family
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\672a8fca53d99c0c9e9402061018507d0d05f670548ea675441d1a232d0ca320.exe
    "C:\Users\Admin\AppData\Local\Temp\672a8fca53d99c0c9e9402061018507d0d05f670548ea675441d1a232d0ca320.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Users\Admin\AppData\Local\Temp\672a8fca53d99c0c9e9402061018507d0d05f670548ea675441d1a232d0ca320.exe
      "C:\Users\Admin\AppData\Local\Temp\672a8fca53d99c0c9e9402061018507d0d05f670548ea675441d1a232d0ca320.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2300
      • C:\Users\Admin\AppData\Local\Temp\672a8fca53d99c0c9e9402061018507d0d05f670548ea675441d1a232d0ca320.exe
        "C:\Users\Admin\AppData\Local\Temp\672a8fca53d99c0c9e9402061018507d0d05f670548ea675441d1a232d0ca320.exe"
        3⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1956
        • C:\Windows\SysWOW64\svchost.exe
          svchost.exe
          4⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          PID:2708
        • C:\Windows\SysWOW64\calc.exe
          calc.exe
          4⤵
            PID:2828
          • C:\Windows\SysWOW64\explorer.exe
            explorer.exe
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2868
          • C:\Windows\SysWOW64\calc.exe
            calc.exe
            4⤵
              PID:2752
            • C:\Windows\SysWOW64\calc.exe
              calc.exe
              4⤵
                PID:2748
              • C:\Windows\SysWOW64\calc.exe
                calc.exe
                4⤵
                  PID:2796
                • C:\Windows\SysWOW64\calc.exe
                  calc.exe
                  4⤵
                    PID:2924
                  • C:\Windows\SysWOW64\calc.exe
                    calc.exe
                    4⤵
                      PID:2760
                    • C:\Windows\SysWOW64\calc.exe
                      calc.exe
                      4⤵
                        PID:2640
                      • C:\Windows\SysWOW64\calc.exe
                        calc.exe
                        4⤵
                          PID:2632
                        • C:\Windows\SysWOW64\calc.exe
                          calc.exe
                          4⤵
                            PID:2776
                          • C:\Windows\SysWOW64\calc.exe
                            calc.exe
                            4⤵
                              PID:3068
                            • C:\Windows\SysWOW64\calc.exe
                              calc.exe
                              4⤵
                                PID:2356
                              • C:\Windows\SysWOW64\calc.exe
                                calc.exe
                                4⤵
                                  PID:2736
                                • C:\Windows\SysWOW64\calc.exe
                                  calc.exe
                                  4⤵
                                    PID:2656
                                  • C:\Windows\SysWOW64\calc.exe
                                    calc.exe
                                    4⤵
                                      PID:2712
                                    • C:\Windows\SysWOW64\calc.exe
                                      calc.exe
                                      4⤵
                                        PID:2604

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Roaming\InstallDir\schost.exe

                                  Filesize

                                  248KB

                                  MD5

                                  0138d319a76965e25bc48d8244c2ccf7

                                  SHA1

                                  e03fdf949bcc3c96abd897b4008c4ca7c4d4a332

                                  SHA256

                                  672a8fca53d99c0c9e9402061018507d0d05f670548ea675441d1a232d0ca320

                                  SHA512

                                  2e1e3fb376093431c1c3a6b8282c6ac328925880124df7a49fa13f272e1826047239058eda5b6210233f4fa695be87ba42f03a7491ed82c9ff9da416b215c193

                                • memory/1956-22-0x0000000000C80000-0x0000000000C92000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/1956-19-0x0000000000C80000-0x0000000000C92000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/1956-23-0x0000000000C80000-0x0000000000C92000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/1956-21-0x0000000000C80000-0x0000000000C92000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/1956-27-0x0000000000C80000-0x0000000000C92000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/1956-30-0x0000000000C80000-0x0000000000C92000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/1956-31-0x0000000000C80000-0x0000000000C92000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/1956-29-0x0000000000C80000-0x0000000000C92000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/1956-20-0x0000000000C80000-0x0000000000C92000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/1956-24-0x0000000000C80000-0x0000000000C92000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/1956-45-0x0000000000C80000-0x0000000000C92000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/2300-14-0x0000000000400000-0x0000000000412000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/2300-16-0x0000000000400000-0x0000000000412000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/2300-28-0x0000000000400000-0x0000000000412000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/2300-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2300-10-0x0000000000400000-0x0000000000412000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/2300-8-0x0000000000400000-0x0000000000412000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/2300-6-0x0000000000400000-0x0000000000412000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/2300-4-0x0000000000400000-0x0000000000412000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/2300-2-0x0000000000400000-0x0000000000412000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/2300-0-0x0000000000400000-0x0000000000412000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/2300-17-0x0000000000400000-0x0000000000412000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/2708-39-0x0000000000C80000-0x0000000000C92000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/2868-43-0x0000000000C80000-0x0000000000C92000-memory.dmp

                                  Filesize

                                  72KB