Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/01/2025, 01:06

General

  • Target

    0790d761632c5c449691b48d4900c9339ca838b3e96a39512793e6ddfd6f3779N.exe

  • Size

    744KB

  • MD5

    693d0198fe87eadd63dfff18819fb880

  • SHA1

    e3b8cf8efa6af4ed3fd12c9586e34a5a91354891

  • SHA256

    0790d761632c5c449691b48d4900c9339ca838b3e96a39512793e6ddfd6f3779

  • SHA512

    6c7ee6e990e9d03f6d8e00e0aa6b4a976b35a7a2ccb4dd1dba4bca1af4afd367ec8832b23d25698781be025f17a5b9d09836d562fff8eafd20868eb6b99b1155

  • SSDEEP

    12288:VzukkVr/MhE6JOA6lfHcb+L1LkUrzx0E+qKlR5yaMxTEa:NhE6JOAiPVgUrCvR5yaMxTEa

Malware Config

Extracted

Family

xpertrat

Version

3.1.9

Botnet

Group

C2

joeing.dnsfor.me:2011

Mutex

P4U8M5X3-N0E7-O7S5-B1Y3-J7Q6J4S0G6G5

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 1 IoCs
  • XpertRAT

    XpertRAT is a remote access trojan with various capabilities.

  • XpertRAT Core payload 3 IoCs
  • Xpertrat family
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0790d761632c5c449691b48d4900c9339ca838b3e96a39512793e6ddfd6f3779N.exe
    "C:\Users\Admin\AppData\Local\Temp\0790d761632c5c449691b48d4900c9339ca838b3e96a39512793e6ddfd6f3779N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4480
    • C:\Windows\SysWOW64\mshta.exe
      "C:\Windows\System32\mshta.exe" vbscript:Execute(" str1 = ""WScript.Shell"" : str2 = ""Set WshShell = CrXXteObject(str1)"" : str2 = Replace(str2,""XX"",""ea"") : execute str2 : myKey = ""HKCU\Software\Microsoft\Windows\:\Run\sprgekasser"" : myKey = ""HKCU\Software\Microsoft\Windows\X\Run\NOME"" : myKey=replace(myKey,"":"",""CurrentVersion"") : WshShell.RegWrite myKey,""C:\Users\Admin\AppData\Local\Temp\OPHAVSRETTEN.exe"",""REG_SZ"" : window.close")
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1396
    • C:\Users\Admin\AppData\Local\Temp\OPHAVSRETTEN.exe
      "C:\Users\Admin\AppData\Local\Temp\OPHAVSRETTEN.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1752
      • C:\Users\Admin\AppData\Local\Temp\OPHAVSRETTEN.exe
        "C:\Users\Admin\AppData\Local\Temp\OPHAVSRETTEN.exe"
        3⤵
        • UAC bypass
        • Windows security bypass
        • Executes dropped EXE
        • Windows security modification
        • Checks whether UAC is enabled
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:4564
        • C:\Users\Admin\AppData\Local\Temp\OPHAVSRETTEN.exe
          C:\Users\Admin\AppData\Local\Temp\OPHAVSRETTEN.exe
          4⤵
          • Adds policy Run key to start application
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:4156

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\OPHAVSRETTEN.exe

    Filesize

    744KB

    MD5

    0c68bddfea48409ba3b94e6d034aafd1

    SHA1

    d896c74375e40088e8ea700306f10cd1c320b419

    SHA256

    30310184dfb608286ff8f6e9c9ded22ea70fffcaa7fe6ed250af4734cf7c130e

    SHA512

    186016706c033900e41d30cb31408361744ff9c65143cba998d265338e7001012833bf467e339a2d3021f0d50cfd1b5288ead31851ecb26e6cb32dddcab2827e

  • memory/4156-22-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/4156-24-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/4156-35-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/4480-2-0x0000000077491000-0x00000000775B1000-memory.dmp

    Filesize

    1.1MB

  • memory/4480-15-0x0000000077491000-0x00000000775B1000-memory.dmp

    Filesize

    1.1MB

  • memory/4564-17-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/4564-19-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/4564-33-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB