Analysis
-
max time kernel
119s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
17-02-2025 04:18
Static task
static1
Behavioral task
behavioral1
Sample
e25d2f5f09c95ea6c0dd5e5db8be55dac4bf913f87e4ac1ab8ce863027432ce1N.exe
Resource
win7-20241023-en
General
-
Target
e25d2f5f09c95ea6c0dd5e5db8be55dac4bf913f87e4ac1ab8ce863027432ce1N.exe
-
Size
1.4MB
-
MD5
e49fa59b2facb42650cf29c60d653990
-
SHA1
4d1bfbae0b3c5047c40be4fed63a4218bbf480d6
-
SHA256
e25d2f5f09c95ea6c0dd5e5db8be55dac4bf913f87e4ac1ab8ce863027432ce1
-
SHA512
b7ddeea87fdc218d8c1765be9b34c9399f120d6f6df46b39af887c25cbde894a17952156282d08aabaa842094ddc7f0aeee91f2bf4e6632a89ad2e85a7b5b62b
-
SSDEEP
24576:7xRRtXc2uqRePccDXfZak5hSg0f6AsEwmHfy5yWgjT3NvIrf1ajRumgTaI2:rz6uaDRN5hSg0f6AxwmHf2gjT3Bi1ajh
Malware Config
Extracted
xtremerat
stoya.no-ip.biz
Signatures
-
Detect XtremeRAT payload 5 IoCs
resource yara_rule behavioral1/memory/2752-28-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral1/memory/2752-31-0x0000000000D10000-0x0000000001072000-memory.dmp family_xtremerat behavioral1/memory/1532-44-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral1/memory/2752-30-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral1/memory/2752-45-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Executes dropped EXE 3 IoCs
pid Process 2160 osmnl.exe 2752 osmnl.exe 2852 Launcher.exe -
Loads dropped DLL 7 IoCs
pid Process 2712 e25d2f5f09c95ea6c0dd5e5db8be55dac4bf913f87e4ac1ab8ce863027432ce1N.exe 2712 e25d2f5f09c95ea6c0dd5e5db8be55dac4bf913f87e4ac1ab8ce863027432ce1N.exe 2160 osmnl.exe 2160 osmnl.exe 2752 osmnl.exe 2712 e25d2f5f09c95ea6c0dd5e5db8be55dac4bf913f87e4ac1ab8ce863027432ce1N.exe 2852 Launcher.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e25d2f5f09c95ea6c0dd5e5db8be55dac4bf913f87e4ac1ab8ce863027432ce1N.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2160 osmnl.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2160 set thread context of 2752 2160 osmnl.exe 29 -
resource yara_rule behavioral1/memory/2752-28-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/2752-27-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/1532-44-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/2752-30-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/2752-24-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/2752-21-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/2752-45-0x0000000010000000-0x000000001004D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e25d2f5f09c95ea6c0dd5e5db8be55dac4bf913f87e4ac1ab8ce863027432ce1N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language osmnl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language osmnl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Launcher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2160 osmnl.exe 2160 osmnl.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2712 wrote to memory of 2160 2712 e25d2f5f09c95ea6c0dd5e5db8be55dac4bf913f87e4ac1ab8ce863027432ce1N.exe 28 PID 2712 wrote to memory of 2160 2712 e25d2f5f09c95ea6c0dd5e5db8be55dac4bf913f87e4ac1ab8ce863027432ce1N.exe 28 PID 2712 wrote to memory of 2160 2712 e25d2f5f09c95ea6c0dd5e5db8be55dac4bf913f87e4ac1ab8ce863027432ce1N.exe 28 PID 2712 wrote to memory of 2160 2712 e25d2f5f09c95ea6c0dd5e5db8be55dac4bf913f87e4ac1ab8ce863027432ce1N.exe 28 PID 2712 wrote to memory of 2160 2712 e25d2f5f09c95ea6c0dd5e5db8be55dac4bf913f87e4ac1ab8ce863027432ce1N.exe 28 PID 2712 wrote to memory of 2160 2712 e25d2f5f09c95ea6c0dd5e5db8be55dac4bf913f87e4ac1ab8ce863027432ce1N.exe 28 PID 2712 wrote to memory of 2160 2712 e25d2f5f09c95ea6c0dd5e5db8be55dac4bf913f87e4ac1ab8ce863027432ce1N.exe 28 PID 2160 wrote to memory of 2752 2160 osmnl.exe 29 PID 2160 wrote to memory of 2752 2160 osmnl.exe 29 PID 2160 wrote to memory of 2752 2160 osmnl.exe 29 PID 2160 wrote to memory of 2752 2160 osmnl.exe 29 PID 2160 wrote to memory of 2752 2160 osmnl.exe 29 PID 2160 wrote to memory of 2752 2160 osmnl.exe 29 PID 2160 wrote to memory of 2752 2160 osmnl.exe 29 PID 2160 wrote to memory of 2752 2160 osmnl.exe 29 PID 2160 wrote to memory of 2752 2160 osmnl.exe 29 PID 2160 wrote to memory of 2752 2160 osmnl.exe 29 PID 2160 wrote to memory of 2752 2160 osmnl.exe 29 PID 2160 wrote to memory of 2752 2160 osmnl.exe 29 PID 2752 wrote to memory of 1532 2752 osmnl.exe 30 PID 2752 wrote to memory of 1532 2752 osmnl.exe 30 PID 2752 wrote to memory of 1532 2752 osmnl.exe 30 PID 2752 wrote to memory of 1532 2752 osmnl.exe 30 PID 2752 wrote to memory of 1532 2752 osmnl.exe 30 PID 2752 wrote to memory of 1532 2752 osmnl.exe 30 PID 2752 wrote to memory of 1532 2752 osmnl.exe 30 PID 2712 wrote to memory of 2852 2712 e25d2f5f09c95ea6c0dd5e5db8be55dac4bf913f87e4ac1ab8ce863027432ce1N.exe 31 PID 2712 wrote to memory of 2852 2712 e25d2f5f09c95ea6c0dd5e5db8be55dac4bf913f87e4ac1ab8ce863027432ce1N.exe 31 PID 2712 wrote to memory of 2852 2712 e25d2f5f09c95ea6c0dd5e5db8be55dac4bf913f87e4ac1ab8ce863027432ce1N.exe 31 PID 2712 wrote to memory of 2852 2712 e25d2f5f09c95ea6c0dd5e5db8be55dac4bf913f87e4ac1ab8ce863027432ce1N.exe 31 PID 2712 wrote to memory of 2852 2712 e25d2f5f09c95ea6c0dd5e5db8be55dac4bf913f87e4ac1ab8ce863027432ce1N.exe 31 PID 2712 wrote to memory of 2852 2712 e25d2f5f09c95ea6c0dd5e5db8be55dac4bf913f87e4ac1ab8ce863027432ce1N.exe 31 PID 2712 wrote to memory of 2852 2712 e25d2f5f09c95ea6c0dd5e5db8be55dac4bf913f87e4ac1ab8ce863027432ce1N.exe 31 PID 2752 wrote to memory of 1532 2752 osmnl.exe 30 PID 2752 wrote to memory of 2720 2752 osmnl.exe 32 PID 2752 wrote to memory of 2720 2752 osmnl.exe 32 PID 2752 wrote to memory of 2720 2752 osmnl.exe 32 PID 2752 wrote to memory of 2720 2752 osmnl.exe 32 PID 2752 wrote to memory of 2720 2752 osmnl.exe 32 PID 2752 wrote to memory of 2720 2752 osmnl.exe 32 PID 2752 wrote to memory of 2720 2752 osmnl.exe 32 PID 2752 wrote to memory of 2720 2752 osmnl.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\e25d2f5f09c95ea6c0dd5e5db8be55dac4bf913f87e4ac1ab8ce863027432ce1N.exe"C:\Users\Admin\AppData\Local\Temp\e25d2f5f09c95ea6c0dd5e5db8be55dac4bf913f87e4ac1ab8ce863027432ce1N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\osmnl.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\osmnl.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\osmnl.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\osmnl.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- System Location Discovery: System Language Discovery
PID:1532
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2720
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Launcher.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Launcher.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
799KB
MD5ebc6be19c16f96c9c32ce8c1e9f305c3
SHA1cec8bd4eac6a1b32024b62dd0a73fd7e8ae72658
SHA2560ff0f089829eb2952d33b694161924bde78e0dfb60a80df082ce618ec7b72944
SHA512a2148001191b10fc6bd2a7bf0b85e00b825d1ac42389ec16b91a4f64bb6096c7257ef1b3a5fb88ccb2b59fa130a2b02d30ad5c85a94894de0ec6f86eb0a071f9
-
Filesize
650KB
MD526ef202fea01db6426848b2b949c1916
SHA19e4fdd1d5f12f891882b8bdbcdf8b8cff9b14f22
SHA256d020bd6a5b4e40398dd9b21003c5340748f0a8ce5290a9efc3608099b57b4601
SHA5128388f77ce7955393c91ad6397cce15f5fe51821390e4d422199f06ff6d1a160da4f15c47ad892f26af778bb8402734f5093c6f572f675ef4228ee99fe85ee15d