Analysis
-
max time kernel
101s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20250211-en -
resource tags
arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system -
submitted
17-02-2025 04:18
Static task
static1
Behavioral task
behavioral1
Sample
e25d2f5f09c95ea6c0dd5e5db8be55dac4bf913f87e4ac1ab8ce863027432ce1N.exe
Resource
win7-20241023-en
General
-
Target
e25d2f5f09c95ea6c0dd5e5db8be55dac4bf913f87e4ac1ab8ce863027432ce1N.exe
-
Size
1.4MB
-
MD5
e49fa59b2facb42650cf29c60d653990
-
SHA1
4d1bfbae0b3c5047c40be4fed63a4218bbf480d6
-
SHA256
e25d2f5f09c95ea6c0dd5e5db8be55dac4bf913f87e4ac1ab8ce863027432ce1
-
SHA512
b7ddeea87fdc218d8c1765be9b34c9399f120d6f6df46b39af887c25cbde894a17952156282d08aabaa842094ddc7f0aeee91f2bf4e6632a89ad2e85a7b5b62b
-
SSDEEP
24576:7xRRtXc2uqRePccDXfZak5hSg0f6AsEwmHfy5yWgjT3NvIrf1ajRumgTaI2:rz6uaDRN5hSg0f6AxwmHf2gjT3Bi1ajh
Malware Config
Extracted
xtremerat
stoya.no-ip.biz
Signatures
-
Detect XtremeRAT payload 4 IoCs
resource yara_rule behavioral2/memory/1992-18-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/1992-17-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/3936-25-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/3936-26-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 32 1476 Process not Found -
Executes dropped EXE 3 IoCs
pid Process 4460 osmnl.exe 1992 osmnl.exe 2260 Launcher.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e25d2f5f09c95ea6c0dd5e5db8be55dac4bf913f87e4ac1ab8ce863027432ce1N.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4460 osmnl.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4460 set thread context of 1992 4460 osmnl.exe 90 -
resource yara_rule behavioral2/memory/1992-10-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/1992-13-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/1992-15-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/1992-18-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/1992-17-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/3936-25-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/3936-26-0x0000000010000000-0x000000001004D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 3652 3936 WerFault.exe 92 4328 3936 WerFault.exe 92 4392 2260 WerFault.exe 91 4800 2260 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e25d2f5f09c95ea6c0dd5e5db8be55dac4bf913f87e4ac1ab8ce863027432ce1N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language osmnl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language osmnl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Launcher.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3096 MicrosoftEdgeUpdate.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4460 osmnl.exe 4460 osmnl.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3916 wrote to memory of 4460 3916 e25d2f5f09c95ea6c0dd5e5db8be55dac4bf913f87e4ac1ab8ce863027432ce1N.exe 86 PID 3916 wrote to memory of 4460 3916 e25d2f5f09c95ea6c0dd5e5db8be55dac4bf913f87e4ac1ab8ce863027432ce1N.exe 86 PID 3916 wrote to memory of 4460 3916 e25d2f5f09c95ea6c0dd5e5db8be55dac4bf913f87e4ac1ab8ce863027432ce1N.exe 86 PID 4460 wrote to memory of 1992 4460 osmnl.exe 90 PID 4460 wrote to memory of 1992 4460 osmnl.exe 90 PID 4460 wrote to memory of 1992 4460 osmnl.exe 90 PID 4460 wrote to memory of 1992 4460 osmnl.exe 90 PID 4460 wrote to memory of 1992 4460 osmnl.exe 90 PID 4460 wrote to memory of 1992 4460 osmnl.exe 90 PID 4460 wrote to memory of 1992 4460 osmnl.exe 90 PID 4460 wrote to memory of 1992 4460 osmnl.exe 90 PID 3916 wrote to memory of 2260 3916 e25d2f5f09c95ea6c0dd5e5db8be55dac4bf913f87e4ac1ab8ce863027432ce1N.exe 91 PID 3916 wrote to memory of 2260 3916 e25d2f5f09c95ea6c0dd5e5db8be55dac4bf913f87e4ac1ab8ce863027432ce1N.exe 91 PID 3916 wrote to memory of 2260 3916 e25d2f5f09c95ea6c0dd5e5db8be55dac4bf913f87e4ac1ab8ce863027432ce1N.exe 91 PID 1992 wrote to memory of 3936 1992 osmnl.exe 92 PID 1992 wrote to memory of 3936 1992 osmnl.exe 92 PID 1992 wrote to memory of 3936 1992 osmnl.exe 92 PID 1992 wrote to memory of 3936 1992 osmnl.exe 92 PID 1992 wrote to memory of 764 1992 osmnl.exe 93 PID 1992 wrote to memory of 764 1992 osmnl.exe 93 PID 1992 wrote to memory of 764 1992 osmnl.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\e25d2f5f09c95ea6c0dd5e5db8be55dac4bf913f87e4ac1ab8ce863027432ce1N.exe"C:\Users\Admin\AppData\Local\Temp\e25d2f5f09c95ea6c0dd5e5db8be55dac4bf913f87e4ac1ab8ce863027432ce1N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\osmnl.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\osmnl.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\osmnl.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\osmnl.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- System Location Discovery: System Language Discovery
PID:3936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3936 -s 5045⤵
- Program crash
PID:3652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3936 -s 5125⤵
- Program crash
PID:4328
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"4⤵PID:764
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Launcher.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Launcher.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2260 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2260 -s 8243⤵
- Program crash
PID:4392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2260 -s 8563⤵
- Program crash
PID:4800
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3936 -ip 39361⤵PID:2368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3936 -ip 39361⤵PID:396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2260 -ip 22601⤵PID:4352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2260 -ip 22601⤵PID:2984
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7Q0ZBOUU2OUQtMTY3Qi00MTBCLThCRTItQzkwREQzQjZFQjNCfSIgdXNlcmlkPSJ7RDEyNjlDRDEtQTRBQi00MEY3LUEwQzEtQUJENEU5NTc0REREfSIgaW5zdGFsbHNvdXJjZT0ibGltaXRlZCIgcmVxdWVzdGlkPSJ7RjQ2NkE3RjktNDU3NC00QUE2LUE3QUUtMDFEOEI0RTVGNkZDfSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjIiIHBoeXNtZW1vcnk9IjQiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4xOTA0MS4xMjg4IiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O0UreGJBejZZNnNVMTI4OWJTNnFsNFZSTGJramZCVUdUTUpzanJIcjQ0aUk9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI1IiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODIxNjkiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1MzE4NTEwMTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI0OTQ4MjM5ODMyIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:3096
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
799KB
MD5ebc6be19c16f96c9c32ce8c1e9f305c3
SHA1cec8bd4eac6a1b32024b62dd0a73fd7e8ae72658
SHA2560ff0f089829eb2952d33b694161924bde78e0dfb60a80df082ce618ec7b72944
SHA512a2148001191b10fc6bd2a7bf0b85e00b825d1ac42389ec16b91a4f64bb6096c7257ef1b3a5fb88ccb2b59fa130a2b02d30ad5c85a94894de0ec6f86eb0a071f9
-
Filesize
650KB
MD526ef202fea01db6426848b2b949c1916
SHA19e4fdd1d5f12f891882b8bdbcdf8b8cff9b14f22
SHA256d020bd6a5b4e40398dd9b21003c5340748f0a8ce5290a9efc3608099b57b4601
SHA5128388f77ce7955393c91ad6397cce15f5fe51821390e4d422199f06ff6d1a160da4f15c47ad892f26af778bb8402734f5093c6f572f675ef4228ee99fe85ee15d