Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
12/04/2025, 09:10
Static task
static1
Behavioral task
behavioral1
Sample
manifest.rtf.scr
Resource
win10v2004-20250410-en
General
-
Target
manifest.rtf.scr
-
Size
907KB
-
MD5
71c5d618ca7c23f9a047a09ff1e85439
-
SHA1
94a8f295935cad0cd03017b23ce115931f7c13f6
-
SHA256
0e9b42ef9a5663d38c5cf3161488086a36e04834a6b231bf87486efa56081e3a
-
SHA512
950683cb16158c461a68cc61f890492492d9eb25a2fd4a0712ded084d1d4b98dbcef80c3de14f0670cc44fd0c68c9cf9252e752a5cbc93b7dcf22f90b141b701
-
SSDEEP
12288:2hkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4a0CI5YRBuhI0SjxXt3M1h:mRmJkcoQricOIQxiZY1ianaYCuxy1h
Malware Config
Extracted
xtremerat
xialscox.no-ip.org
$xialscox.no-ip.org
Signatures
-
Detect XtremeRAT payload 8 IoCs
resource yara_rule behavioral1/memory/1732-8-0x0000000000C80000-0x0000000000CA3000-memory.dmp family_xtremerat behavioral1/memory/1732-9-0x0000000000C80000-0x0000000000CA3000-memory.dmp family_xtremerat behavioral1/memory/1732-10-0x0000000000C80000-0x0000000000CA3000-memory.dmp family_xtremerat behavioral1/memory/1732-11-0x0000000000C80000-0x0000000000CA3000-memory.dmp family_xtremerat behavioral1/memory/4464-18-0x0000000000C80000-0x0000000000CA3000-memory.dmp family_xtremerat behavioral1/memory/4408-20-0x0000000000C80000-0x0000000000CA3000-memory.dmp family_xtremerat behavioral1/memory/1732-23-0x0000000000C80000-0x0000000000CA3000-memory.dmp family_xtremerat behavioral1/memory/4408-25-0x0000000000C80000-0x0000000000CA3000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{16IO55VS-GSOS-47VN-IJP8-4ODND72YC4Y5}\StubPath = "C:\\Windows\\system32\\Sysfiles\\csrss.exe restart" manifest.rtf.scr Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{16IO55VS-GSOS-47VN-IJP8-4ODND72YC4Y5} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{16IO55VS-GSOS-47VN-IJP8-4ODND72YC4Y5}\StubPath = "C:\\Windows\\system32\\Sysfiles\\csrss.exe restart" svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{16IO55VS-GSOS-47VN-IJP8-4ODND72YC4Y5} manifest.rtf.scr -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\Sysfiles\\csrss.exe" manifest.rtf.scr Set value (str) \REGISTRY\USER\S-1-5-21-3027557611-1484967174-339164627-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\Sysfiles\\csrss.exe" manifest.rtf.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\Sysfiles\\csrss.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027557611-1484967174-339164627-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\Sysfiles\\csrss.exe" svchost.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00070000000241d8-19.dat autoit_exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Sysfiles\csrss.exe manifest.rtf.scr File created C:\Windows\SysWOW64\Sysfiles\csrss.exe manifest.rtf.scr File opened for modification C:\Windows\SysWOW64\Sysfiles\ manifest.rtf.scr -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4616 set thread context of 1732 4616 manifest.rtf.scr 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language manifest.rtf.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language manifest.rtf.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4616 manifest.rtf.scr 4616 manifest.rtf.scr 4616 manifest.rtf.scr 4616 manifest.rtf.scr 4616 manifest.rtf.scr 4616 manifest.rtf.scr -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4408 explorer.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 4616 wrote to memory of 1732 4616 manifest.rtf.scr 86 PID 4616 wrote to memory of 1732 4616 manifest.rtf.scr 86 PID 4616 wrote to memory of 1732 4616 manifest.rtf.scr 86 PID 4616 wrote to memory of 1732 4616 manifest.rtf.scr 86 PID 4616 wrote to memory of 1732 4616 manifest.rtf.scr 86 PID 4616 wrote to memory of 1732 4616 manifest.rtf.scr 86 PID 4616 wrote to memory of 1732 4616 manifest.rtf.scr 86 PID 4616 wrote to memory of 1732 4616 manifest.rtf.scr 86 PID 4616 wrote to memory of 1732 4616 manifest.rtf.scr 86 PID 4616 wrote to memory of 1732 4616 manifest.rtf.scr 86 PID 4616 wrote to memory of 1732 4616 manifest.rtf.scr 86 PID 4616 wrote to memory of 1732 4616 manifest.rtf.scr 86 PID 4616 wrote to memory of 1732 4616 manifest.rtf.scr 86 PID 1732 wrote to memory of 4464 1732 manifest.rtf.scr 89 PID 1732 wrote to memory of 4464 1732 manifest.rtf.scr 89 PID 1732 wrote to memory of 4464 1732 manifest.rtf.scr 89 PID 1732 wrote to memory of 4464 1732 manifest.rtf.scr 89 PID 1732 wrote to memory of 4408 1732 manifest.rtf.scr 90 PID 1732 wrote to memory of 4408 1732 manifest.rtf.scr 90 PID 1732 wrote to memory of 4408 1732 manifest.rtf.scr 90 PID 1732 wrote to memory of 4528 1732 manifest.rtf.scr 91 PID 1732 wrote to memory of 4528 1732 manifest.rtf.scr 91 PID 1732 wrote to memory of 4528 1732 manifest.rtf.scr 91 PID 1732 wrote to memory of 4408 1732 manifest.rtf.scr 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\manifest.rtf.scr"C:\Users\Admin\AppData\Local\Temp\manifest.rtf.scr" /S1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\manifest.rtf.scr"C:\Users\Admin\AppData\Local\Temp\manifest.rtf.scr"2⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4464
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4408
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:4528
-
-
Network
MITRE ATT&CK Enterprise v16
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
107KB
MD577907062630cd5d3d0946f2632f7a389
SHA16dc199486b91478ff557c3051bff5d662ad594cb
SHA256383f054b22f0158a81fc16b35f7cf540dbff7623c1569793f459972f33c28f48
SHA512182be6a1f3a06c312abe9d56834580d34ca358f9d1bce934332349e04b7f60e597a0d72a4b148a375ae848479694644c1f8b9e907111e26dbdf33b3df6293f1a
-
Filesize
907KB
MD571c5d618ca7c23f9a047a09ff1e85439
SHA194a8f295935cad0cd03017b23ce115931f7c13f6
SHA2560e9b42ef9a5663d38c5cf3161488086a36e04834a6b231bf87486efa56081e3a
SHA512950683cb16158c461a68cc61f890492492d9eb25a2fd4a0712ded084d1d4b98dbcef80c3de14f0670cc44fd0c68c9cf9252e752a5cbc93b7dcf22f90b141b701