Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09-04-2024 15:55
Static task
static1
Behavioral task
behavioral1
Sample
ea5b81ef79adb077ed832aae119fb0be_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ea5b81ef79adb077ed832aae119fb0be_JaffaCakes118.exe
Resource
win10v2004-20240319-en
General
-
Target
ea5b81ef79adb077ed832aae119fb0be_JaffaCakes118.exe
-
Size
344KB
-
MD5
ea5b81ef79adb077ed832aae119fb0be
-
SHA1
85078dda8bfe43db70d3cc85fb877a1fa5132f33
-
SHA256
40fda4ca6342e7bff03b1a55cf1414b9099b86a4beab4a65eedfdc98103c388d
-
SHA512
4a7783ffd50a669cc58b4b9d518648f8e4bfdb6399b555b231a5f0695c7d69aaad4b6ee28878e63e204d26a86818429b6d98647fa52586b87c3d18b180caf92d
-
SSDEEP
6144:SNW7mvIZNC7rGN3bkty0Mki8787O71rkhJSammcmZq:QW7SIa7rGNrkty0fkhAlmvq
Malware Config
Signatures
-
Detect XtremeRAT payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2776-15-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral1/memory/2592-27-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral1/memory/2776-28-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral1/memory/2592-29-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Executes dropped EXE 2 IoCs
Processes:
server.exestub.exepid process 2776 server.exe 1792 stub.exe -
Loads dropped DLL 4 IoCs
Processes:
ea5b81ef79adb077ed832aae119fb0be_JaffaCakes118.exepid process 2912 ea5b81ef79adb077ed832aae119fb0be_JaffaCakes118.exe 2912 ea5b81ef79adb077ed832aae119fb0be_JaffaCakes118.exe 2912 ea5b81ef79adb077ed832aae119fb0be_JaffaCakes118.exe 2912 ea5b81ef79adb077ed832aae119fb0be_JaffaCakes118.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\server.exe upx behavioral1/memory/2776-15-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/2592-27-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/2776-28-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/2592-29-0x0000000010000000-0x000000001004D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
ea5b81ef79adb077ed832aae119fb0be_JaffaCakes118.exestub.exepid process 2912 ea5b81ef79adb077ed832aae119fb0be_JaffaCakes118.exe 1792 stub.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
ea5b81ef79adb077ed832aae119fb0be_JaffaCakes118.exeserver.exedescription pid process target process PID 2912 wrote to memory of 2776 2912 ea5b81ef79adb077ed832aae119fb0be_JaffaCakes118.exe server.exe PID 2912 wrote to memory of 2776 2912 ea5b81ef79adb077ed832aae119fb0be_JaffaCakes118.exe server.exe PID 2912 wrote to memory of 2776 2912 ea5b81ef79adb077ed832aae119fb0be_JaffaCakes118.exe server.exe PID 2912 wrote to memory of 2776 2912 ea5b81ef79adb077ed832aae119fb0be_JaffaCakes118.exe server.exe PID 2912 wrote to memory of 1792 2912 ea5b81ef79adb077ed832aae119fb0be_JaffaCakes118.exe stub.exe PID 2912 wrote to memory of 1792 2912 ea5b81ef79adb077ed832aae119fb0be_JaffaCakes118.exe stub.exe PID 2912 wrote to memory of 1792 2912 ea5b81ef79adb077ed832aae119fb0be_JaffaCakes118.exe stub.exe PID 2912 wrote to memory of 1792 2912 ea5b81ef79adb077ed832aae119fb0be_JaffaCakes118.exe stub.exe PID 2776 wrote to memory of 2592 2776 server.exe svchost.exe PID 2776 wrote to memory of 2592 2776 server.exe svchost.exe PID 2776 wrote to memory of 2592 2776 server.exe svchost.exe PID 2776 wrote to memory of 2592 2776 server.exe svchost.exe PID 2776 wrote to memory of 2592 2776 server.exe svchost.exe PID 2776 wrote to memory of 2556 2776 server.exe iexplore.exe PID 2776 wrote to memory of 2556 2776 server.exe iexplore.exe PID 2776 wrote to memory of 2556 2776 server.exe iexplore.exe PID 2776 wrote to memory of 2556 2776 server.exe iexplore.exe PID 2776 wrote to memory of 2556 2776 server.exe iexplore.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea5b81ef79adb077ed832aae119fb0be_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea5b81ef79adb077ed832aae119fb0be_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe" 02⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\stub.exe"C:\Users\Admin\AppData\Local\Temp\stub.exe" 02⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\server.exeFilesize
33KB
MD56ba9aeea2cfc136a045b3b4c291e85b5
SHA17d38a526512bb3bbf92225c25702753e6eaacecd
SHA256161a15b89f83419c96cb73f83176e6845b51a682e3a39592639950880e35bca9
SHA512c0d3bba772ab70a4491701b833fc151c79987a540e928b9d21e166a2029f73800d4a54e7bd533d17999b7fa3022c1fc064a63b1cbc56103a7278f492dca93f18
-
\Users\Admin\AppData\Local\Temp\stub.exeFilesize
300KB
MD58a45fe85898666c75dc0ce2fd878d340
SHA18346d03c553a85c5046a154123adb1af454e3717
SHA25647a6e501e51c466d43bb7638de421b4c30b80e24cdfeeedafab82b06ba41534a
SHA5120941c2c170ce2a1991f301caad8a237cd67f5df972718acfe7b7b6c0beb5be0ba7bc817d21405b0981d90993aa6e725d4b4f76ac54686e47e299cf6fc396a1bb
-
memory/2592-25-0x0000000010000000-0x000000001004D000-memory.dmpFilesize
308KB
-
memory/2592-27-0x0000000010000000-0x000000001004D000-memory.dmpFilesize
308KB
-
memory/2592-29-0x0000000010000000-0x000000001004D000-memory.dmpFilesize
308KB
-
memory/2776-15-0x0000000010000000-0x000000001004D000-memory.dmpFilesize
308KB
-
memory/2776-28-0x0000000010000000-0x000000001004D000-memory.dmpFilesize
308KB
-
memory/2912-11-0x0000000010000000-0x000000001004D000-memory.dmpFilesize
308KB
-
memory/2912-14-0x0000000010000000-0x000000001004D000-memory.dmpFilesize
308KB