Analysis

  • max time kernel
    114s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-04-2024 11:03

General

  • Target

    ed458ac0ebca7757e713df92814ef846_JaffaCakes118.exe

  • Size

    549KB

  • MD5

    ed458ac0ebca7757e713df92814ef846

  • SHA1

    069b478548f326d440ef7e9baff327521f4f184b

  • SHA256

    78a5abed54c6e876ae1e18ffaf1bc2b17d925104043a51fff10e3f80a7cde403

  • SHA512

    e5c2dac6897e1f568ffab20c11ef3151bc1204659dfce228e7ac8d1c3e71b582a678a74df4b0967155e904f5a3a610d342ce93f018a4f7f15bc1d2083941025a

  • SSDEEP

    1536:KdC8MmkY7Xf9xk7/iY3j0jyTph5KRl28QBCBhSZlsffZxEJC5:KdCYz6H4sQKhMBhSUJxEG

Malware Config

Extracted

Family

xtremerat

C2

katrena1986.no-ip.biz

Signatures

  • Detect XtremeRAT payload 5 IoCs
  • XtremeRAT

    The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed458ac0ebca7757e713df92814ef846_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ed458ac0ebca7757e713df92814ef846_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4616
    • C:\Users\Admin\AppData\Local\Temp\ed458ac0ebca7757e713df92814ef846_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\ed458ac0ebca7757e713df92814ef846_JaffaCakes118.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4816
      • C:\Users\Admin\AppData\Local\Temp\ed458ac0ebca7757e713df92814ef846_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\ed458ac0ebca7757e713df92814ef846_JaffaCakes118.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4136
        • C:\Users\Admin\AppData\Local\Temp\ed458ac0ebca7757e713df92814ef846_JaffaCakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\ed458ac0ebca7757e713df92814ef846_JaffaCakes118.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4860
          • C:\Windows\SysWOW64\svchost.exe
            svchost.exe
            5⤵
              PID:2808
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 480
                6⤵
                • Program crash
                PID:4328
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 488
                6⤵
                • Program crash
                PID:1612
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
              5⤵
                PID:1716
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2808 -ip 2808
        1⤵
          PID:1416
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2808 -ip 2808
          1⤵
            PID:1404
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3524 --field-trial-handle=2228,i,521073434451423547,2311651514500527526,262144 --variations-seed-version /prefetch:8
            1⤵
              PID:4424

            Network

            MITRE ATT&CK Matrix ATT&CK v13

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/2808-23-0x0000000010000000-0x000000001004D000-memory.dmp
              Filesize

              308KB

            • memory/2808-25-0x0000000010000000-0x000000001004D000-memory.dmp
              Filesize

              308KB

            • memory/4136-8-0x0000000000400000-0x0000000000406000-memory.dmp
              Filesize

              24KB

            • memory/4136-11-0x0000000000400000-0x0000000000406000-memory.dmp
              Filesize

              24KB

            • memory/4136-18-0x0000000000400000-0x0000000000406000-memory.dmp
              Filesize

              24KB

            • memory/4816-4-0x0000000000400000-0x0000000000449000-memory.dmp
              Filesize

              292KB

            • memory/4816-5-0x0000000000400000-0x0000000000449000-memory.dmp
              Filesize

              292KB

            • memory/4816-10-0x0000000000400000-0x0000000000449000-memory.dmp
              Filesize

              292KB

            • memory/4816-2-0x0000000000400000-0x0000000000449000-memory.dmp
              Filesize

              292KB

            • memory/4860-16-0x0000000010000000-0x000000001004D000-memory.dmp
              Filesize

              308KB

            • memory/4860-22-0x0000000010000000-0x000000001004D000-memory.dmp
              Filesize

              308KB

            • memory/4860-21-0x0000000010000000-0x000000001004D000-memory.dmp
              Filesize

              308KB

            • memory/4860-24-0x0000000010000000-0x000000001004D000-memory.dmp
              Filesize

              308KB

            • memory/4860-20-0x0000000010000000-0x000000001004D000-memory.dmp
              Filesize

              308KB