Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
11/04/2024, 13:34
Static task
static1
Behavioral task
behavioral1
Sample
ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe
-
Size
1.0MB
-
MD5
ed8b4f73f551891b781a74365549a514
-
SHA1
be21daeddeca6a221e10c25753f24799fbf7b345
-
SHA256
3284a173e589b196130a10eb56183e4293bfb8e2e12938fe8c03e3134f3e6dbe
-
SHA512
547b222a9f634e2c520ad46f22b963b75641d945c9eb83aa690a5cca741f4509e73495a4c6944fdfbda40b7b05e1c049a2019d067308be88b5a65b6ab9c2d601
-
SSDEEP
24576:Xbmc/W0LYQribz44VybwhuM5ekfgHXMLU/ytvb0k9kIa2:X6kW00QR5U5TU0U/yVb0k+Ia2
Malware Config
Extracted
xtremerat
123boof.no-ip.org
Signatures
-
Detect XtremeRAT payload 7 IoCs
resource yara_rule behavioral1/memory/2656-14-0x0000000010000000-0x0000000010048000-memory.dmp family_xtremerat behavioral1/memory/2656-18-0x0000000010000000-0x0000000010048000-memory.dmp family_xtremerat behavioral1/memory/2656-20-0x0000000010000000-0x0000000010048000-memory.dmp family_xtremerat behavioral1/memory/2656-15-0x0000000010000000-0x0000000010048000-memory.dmp family_xtremerat behavioral1/memory/2932-23-0x0000000010000000-0x0000000010048000-memory.dmp family_xtremerat behavioral1/memory/2656-24-0x0000000010000000-0x0000000010048000-memory.dmp family_xtremerat behavioral1/memory/2932-25-0x0000000010000000-0x0000000010048000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
resource yara_rule behavioral1/memory/2312-6-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2312-8-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2312-9-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2312-19-0x0000000000400000-0x000000000045A000-memory.dmp upx -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1196 set thread context of 2312 1196 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 28 PID 1196 set thread context of 0 1196 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe PID 2312 set thread context of 2656 2312 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 29 PID 2312 set thread context of 0 2312 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1196 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 2312 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1196 wrote to memory of 2312 1196 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 28 PID 1196 wrote to memory of 2312 1196 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 28 PID 1196 wrote to memory of 2312 1196 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 28 PID 1196 wrote to memory of 2312 1196 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 28 PID 1196 wrote to memory of 2312 1196 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 28 PID 1196 wrote to memory of 2312 1196 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 28 PID 1196 wrote to memory of 2312 1196 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 28 PID 1196 wrote to memory of 2312 1196 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 28 PID 1196 wrote to memory of 2312 1196 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 28 PID 1196 wrote to memory of 0 1196 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe PID 1196 wrote to memory of 0 1196 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe PID 1196 wrote to memory of 0 1196 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe PID 1196 wrote to memory of 0 1196 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe PID 1196 wrote to memory of 0 1196 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe PID 2312 wrote to memory of 2656 2312 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 29 PID 2312 wrote to memory of 2656 2312 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 29 PID 2312 wrote to memory of 2656 2312 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 29 PID 2312 wrote to memory of 2656 2312 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 29 PID 2312 wrote to memory of 2656 2312 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 29 PID 2312 wrote to memory of 2656 2312 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 29 PID 2312 wrote to memory of 2656 2312 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 29 PID 2312 wrote to memory of 2656 2312 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 29 PID 2312 wrote to memory of 2656 2312 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 29 PID 2312 wrote to memory of 2656 2312 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 29 PID 2312 wrote to memory of 2656 2312 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 29 PID 2312 wrote to memory of 2656 2312 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 29 PID 2312 wrote to memory of 2656 2312 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 29 PID 2312 wrote to memory of 2656 2312 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 29 PID 2312 wrote to memory of 0 2312 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe PID 2312 wrote to memory of 0 2312 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe PID 2312 wrote to memory of 0 2312 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe PID 2312 wrote to memory of 0 2312 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe PID 2312 wrote to memory of 0 2312 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe PID 2312 wrote to memory of 0 2312 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe PID 2312 wrote to memory of 0 2312 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe PID 2312 wrote to memory of 0 2312 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe PID 2312 wrote to memory of 0 2312 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe PID 2312 wrote to memory of 0 2312 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe PID 2656 wrote to memory of 2932 2656 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 30 PID 2656 wrote to memory of 2932 2656 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 30 PID 2656 wrote to memory of 2932 2656 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 30 PID 2656 wrote to memory of 2932 2656 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 30 PID 2656 wrote to memory of 2932 2656 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 30 PID 2656 wrote to memory of 2944 2656 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 31 PID 2656 wrote to memory of 2944 2656 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 31 PID 2656 wrote to memory of 2944 2656 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 31 PID 2656 wrote to memory of 2944 2656 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 31 PID 2656 wrote to memory of 2944 2656 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵PID:2932
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2944
-
-
-