Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2024, 13:34
Static task
static1
Behavioral task
behavioral1
Sample
ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe
-
Size
1.0MB
-
MD5
ed8b4f73f551891b781a74365549a514
-
SHA1
be21daeddeca6a221e10c25753f24799fbf7b345
-
SHA256
3284a173e589b196130a10eb56183e4293bfb8e2e12938fe8c03e3134f3e6dbe
-
SHA512
547b222a9f634e2c520ad46f22b963b75641d945c9eb83aa690a5cca741f4509e73495a4c6944fdfbda40b7b05e1c049a2019d067308be88b5a65b6ab9c2d601
-
SSDEEP
24576:Xbmc/W0LYQribz44VybwhuM5ekfgHXMLU/ytvb0k9kIa2:X6kW00QR5U5TU0U/yVb0k+Ia2
Malware Config
Extracted
xtremerat
123boof.no-ip.org
Signatures
-
Detect XtremeRAT payload 7 IoCs
resource yara_rule behavioral2/memory/4452-15-0x0000000010000000-0x0000000010048000-memory.dmp family_xtremerat behavioral2/memory/4452-16-0x0000000010000000-0x0000000010048000-memory.dmp family_xtremerat behavioral2/memory/4452-19-0x0000000010000000-0x0000000010048000-memory.dmp family_xtremerat behavioral2/memory/4452-21-0x0000000010000000-0x0000000010048000-memory.dmp family_xtremerat behavioral2/memory/1536-22-0x0000000010000000-0x0000000010048000-memory.dmp family_xtremerat behavioral2/memory/4452-23-0x0000000010000000-0x0000000010048000-memory.dmp family_xtremerat behavioral2/memory/1536-24-0x0000000010000000-0x0000000010048000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
resource yara_rule behavioral2/memory/2760-8-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/2760-11-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/2760-12-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/2760-20-0x0000000000400000-0x000000000045A000-memory.dmp upx -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2544 set thread context of 2760 2544 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 84 PID 2544 set thread context of 0 2544 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe PID 2760 set thread context of 4452 2760 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 85 PID 2760 set thread context of 0 2760 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1368 1536 WerFault.exe 86 5016 1536 WerFault.exe 86 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2544 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 2760 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2760 2544 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 84 PID 2544 wrote to memory of 2760 2544 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 84 PID 2544 wrote to memory of 2760 2544 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 84 PID 2544 wrote to memory of 2760 2544 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 84 PID 2544 wrote to memory of 2760 2544 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 84 PID 2544 wrote to memory of 2760 2544 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 84 PID 2544 wrote to memory of 2760 2544 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 84 PID 2544 wrote to memory of 2760 2544 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 84 PID 2544 wrote to memory of 0 2544 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe PID 2544 wrote to memory of 0 2544 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe PID 2544 wrote to memory of 0 2544 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe PID 2544 wrote to memory of 0 2544 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe PID 2544 wrote to memory of 0 2544 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe PID 2760 wrote to memory of 4452 2760 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 85 PID 2760 wrote to memory of 4452 2760 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 85 PID 2760 wrote to memory of 4452 2760 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 85 PID 2760 wrote to memory of 4452 2760 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 85 PID 2760 wrote to memory of 4452 2760 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 85 PID 2760 wrote to memory of 4452 2760 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 85 PID 2760 wrote to memory of 4452 2760 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 85 PID 2760 wrote to memory of 4452 2760 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 85 PID 2760 wrote to memory of 4452 2760 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 85 PID 2760 wrote to memory of 4452 2760 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 85 PID 2760 wrote to memory of 4452 2760 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 85 PID 2760 wrote to memory of 4452 2760 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 85 PID 2760 wrote to memory of 4452 2760 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 85 PID 2760 wrote to memory of 0 2760 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe PID 2760 wrote to memory of 0 2760 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe PID 2760 wrote to memory of 0 2760 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe PID 2760 wrote to memory of 0 2760 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe PID 2760 wrote to memory of 0 2760 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe PID 2760 wrote to memory of 0 2760 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe PID 2760 wrote to memory of 0 2760 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe PID 2760 wrote to memory of 0 2760 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe PID 2760 wrote to memory of 0 2760 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe PID 2760 wrote to memory of 0 2760 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe PID 4452 wrote to memory of 1536 4452 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 86 PID 4452 wrote to memory of 1536 4452 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 86 PID 4452 wrote to memory of 1536 4452 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 86 PID 4452 wrote to memory of 1536 4452 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 86 PID 4452 wrote to memory of 3032 4452 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 87 PID 4452 wrote to memory of 3032 4452 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 87 PID 4452 wrote to memory of 3032 4452 ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ed8b4f73f551891b781a74365549a514_JaffaCakes118.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵PID:1536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1536 -s 4805⤵
- Program crash
PID:1368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1536 -s 4885⤵
- Program crash
PID:5016
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"4⤵PID:3032
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1536 -ip 15361⤵PID:384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1536 -ip 15361⤵PID:1972