Analysis
-
max time kernel
152s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17-04-2024 17:24
Static task
static1
Behavioral task
behavioral1
Sample
f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe
-
Size
93KB
-
MD5
f64a83456bc601bb3aeebfdc6094057a
-
SHA1
dd117d3c5b1051c12abe3e521ac2c0e28caaa646
-
SHA256
121cf6c76608b2554ad1566c64ec8c0350d123b156cb8bd61fd7c35574958066
-
SHA512
42e791a94a22402ea428962888926cb086704d3c6888e9e12bd8f5ad2781bf9632cae1a6fd351795123c8d8bba83d8c8a4fab6c91a73508ba7927394d391789a
-
SSDEEP
1536:dOCc/KRA9EMj3IBAgVfiSTfSA8ZrggRK2AhFn+okzhF5mG4ffabCbn6cdsIlU7K+:dOCcCRjMkAgVfLTfx6rgeq8L5F0fpnjO
Malware Config
Extracted
xtremerat
turkoteste.no-ip.org
Signatures
-
Detect XtremeRAT payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2652-46-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral1/memory/2652-45-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral1/memory/2448-50-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral1/memory/2448-65-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\xOgpjApf.exe" reg.exe -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Processes:
resource yara_rule behavioral1/memory/2652-36-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/2652-40-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/2652-38-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/2652-44-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/2652-46-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/2652-45-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/2448-50-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/2448-65-0x0000000010000000-0x000000001004D000-memory.dmp upx -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xOgpjApf.exe" f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe -
Suspicious use of SetThreadContext 10 IoCs
Processes:
f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exedescription pid process target process PID 1740 set thread context of 2652 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1740 set thread context of 1804 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1740 set thread context of 1872 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1740 set thread context of 940 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1740 set thread context of 2168 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1740 set thread context of 1908 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1740 set thread context of 884 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1740 set thread context of 688 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1740 set thread context of 1524 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1740 set thread context of 1640 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exepid process 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exedescription pid process Token: SeDebugPrivilege 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.execsc.exevbc.execmd.exevbc.exevbc.exedescription pid process target process PID 1740 wrote to memory of 2272 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe csc.exe PID 1740 wrote to memory of 2272 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe csc.exe PID 1740 wrote to memory of 2272 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe csc.exe PID 1740 wrote to memory of 2272 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe csc.exe PID 2272 wrote to memory of 2552 2272 csc.exe cvtres.exe PID 2272 wrote to memory of 2552 2272 csc.exe cvtres.exe PID 2272 wrote to memory of 2552 2272 csc.exe cvtres.exe PID 2272 wrote to memory of 2552 2272 csc.exe cvtres.exe PID 1740 wrote to memory of 2652 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1740 wrote to memory of 2652 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1740 wrote to memory of 2652 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1740 wrote to memory of 2652 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1740 wrote to memory of 2652 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1740 wrote to memory of 2652 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1740 wrote to memory of 2652 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1740 wrote to memory of 2652 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 2652 wrote to memory of 2448 2652 vbc.exe svchost.exe PID 2652 wrote to memory of 2448 2652 vbc.exe svchost.exe PID 2652 wrote to memory of 2448 2652 vbc.exe svchost.exe PID 2652 wrote to memory of 2448 2652 vbc.exe svchost.exe PID 1740 wrote to memory of 2596 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe cmd.exe PID 1740 wrote to memory of 2596 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe cmd.exe PID 1740 wrote to memory of 2596 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe cmd.exe PID 1740 wrote to memory of 2596 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe cmd.exe PID 2652 wrote to memory of 2448 2652 vbc.exe svchost.exe PID 2652 wrote to memory of 2496 2652 vbc.exe iexplore.exe PID 2652 wrote to memory of 2496 2652 vbc.exe iexplore.exe PID 2652 wrote to memory of 2496 2652 vbc.exe iexplore.exe PID 2652 wrote to memory of 2496 2652 vbc.exe iexplore.exe PID 2596 wrote to memory of 2452 2596 cmd.exe reg.exe PID 2596 wrote to memory of 2452 2596 cmd.exe reg.exe PID 2596 wrote to memory of 2452 2596 cmd.exe reg.exe PID 2596 wrote to memory of 2452 2596 cmd.exe reg.exe PID 2652 wrote to memory of 2496 2652 vbc.exe iexplore.exe PID 1740 wrote to memory of 1804 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1740 wrote to memory of 1804 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1740 wrote to memory of 1804 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1740 wrote to memory of 1804 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1740 wrote to memory of 1804 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1740 wrote to memory of 1804 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1740 wrote to memory of 1804 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1740 wrote to memory of 1804 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1804 wrote to memory of 764 1804 vbc.exe iexplore.exe PID 1804 wrote to memory of 764 1804 vbc.exe iexplore.exe PID 1804 wrote to memory of 764 1804 vbc.exe iexplore.exe PID 1804 wrote to memory of 764 1804 vbc.exe iexplore.exe PID 1804 wrote to memory of 764 1804 vbc.exe iexplore.exe PID 1740 wrote to memory of 1872 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1740 wrote to memory of 1872 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1740 wrote to memory of 1872 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1740 wrote to memory of 1872 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1740 wrote to memory of 1872 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1740 wrote to memory of 1872 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1740 wrote to memory of 1872 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1740 wrote to memory of 1872 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1872 wrote to memory of 2768 1872 vbc.exe iexplore.exe PID 1872 wrote to memory of 2768 1872 vbc.exe iexplore.exe PID 1872 wrote to memory of 2768 1872 vbc.exe iexplore.exe PID 1872 wrote to memory of 2768 1872 vbc.exe iexplore.exe PID 1872 wrote to memory of 2768 1872 vbc.exe iexplore.exe PID 1740 wrote to memory of 940 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1740 wrote to memory of 940 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1740 wrote to memory of 940 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe PID 1740 wrote to memory of 940 1740 f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f64a83456bc601bb3aeebfdc6094057a_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\w491tyvd.cmdline"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES59A5.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC59A4.tmp"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v shell /t REG_SZ /d explorer.exe,"C:\Users\Admin\AppData\Local\Temp\xOgpjApf.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v shell /t REG_SZ /d explorer.exe,"C:\Users\Admin\AppData\Local\Temp\xOgpjApf.exe"3⤵
- Modifies WinLogon for persistence
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RES59A5.tmpFilesize
1KB
MD52207d10a783e07ab05a65ff240e41012
SHA17e811770b7b8e6e882186a3b8a5df12c6f473c7a
SHA25612077723e269a24535b9e9b2c95308c69d8edab7324c61bebf64a4b2d6bbc4a5
SHA512283777414435f69e93b8226fddd823148d3a9d0bf9f59af62d0750d2ba6774a8402769338580fa6512ed2fef657b49e21118b7820af768ec86d270aa4164525d
-
C:\Users\Admin\AppData\Local\Temp\w491tyvd.dllFilesize
180KB
MD5e91855d1887d9547a39f5f19c927363f
SHA17297a931069a7bab1c9511f7a0133d386f711a07
SHA25673527d37fcb4620456ff6dcfb247ff64ef0bfba2ec63e1d9a5baf01bd03bdde1
SHA51220f073cf694b7ca32e37a081f74be5532de87f118c7000411224bd71600c1479e2d7cddf31145c63bf7fbd4c67727c1048dc0e1f192b248787153c77e782d0a5
-
\??\c:\Users\Admin\AppData\Local\Temp\CSC59A4.tmpFilesize
652B
MD5e3128300ddb0046526e714224ef35829
SHA12d63873f51b33f5fca26d63aad4a89f61020c64b
SHA2563f25881f373ae317416f9a73320a39dd1c96a57a5c7c42adca9a6b543da0cfdf
SHA512167303b2f1b82118ce7c934e6de5386ff88a1edf61dc69a40247dc28a07befe12d4b03ef6952c013dae3b6337f5fdfaa6d96414b107a017f5995d7bc44036e90
-
\??\c:\Users\Admin\AppData\Local\Temp\tmp5813.tmp.txtFilesize
82KB
MD5ad9c893a0c6c4d7e294fd49128b800b1
SHA153f9fb024d7aee77abf25f7a5e45ab7e3f4b740c
SHA25609698cf156fe094e7344b3d782fb76cccc023ae90c8a809cd209f762131198c5
SHA51203641922120114044d63a312dc309de67351de631e0cba396100781e8a009fb7ac309c5bdcbcb3a38fdfe4a8a413c9912e5b40b9b9ef7d12a3caadbdb9fd07be
-
\??\c:\Users\Admin\AppData\Local\Temp\w491tyvd.cmdlineFilesize
196B
MD5233c8c315d385b507ef93aa63fb9c8ff
SHA1a979376f097b34a168f48c61ef6f2c595df3bb7f
SHA2563d608162f66ce652a78f5fe214dff51ca702cb6ccf4763a7ff78b2c84f5811f6
SHA512848e801c1e5799b5199c4a4034e978dcf0da47a5851ffac0748a36bc50c77952b220f3bcc769efd51dbf9aa03a6b8f792db1fb8eff9417f6878596a7c8f1abbc
-
memory/1740-1-0x0000000074380000-0x000000007492B000-memory.dmpFilesize
5.7MB
-
memory/1740-2-0x0000000000660000-0x00000000006A0000-memory.dmpFilesize
256KB
-
memory/1740-0-0x0000000074380000-0x000000007492B000-memory.dmpFilesize
5.7MB
-
memory/1740-52-0x0000000000660000-0x00000000006A0000-memory.dmpFilesize
256KB
-
memory/1740-51-0x0000000074380000-0x000000007492B000-memory.dmpFilesize
5.7MB
-
memory/2272-26-0x0000000001F50000-0x0000000001F90000-memory.dmpFilesize
256KB
-
memory/2448-50-0x0000000010000000-0x000000001004D000-memory.dmpFilesize
308KB
-
memory/2448-65-0x0000000010000000-0x000000001004D000-memory.dmpFilesize
308KB
-
memory/2652-35-0x0000000010000000-0x000000001004D000-memory.dmpFilesize
308KB
-
memory/2652-44-0x0000000010000000-0x000000001004D000-memory.dmpFilesize
308KB
-
memory/2652-46-0x0000000010000000-0x000000001004D000-memory.dmpFilesize
308KB
-
memory/2652-45-0x0000000010000000-0x000000001004D000-memory.dmpFilesize
308KB
-
memory/2652-38-0x0000000010000000-0x000000001004D000-memory.dmpFilesize
308KB
-
memory/2652-40-0x0000000010000000-0x000000001004D000-memory.dmpFilesize
308KB
-
memory/2652-41-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2652-36-0x0000000010000000-0x000000001004D000-memory.dmpFilesize
308KB