Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
02-06-2024 05:30
Static task
static1
Behavioral task
behavioral1
Sample
8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe
-
Size
205KB
-
MD5
8d087c1bd01b5abe21fdbaa3ccd47fb5
-
SHA1
8b1ce8ea035d0c831561e6ee3d59dbca27cf35ec
-
SHA256
740c2f18b582ea1fcb0b92e67797f26ff2153ca6bba7059bf622af49406fec20
-
SHA512
72f795f49156dc529a214c94da343b8ea5c8df207fa5a137108636ef9eb051be16e1e24eb5c186af1a7a42230b50ba30205806b9434eb0bbb897f9a1b76150c6
-
SSDEEP
3072:hlSHsZ4T48Bxyvc9rfHhbfwMHDho85R/grs3+5ozbyUUHCYD2tkP9a+pkEtkP:3hbvc9VfwMHD55x3u5oCUUHCA2OhpkE
Malware Config
Extracted
xtremerat
systemservices.no-ip.biz
Signatures
-
Detect XtremeRAT payload 10 IoCs
Processes:
resource yara_rule behavioral2/memory/1704-5-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/1704-6-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/1704-8-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/1704-10-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/4912-11-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/1452-12-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/1704-13-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/1452-15-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/4912-16-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/1452-17-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
notepad.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{1MU53I2Y-1S6I-HB78-0360-5810132VHV3K} notepad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1MU53I2Y-1S6I-HB78-0360-5810132VHV3K}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\system5\\system5.exe restart" notepad.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
notepad.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system5 = "C:\\Users\\Admin\\AppData\\Roaming\\system5\\system5.exe" notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\system5 = "C:\\Users\\Admin\\AppData\\Roaming\\system5\\system5.exe" notepad.exe -
Drops desktop.ini file(s) 2 IoCs
Processes:
8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exedescription ioc process File created C:\Windows\assembly\Desktop.ini 8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe File opened for modification C:\Windows\assembly\Desktop.ini 8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exedescription pid process target process PID 4136 set thread context of 1704 4136 8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe 8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe -
Drops file in Windows directory 3 IoCs
Processes:
8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exedescription ioc process File opened for modification C:\Windows\assembly 8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe File created C:\Windows\assembly\Desktop.ini 8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe File opened for modification C:\Windows\assembly\Desktop.ini 8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1496 4912 WerFault.exe svchost.exe 2428 4912 WerFault.exe svchost.exe 3360 1452 WerFault.exe notepad.exe 3264 1452 WerFault.exe notepad.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exedescription pid process Token: SeDebugPrivilege 4136 8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
notepad.exepid process 1452 notepad.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exedescription pid process target process PID 4136 wrote to memory of 1704 4136 8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe 8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe PID 4136 wrote to memory of 1704 4136 8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe 8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe PID 4136 wrote to memory of 1704 4136 8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe 8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe PID 4136 wrote to memory of 1704 4136 8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe 8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe PID 4136 wrote to memory of 1704 4136 8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe 8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe PID 4136 wrote to memory of 1704 4136 8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe 8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe PID 4136 wrote to memory of 1704 4136 8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe 8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe PID 4136 wrote to memory of 1704 4136 8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe 8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe PID 4136 wrote to memory of 1704 4136 8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe 8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe PID 4136 wrote to memory of 1704 4136 8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe 8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe PID 4136 wrote to memory of 1704 4136 8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe 8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe PID 4136 wrote to memory of 1704 4136 8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe 8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe PID 4136 wrote to memory of 1704 4136 8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe 8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe PID 1704 wrote to memory of 4912 1704 8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe svchost.exe PID 1704 wrote to memory of 4912 1704 8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe svchost.exe PID 1704 wrote to memory of 4912 1704 8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe svchost.exe PID 1704 wrote to memory of 4912 1704 8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe svchost.exe PID 1704 wrote to memory of 1452 1704 8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe notepad.exe PID 1704 wrote to memory of 1452 1704 8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe notepad.exe PID 1704 wrote to memory of 1452 1704 8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe notepad.exe PID 1704 wrote to memory of 1452 1704 8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe"1⤵
- Drops desktop.ini file(s)
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\8d087c1bd01b5abe21fdbaa3ccd47fb5_JaffaCakes118.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:4912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 4924⤵
- Program crash
PID:1496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 5004⤵
- Program crash
PID:2428
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- Modifies Installed Components in the registry
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:1452 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1452 -s 9724⤵
- Program crash
PID:3360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1452 -s 9804⤵
- Program crash
PID:3264
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4912 -ip 49121⤵PID:1824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1452 -ip 14521⤵PID:3236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4912 -ip 49121⤵PID:1804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1452 -ip 14521⤵PID:4172
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4072 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:81⤵PID:4756