Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
28-06-2024 08:37
Static task
static1
Behavioral task
behavioral1
Sample
197a60c3cde177d24658d2039a339277_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
197a60c3cde177d24658d2039a339277_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
197a60c3cde177d24658d2039a339277_JaffaCakes118.exe
-
Size
62KB
-
MD5
197a60c3cde177d24658d2039a339277
-
SHA1
cb61de48f8d637b74d8fbeedefccc3dcdc71be63
-
SHA256
109dc6e3248382d75f7738d9baee75d9108835fcaeb80ebf0737aff12cd32791
-
SHA512
b5a5a6e7cc815007148ae7e858273b24c1fa0f4ef7fc73131e0379ef1b1f41590b36fa963b36abe51579829bc265505edf99cdc21b4176a7c71b6f5e709e29a3
-
SSDEEP
1536:m7np1NrsdF0XR0YahvxcajcyUVKRNYnvcOiJNpowRqR7rM:mF1NYdF6R5ahvx5jd0KRNs09JNSr7o
Malware Config
Signatures
-
Detect XtremeRAT payload 3 IoCs
resource yara_rule behavioral1/memory/2100-12-0x0000000010000000-0x000000001004C000-memory.dmp family_xtremerat behavioral1/memory/2100-10-0x0000000010000000-0x000000001004C000-memory.dmp family_xtremerat behavioral1/memory/2100-14-0x0000000010000000-0x000000001004C000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2484 set thread context of 2100 2484 197a60c3cde177d24658d2039a339277_JaffaCakes118.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2484 197a60c3cde177d24658d2039a339277_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2484 wrote to memory of 2100 2484 197a60c3cde177d24658d2039a339277_JaffaCakes118.exe 28 PID 2484 wrote to memory of 2100 2484 197a60c3cde177d24658d2039a339277_JaffaCakes118.exe 28 PID 2484 wrote to memory of 2100 2484 197a60c3cde177d24658d2039a339277_JaffaCakes118.exe 28 PID 2484 wrote to memory of 2100 2484 197a60c3cde177d24658d2039a339277_JaffaCakes118.exe 28 PID 2484 wrote to memory of 2100 2484 197a60c3cde177d24658d2039a339277_JaffaCakes118.exe 28 PID 2484 wrote to memory of 2100 2484 197a60c3cde177d24658d2039a339277_JaffaCakes118.exe 28 PID 2484 wrote to memory of 2100 2484 197a60c3cde177d24658d2039a339277_JaffaCakes118.exe 28 PID 2484 wrote to memory of 2100 2484 197a60c3cde177d24658d2039a339277_JaffaCakes118.exe 28 PID 2100 wrote to memory of 2132 2100 197a60c3cde177d24658d2039a339277_JaffaCakes118.exe 29 PID 2100 wrote to memory of 2132 2100 197a60c3cde177d24658d2039a339277_JaffaCakes118.exe 29 PID 2100 wrote to memory of 2132 2100 197a60c3cde177d24658d2039a339277_JaffaCakes118.exe 29 PID 2100 wrote to memory of 2132 2100 197a60c3cde177d24658d2039a339277_JaffaCakes118.exe 29 PID 2100 wrote to memory of 2132 2100 197a60c3cde177d24658d2039a339277_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\197a60c3cde177d24658d2039a339277_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\197a60c3cde177d24658d2039a339277_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\197a60c3cde177d24658d2039a339277_JaffaCakes118.exe
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2132
-
-