Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    28-06-2024 08:37

General

  • Target

    197a60c3cde177d24658d2039a339277_JaffaCakes118.exe

  • Size

    62KB

  • MD5

    197a60c3cde177d24658d2039a339277

  • SHA1

    cb61de48f8d637b74d8fbeedefccc3dcdc71be63

  • SHA256

    109dc6e3248382d75f7738d9baee75d9108835fcaeb80ebf0737aff12cd32791

  • SHA512

    b5a5a6e7cc815007148ae7e858273b24c1fa0f4ef7fc73131e0379ef1b1f41590b36fa963b36abe51579829bc265505edf99cdc21b4176a7c71b6f5e709e29a3

  • SSDEEP

    1536:m7np1NrsdF0XR0YahvxcajcyUVKRNYnvcOiJNpowRqR7rM:mF1NYdF6R5ahvx5jd0KRNs09JNSr7o

Malware Config

Signatures

  • Detect XtremeRAT payload 3 IoCs
  • XtremeRAT

    The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\197a60c3cde177d24658d2039a339277_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\197a60c3cde177d24658d2039a339277_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2484
    • C:\Users\Admin\AppData\Local\Temp\197a60c3cde177d24658d2039a339277_JaffaCakes118.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2100
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        3⤵
          PID:2132

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2100-2-0x0000000010000000-0x000000001004C000-memory.dmp

      Filesize

      304KB

    • memory/2100-9-0x0000000010000000-0x000000001004C000-memory.dmp

      Filesize

      304KB

    • memory/2100-7-0x0000000010000000-0x000000001004C000-memory.dmp

      Filesize

      304KB

    • memory/2100-5-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2100-4-0x0000000010000000-0x000000001004C000-memory.dmp

      Filesize

      304KB

    • memory/2100-12-0x0000000010000000-0x000000001004C000-memory.dmp

      Filesize

      304KB

    • memory/2100-13-0x0000000000220000-0x0000000000221000-memory.dmp

      Filesize

      4KB

    • memory/2100-10-0x0000000010000000-0x000000001004C000-memory.dmp

      Filesize

      304KB

    • memory/2100-3-0x0000000010000000-0x000000001004C000-memory.dmp

      Filesize

      304KB

    • memory/2100-14-0x0000000010000000-0x000000001004C000-memory.dmp

      Filesize

      304KB