Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07-07-2024 03:51
Behavioral task
behavioral1
Sample
29b681d68c7224e9abc90da004e64f98_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
29b681d68c7224e9abc90da004e64f98_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
29b681d68c7224e9abc90da004e64f98_JaffaCakes118.exe
-
Size
26KB
-
MD5
29b681d68c7224e9abc90da004e64f98
-
SHA1
8339c27a2d08e13d5c069d62050dd7f85880823f
-
SHA256
46b3782ab0b39b405487d552320717210cc2f80727fc4cdf0043a8c3881fe8b6
-
SHA512
a8720ddcafa96ac2ba5a4286c353938fb5960bb1b5ba81cea96382dc283c54c7ac30cc7c10a5adbbc15b9f63066e00e1d3582097690758a8e99c6ffdc27b479f
-
SSDEEP
384:Wpj7eNmfp+UrM8j3Mk8mw2Qwz9cEVWNuOuuOYPq8P9iYwbzuHOCpwMXwRVqr3Q:TmfpbM8j8wQwz9caAuxYyuFOkwMXc3
Malware Config
Extracted
xtremerat
wiisgv.no-ip.org
wiisgv.no-ip.org
蠀C:\Windwiisgv.no-ip.org
Signatures
-
Detect XtremeRAT payload 4 IoCs
resource yara_rule behavioral1/memory/2424-7-0x0000000013140000-0x000000001315F000-memory.dmp family_xtremerat behavioral1/memory/2768-11-0x0000000013140000-0x000000001315F000-memory.dmp family_xtremerat behavioral1/memory/2796-12-0x0000000013140000-0x000000001315F000-memory.dmp family_xtremerat behavioral1/memory/2768-14-0x0000000013140000-0x000000001315F000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{6M3OWRRB-47FO-N662-WMK3-KV6L7M7EX82J} 29b681d68c7224e9abc90da004e64f98_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6M3OWRRB-47FO-N662-WMK3-KV6L7M7EX82J}\StubPath = "C:\\Windows\\InstallDir\\Wcpp.exe restart" 29b681d68c7224e9abc90da004e64f98_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{6M3OWRRB-47FO-N662-WMK3-KV6L7M7EX82J} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6M3OWRRB-47FO-N662-WMK3-KV6L7M7EX82J}\StubPath = "C:\\Windows\\InstallDir\\Wcpp.exe" svchost.exe -
resource yara_rule behavioral1/memory/2796-0-0x0000000013140000-0x000000001315F000-memory.dmp upx behavioral1/memory/2424-7-0x0000000013140000-0x000000001315F000-memory.dmp upx behavioral1/files/0x0007000000018b62-8.dat upx behavioral1/memory/2768-11-0x0000000013140000-0x000000001315F000-memory.dmp upx behavioral1/memory/2796-12-0x0000000013140000-0x000000001315F000-memory.dmp upx behavioral1/memory/2768-14-0x0000000013140000-0x000000001315F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Wcpp.exe" 29b681d68c7224e9abc90da004e64f98_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Wcpp.exe" 29b681d68c7224e9abc90da004e64f98_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Wcpp.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Wcpp.exe" svchost.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\InstallDir\Wcpp.exe 29b681d68c7224e9abc90da004e64f98_JaffaCakes118.exe File created C:\Windows\InstallDir\Wcpp.exe 29b681d68c7224e9abc90da004e64f98_JaffaCakes118.exe File opened for modification C:\Windows\InstallDir\ 29b681d68c7224e9abc90da004e64f98_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2768 svchost.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2796 wrote to memory of 2424 2796 29b681d68c7224e9abc90da004e64f98_JaffaCakes118.exe 29 PID 2796 wrote to memory of 2424 2796 29b681d68c7224e9abc90da004e64f98_JaffaCakes118.exe 29 PID 2796 wrote to memory of 2424 2796 29b681d68c7224e9abc90da004e64f98_JaffaCakes118.exe 29 PID 2796 wrote to memory of 2424 2796 29b681d68c7224e9abc90da004e64f98_JaffaCakes118.exe 29 PID 2796 wrote to memory of 2424 2796 29b681d68c7224e9abc90da004e64f98_JaffaCakes118.exe 29 PID 2796 wrote to memory of 2768 2796 29b681d68c7224e9abc90da004e64f98_JaffaCakes118.exe 30 PID 2796 wrote to memory of 2768 2796 29b681d68c7224e9abc90da004e64f98_JaffaCakes118.exe 30 PID 2796 wrote to memory of 2768 2796 29b681d68c7224e9abc90da004e64f98_JaffaCakes118.exe 30 PID 2796 wrote to memory of 2768 2796 29b681d68c7224e9abc90da004e64f98_JaffaCakes118.exe 30 PID 2796 wrote to memory of 2768 2796 29b681d68c7224e9abc90da004e64f98_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\29b681d68c7224e9abc90da004e64f98_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\29b681d68c7224e9abc90da004e64f98_JaffaCakes118.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
PID:2424
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Suspicious use of SetWindowsHookEx
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
26KB
MD529b681d68c7224e9abc90da004e64f98
SHA18339c27a2d08e13d5c069d62050dd7f85880823f
SHA25646b3782ab0b39b405487d552320717210cc2f80727fc4cdf0043a8c3881fe8b6
SHA512a8720ddcafa96ac2ba5a4286c353938fb5960bb1b5ba81cea96382dc283c54c7ac30cc7c10a5adbbc15b9f63066e00e1d3582097690758a8e99c6ffdc27b479f