Resubmissions

15/07/2024, 07:33

240715-jdgyzaveqk 10

15/07/2024, 07:22

240715-h7btdaxflh 10

Analysis

  • max time kernel
    6s
  • max time network
    10s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/07/2024, 07:33

General

  • Target

    48c92021936b6d3e8bdd9a292d36600d_JaffaCakes118.exe

  • Size

    1.4MB

  • MD5

    48c92021936b6d3e8bdd9a292d36600d

  • SHA1

    a45b7ec3ec2091f39d2fe00ce8cb86b5c12cb658

  • SHA256

    db7a9de95042c2553e5b38f1b3743a65f75e8d799c518da5f3031992ffb52ef7

  • SHA512

    2f8db1c64d5b24792a3e7e4cc6d8deb8d521af7cbdc9c13c50214dc421919c40e92bbf196ef64a0a30e9c58b18784e2173be837806c2c8455bb085a1164e0310

  • SSDEEP

    24576:f5KoEz02RxcvKzRZwmpgYB3xlr1Xj/24zUg5paADTeut8t:gzLxbzR+mjNTrZlzUGaADTeI8t

Malware Config

Signatures

  • Detect XtremeRAT payload 2 IoCs
  • XtremeRAT

    The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\48c92021936b6d3e8bdd9a292d36600d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\48c92021936b6d3e8bdd9a292d36600d_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2468
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.exe
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1564
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
        3⤵
          PID:3112
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
          3⤵
            PID:3604
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
            3⤵
              PID:1884
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
              3⤵
                PID:5116
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
                3⤵
                  PID:4456
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
                  3⤵
                    PID:2496
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
                    3⤵
                      PID:4040
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
                      3⤵
                        PID:2640
                      • C:\Windows\InstallDir\Server.exe
                        "C:\Windows\InstallDir\Server.exe"
                        3⤵
                        • Boot or Logon Autostart Execution: Active Setup
                        • Executes dropped EXE
                        • Adds Run key to start application
                        • Suspicious use of WriteProcessMemory
                        PID:1356
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
                          4⤵
                            PID:2196
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
                            4⤵
                              PID:2392
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
                              4⤵
                                PID:3328
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
                                4⤵
                                  PID:1756
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 1564 -s 1292
                                3⤵
                                • Program crash
                                PID:2176
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 1564 -s 1284
                                3⤵
                                • Program crash
                                PID:3120
                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\IDMan.exe
                              C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\IDMan.exe
                              2⤵
                              • Executes dropped EXE
                              PID:3360
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1564 -ip 1564
                            1⤵
                              PID:2328
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1564 -ip 1564
                              1⤵
                                PID:4408

                              Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.exe

                                      Filesize

                                      40KB

                                      MD5

                                      1517e0e93479d9ced563687c48de68dd

                                      SHA1

                                      b875915034df6fb8ac6aff44a756adcadcac1977

                                      SHA256

                                      5917e31c525f4389ee22bcd7c690416f6f42a41b4d93ac35b0596a20bafae099

                                      SHA512

                                      0cbd3824b22ae83f03576e1c5977f53db2336be0f428fd203a2829915d21911d197cf578e2ef22005c0ff7eec2cb6d69183c446d63c21425eb8d94f426b35283

                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\IDMan.exe

                                      Filesize

                                      3.0MB

                                      MD5

                                      6da127016f908379879bbdc2f05e8076

                                      SHA1

                                      098445c6d21260d44148279edeba7552ea8502e2

                                      SHA256

                                      ee6653548c9c75b9cc6e1329b710adcb0ac4b264927b409f490fa007d435a79b

                                      SHA512

                                      cf895d000c3f786f064bb0f7f8e5789e1968512c563d6b5588262f26095fbfee6bcb11b53002a343d223944cdd3b46f95273470c98fd3ff626ca9548e61789f6

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\((Mutex)).cfg

                                      Filesize

                                      1KB

                                      MD5

                                      dc614148e8873856ae597fc07e38eba2

                                      SHA1

                                      fe8337a3a21df96f8a934f43f75bf915d227ebca

                                      SHA256

                                      0f7bf0d058aaf9601685bf55186a8a633e32a9fefaa61fbf16b4b11920b207a6

                                      SHA512

                                      685efccfc8896d6de98e47423d4615cb832ab91ce2bc9c6e20601b44f818ff876f35f5ec87cad8da52900c852aaec08a5ed906a67d0aaf51923787e980a5ab92

                                    • memory/1564-20-0x0000000000C80000-0x0000000000C92000-memory.dmp

                                      Filesize

                                      72KB