Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 14:30
Static task
static1
Behavioral task
behavioral1
Sample
4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe
-
Size
3.7MB
-
MD5
4a12be812cd0675296bd5846528b5dac
-
SHA1
e1609ddc6315ec0f28b088ff0cd7fd21faa83834
-
SHA256
96bd83c30943e45b4bfd457aecccbc05f041f897da86340d5be89280d50c486e
-
SHA512
1f5f51f3522daab1feae6f8e97a58dfb41463ca03bbba689c2ce1569a04ac9d6445cd9624792d263484f8aa5077b22ae6899a2cdd36cdcb7d5e016b7b607cf66
-
SSDEEP
24576:lAHnh+eWsN3skA4RV1Hom2KXMmHa0ifaOza5Gmuk0eJSKTXyxcdgdfQCdaQ6+RRE:Uh+ZkldoPK8Ya055
Malware Config
Extracted
xtremerat
dferwest.net
Signatures
-
Detect XtremeRAT payload 6 IoCs
Processes:
resource yara_rule behavioral2/memory/2404-0-0x0000000000C80000-0x0000000000DFA000-memory.dmp family_xtremerat behavioral2/memory/2404-11-0x0000000000C80000-0x0000000000DFA000-memory.dmp family_xtremerat behavioral2/memory/2404-12-0x0000000000C80000-0x0000000000DFA000-memory.dmp family_xtremerat behavioral2/memory/2296-19-0x0000000000C80000-0x0000000000DFA000-memory.dmp family_xtremerat behavioral2/memory/2296-20-0x0000000000C80000-0x0000000000DFA000-memory.dmp family_xtremerat behavioral2/memory/2296-22-0x0000000000C80000-0x0000000000DFA000-memory.dmp family_xtremerat -
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1180-35-0x0000000000400000-0x0000000000442000-memory.dmp family_isrstealer behavioral2/memory/1180-40-0x0000000000400000-0x0000000000442000-memory.dmp family_isrstealer -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Detected Nirsoft tools 1 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
Processes:
resource yara_rule behavioral2/memory/1900-52-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
Processes:
resource yara_rule behavioral2/memory/1900-52-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
Processes:
4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{551C3BC0-Y7IO-LTET-43I5-RA161P6RC85W} 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{551C3BC0-Y7IO-LTET-43I5-RA161P6RC85W}\StubPath = "C:\\Windows\\InstallDir\\Server.exe restart" 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe -
Executes dropped EXE 4 IoCs
Processes:
476ysdew.exe476ysdew.exe476ysdew.exe476ysdew.exepid process 2544 476ysdew.exe 1180 476ysdew.exe 4780 476ysdew.exe 1900 476ysdew.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral2/memory/4780-43-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/4780-46-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/4780-45-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/1900-49-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1900-51-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1900-52-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
476ysdew.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts 476ysdew.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\476ysdew.exe autoit_exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe476ysdew.exe476ysdew.exedescription pid process target process PID 1032 set thread context of 2404 1032 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe PID 2544 set thread context of 1180 2544 476ysdew.exe 476ysdew.exe PID 1180 set thread context of 4780 1180 476ysdew.exe 476ysdew.exe PID 1180 set thread context of 1900 1180 476ysdew.exe 476ysdew.exe -
Drops file in Windows directory 3 IoCs
Processes:
4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exedescription ioc process File opened for modification C:\Windows\InstallDir\Server.exe 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe File created C:\Windows\InstallDir\Server.exe 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe File opened for modification C:\Windows\InstallDir\ 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe476ysdew.exepid process 1032 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe 1032 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe 1032 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe 2544 476ysdew.exe 2544 476ysdew.exe 2544 476ysdew.exe -
Suspicious use of SendNotifyMessage 6 IoCs
Processes:
4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe476ysdew.exepid process 1032 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe 1032 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe 1032 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe 2544 476ysdew.exe 2544 476ysdew.exe 2544 476ysdew.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
explorer.exe476ysdew.exepid process 2296 explorer.exe 1180 476ysdew.exe -
Suspicious use of WriteProcessMemory 58 IoCs
Processes:
4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe476ysdew.exe476ysdew.exedescription pid process target process PID 1032 wrote to memory of 2404 1032 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe PID 1032 wrote to memory of 2404 1032 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe PID 1032 wrote to memory of 2404 1032 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe PID 1032 wrote to memory of 2404 1032 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe PID 1032 wrote to memory of 2404 1032 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe PID 2404 wrote to memory of 4292 2404 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe svchost.exe PID 2404 wrote to memory of 4292 2404 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe svchost.exe PID 2404 wrote to memory of 4292 2404 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe svchost.exe PID 2404 wrote to memory of 2044 2404 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe msedge.exe PID 2404 wrote to memory of 2044 2404 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe msedge.exe PID 2404 wrote to memory of 4316 2404 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe explorer.exe PID 2404 wrote to memory of 4316 2404 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe explorer.exe PID 2404 wrote to memory of 4316 2404 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe explorer.exe PID 2404 wrote to memory of 2364 2404 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe msedge.exe PID 2404 wrote to memory of 2364 2404 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe msedge.exe PID 2404 wrote to memory of 1264 2404 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe explorer.exe PID 2404 wrote to memory of 1264 2404 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe explorer.exe PID 2404 wrote to memory of 1264 2404 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe explorer.exe PID 2404 wrote to memory of 4992 2404 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe msedge.exe PID 2404 wrote to memory of 4992 2404 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe msedge.exe PID 2404 wrote to memory of 2028 2404 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe explorer.exe PID 2404 wrote to memory of 2028 2404 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe explorer.exe PID 2404 wrote to memory of 2028 2404 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe explorer.exe PID 2404 wrote to memory of 4732 2404 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe msedge.exe PID 2404 wrote to memory of 4732 2404 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe msedge.exe PID 2404 wrote to memory of 2144 2404 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe explorer.exe PID 2404 wrote to memory of 2144 2404 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe explorer.exe PID 2404 wrote to memory of 2144 2404 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe explorer.exe PID 2404 wrote to memory of 2520 2404 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe msedge.exe PID 2404 wrote to memory of 2520 2404 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe msedge.exe PID 2404 wrote to memory of 2296 2404 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe explorer.exe PID 2404 wrote to memory of 2296 2404 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe explorer.exe PID 2404 wrote to memory of 2296 2404 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe explorer.exe PID 2404 wrote to memory of 2296 2404 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe explorer.exe PID 2404 wrote to memory of 2544 2404 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe 476ysdew.exe PID 2404 wrote to memory of 2544 2404 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe 476ysdew.exe PID 2404 wrote to memory of 2544 2404 4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe 476ysdew.exe PID 2544 wrote to memory of 1180 2544 476ysdew.exe 476ysdew.exe PID 2544 wrote to memory of 1180 2544 476ysdew.exe 476ysdew.exe PID 2544 wrote to memory of 1180 2544 476ysdew.exe 476ysdew.exe PID 2544 wrote to memory of 1180 2544 476ysdew.exe 476ysdew.exe PID 2544 wrote to memory of 1180 2544 476ysdew.exe 476ysdew.exe PID 1180 wrote to memory of 4780 1180 476ysdew.exe 476ysdew.exe PID 1180 wrote to memory of 4780 1180 476ysdew.exe 476ysdew.exe PID 1180 wrote to memory of 4780 1180 476ysdew.exe 476ysdew.exe PID 1180 wrote to memory of 4780 1180 476ysdew.exe 476ysdew.exe PID 1180 wrote to memory of 4780 1180 476ysdew.exe 476ysdew.exe PID 1180 wrote to memory of 4780 1180 476ysdew.exe 476ysdew.exe PID 1180 wrote to memory of 4780 1180 476ysdew.exe 476ysdew.exe PID 1180 wrote to memory of 4780 1180 476ysdew.exe 476ysdew.exe PID 1180 wrote to memory of 1900 1180 476ysdew.exe 476ysdew.exe PID 1180 wrote to memory of 1900 1180 476ysdew.exe 476ysdew.exe PID 1180 wrote to memory of 1900 1180 476ysdew.exe 476ysdew.exe PID 1180 wrote to memory of 1900 1180 476ysdew.exe 476ysdew.exe PID 1180 wrote to memory of 1900 1180 476ysdew.exe 476ysdew.exe PID 1180 wrote to memory of 1900 1180 476ysdew.exe 476ysdew.exe PID 1180 wrote to memory of 1900 1180 476ysdew.exe 476ysdew.exe PID 1180 wrote to memory of 1900 1180 476ysdew.exe 476ysdew.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4a12be812cd0675296bd5846528b5dac_JaffaCakes118.exe"2⤵
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:2044
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:2364
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:1264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4992
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4732
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:2520
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Suspicious use of SetWindowsHookEx
PID:2296
-
-
C:\Users\Admin\AppData\Local\Temp\476ysdew.exe"C:\Users\Admin\AppData\Local\Temp\476ysdew.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\476ysdew.exe"C:\Users\Admin\AppData\Local\Temp\476ysdew.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\476ysdew.exe/scomma "C:\Users\Admin\AppData\Local\Temp\BDlaN8fA35.ini"5⤵
- Executes dropped EXE
PID:4780
-
-
C:\Users\Admin\AppData\Local\Temp\476ysdew.exe/scomma "C:\Users\Admin\AppData\Local\Temp\EfDvyhX0rv.ini"5⤵
- Executes dropped EXE
- Accesses Microsoft Outlook accounts
PID:1900
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD516999cb991e710ce52bb229edcbb08e6
SHA125cc4dd8bd104a9f2e173b4d04a49d4da5971a78
SHA2569985be36ed003ca85d3ac687251d7e00294d60d3afd2ad521cffa8c41ce1f048
SHA5124218ba5e7dc8c2e486f8d82e4ba9101c210395616f2f649577d92557247673eb497014e3b28ee335ea1e36d66c3089dbc1e70f3e6bad167a1c40c3a0288b19d6
-
Filesize
5B
MD5d1ea279fb5559c020a1b4137dc4de237
SHA1db6f8988af46b56216a6f0daf95ab8c9bdb57400
SHA256fcdcc2c46896915a1c695d6231f0fee336a668531b7a3da46178c80362546dba
SHA512720e9c284f0559015312df7fe977563e5e16f48d3506e51eb4016adf7971924d352f740b030aa3adc81b6f65fd1dba12df06d10fa6c115074e5097e7ee0f08b3