Analysis

  • max time kernel
    139s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-07-2024 15:07

General

  • Target

    5c776eb10881da5ec013792d9c1d94ff_JaffaCakes118.exe

  • Size

    44KB

  • MD5

    5c776eb10881da5ec013792d9c1d94ff

  • SHA1

    0c5fea35384922728893a796ceb2ec623dc37148

  • SHA256

    13edbf79451a0e4854305615113144344ec3d77dbb16fdfec8c37aa16775c9ec

  • SHA512

    38454f34738f97f28154dc049c82f2f4b89c15feb0e81c535202dad5e91a112cd5ccf1b8725f69f74c0bf4eb0cc1ace3a011e9b867d9a810623ac55970f4dff5

  • SSDEEP

    768:rBr+tjFqTPkAlfztB1lr6an3smTA8uvm2DfOTwYPIkzoiQ:FyRUHlrL1lr6an3TLuvm2buQkoiQ

Malware Config

Extracted

Family

xtremerat

C2

namehost.dyndns.org

Signatures

  • Detect XtremeRAT payload 1 IoCs
  • XtremeRAT

    The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c776eb10881da5ec013792d9c1d94ff_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5c776eb10881da5ec013792d9c1d94ff_JaffaCakes118.exe"
    1⤵
      PID:3528

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3528-0-0x0000000000C80000-0x0000000000C93000-memory.dmp

      Filesize

      76KB