Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 01:42
Static task
static1
Behavioral task
behavioral1
Sample
ea5b81ef79adb077ed832aae119fb0be_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ea5b81ef79adb077ed832aae119fb0be_JaffaCakes118.exe
-
Size
344KB
-
MD5
ea5b81ef79adb077ed832aae119fb0be
-
SHA1
85078dda8bfe43db70d3cc85fb877a1fa5132f33
-
SHA256
40fda4ca6342e7bff03b1a55cf1414b9099b86a4beab4a65eedfdc98103c388d
-
SHA512
4a7783ffd50a669cc58b4b9d518648f8e4bfdb6399b555b231a5f0695c7d69aaad4b6ee28878e63e204d26a86818429b6d98647fa52586b87c3d18b180caf92d
-
SSDEEP
6144:SNW7mvIZNC7rGN3bkty0Mki8787O71rkhJSammcmZq:QW7SIa7rGNrkty0fkhAlmvq
Malware Config
Signatures
-
Detect XtremeRAT payload 3 IoCs
resource yara_rule behavioral1/memory/2848-27-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral1/memory/1524-28-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral1/memory/2848-29-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Executes dropped EXE 2 IoCs
pid Process 1524 server.exe 2328 stub.exe -
Loads dropped DLL 4 IoCs
pid Process 3064 ea5b81ef79adb077ed832aae119fb0be_JaffaCakes118.exe 3064 ea5b81ef79adb077ed832aae119fb0be_JaffaCakes118.exe 3064 ea5b81ef79adb077ed832aae119fb0be_JaffaCakes118.exe 3064 ea5b81ef79adb077ed832aae119fb0be_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/3064-11-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/1524-15-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/files/0x00090000000120f9-13.dat upx behavioral1/memory/2848-27-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/1524-28-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/2848-29-0x0000000010000000-0x000000001004D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea5b81ef79adb077ed832aae119fb0be_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stub.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3064 ea5b81ef79adb077ed832aae119fb0be_JaffaCakes118.exe 2328 stub.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3064 wrote to memory of 1524 3064 ea5b81ef79adb077ed832aae119fb0be_JaffaCakes118.exe 30 PID 3064 wrote to memory of 1524 3064 ea5b81ef79adb077ed832aae119fb0be_JaffaCakes118.exe 30 PID 3064 wrote to memory of 1524 3064 ea5b81ef79adb077ed832aae119fb0be_JaffaCakes118.exe 30 PID 3064 wrote to memory of 1524 3064 ea5b81ef79adb077ed832aae119fb0be_JaffaCakes118.exe 30 PID 3064 wrote to memory of 2328 3064 ea5b81ef79adb077ed832aae119fb0be_JaffaCakes118.exe 31 PID 3064 wrote to memory of 2328 3064 ea5b81ef79adb077ed832aae119fb0be_JaffaCakes118.exe 31 PID 3064 wrote to memory of 2328 3064 ea5b81ef79adb077ed832aae119fb0be_JaffaCakes118.exe 31 PID 3064 wrote to memory of 2328 3064 ea5b81ef79adb077ed832aae119fb0be_JaffaCakes118.exe 31 PID 1524 wrote to memory of 2848 1524 server.exe 32 PID 1524 wrote to memory of 2848 1524 server.exe 32 PID 1524 wrote to memory of 2848 1524 server.exe 32 PID 1524 wrote to memory of 2848 1524 server.exe 32 PID 1524 wrote to memory of 2848 1524 server.exe 32 PID 1524 wrote to memory of 2748 1524 server.exe 33 PID 1524 wrote to memory of 2748 1524 server.exe 33 PID 1524 wrote to memory of 2748 1524 server.exe 33 PID 1524 wrote to memory of 2748 1524 server.exe 33 PID 1524 wrote to memory of 2748 1524 server.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea5b81ef79adb077ed832aae119fb0be_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea5b81ef79adb077ed832aae119fb0be_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe" 02⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- System Location Discovery: System Language Discovery
PID:2848
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2748
-
-
-
C:\Users\Admin\AppData\Local\Temp\stub.exe"C:\Users\Admin\AppData\Local\Temp\stub.exe" 02⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD56ba9aeea2cfc136a045b3b4c291e85b5
SHA17d38a526512bb3bbf92225c25702753e6eaacecd
SHA256161a15b89f83419c96cb73f83176e6845b51a682e3a39592639950880e35bca9
SHA512c0d3bba772ab70a4491701b833fc151c79987a540e928b9d21e166a2029f73800d4a54e7bd533d17999b7fa3022c1fc064a63b1cbc56103a7278f492dca93f18
-
Filesize
300KB
MD58a45fe85898666c75dc0ce2fd878d340
SHA18346d03c553a85c5046a154123adb1af454e3717
SHA25647a6e501e51c466d43bb7638de421b4c30b80e24cdfeeedafab82b06ba41534a
SHA5120941c2c170ce2a1991f301caad8a237cd67f5df972718acfe7b7b6c0beb5be0ba7bc817d21405b0981d90993aa6e725d4b4f76ac54686e47e299cf6fc396a1bb