Analysis
-
max time kernel
149s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 07:27
Behavioral task
behavioral1
Sample
ead941adf6c2faa306a3958518213c38_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ead941adf6c2faa306a3958518213c38_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ead941adf6c2faa306a3958518213c38_JaffaCakes118.exe
-
Size
792KB
-
MD5
ead941adf6c2faa306a3958518213c38
-
SHA1
ca987dfb8c50c8a52ab8217fa18c4c1fac9df71f
-
SHA256
6e12b81d0caa6af558b3890f3240544528f8c5e3b64ba8fc1ff94e7e1da264b8
-
SHA512
0712e5b7c6b53753ef001dd378f03529cac384f266499185909fda2d38627c68e4b12a5a245a547e5d9ea47536c1f7d5c9c511aaa630291494c150929e961d6c
-
SSDEEP
24576:dSA6gqLF77dMY1mahfbJoda6D0rcytkOsxo6j18ZsRTEswxtmttYSztF9a06pAFQ:kA6gqLF77dMY1mahfbJoda6D0rcytkO3
Malware Config
Extracted
xtremerat
known.no-ip.biz
known1.no-ip.biz
Signatures
-
Detect XtremeRAT payload 4 IoCs
resource yara_rule behavioral1/memory/2712-26-0x0000000010000000-0x0000000010051000-memory.dmp family_xtremerat behavioral1/memory/2124-21-0x0000000010000000-0x0000000010051000-memory.dmp family_xtremerat behavioral1/memory/2124-27-0x0000000010000000-0x0000000010051000-memory.dmp family_xtremerat behavioral1/memory/2712-28-0x0000000010000000-0x0000000010051000-memory.dmp family_xtremerat -
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/1656-19-0x0000000000400000-0x00000000004CD000-memory.dmp modiloader_stage2 -
Executes dropped EXE 2 IoCs
pid Process 2124 server.exe 2736 Login Spoofer.exe -
Loads dropped DLL 4 IoCs
pid Process 1656 ead941adf6c2faa306a3958518213c38_JaffaCakes118.exe 1656 ead941adf6c2faa306a3958518213c38_JaffaCakes118.exe 1656 ead941adf6c2faa306a3958518213c38_JaffaCakes118.exe 1656 ead941adf6c2faa306a3958518213c38_JaffaCakes118.exe -
resource yara_rule behavioral1/files/0x00080000000120fd-2.dat upx behavioral1/memory/2712-26-0x0000000010000000-0x0000000010051000-memory.dmp upx behavioral1/memory/2124-21-0x0000000010000000-0x0000000010051000-memory.dmp upx behavioral1/memory/1656-9-0x0000000010000000-0x0000000010051000-memory.dmp upx behavioral1/memory/2124-27-0x0000000010000000-0x0000000010051000-memory.dmp upx behavioral1/memory/2712-28-0x0000000010000000-0x0000000010051000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ead941adf6c2faa306a3958518213c38_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Login Spoofer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2736 Login Spoofer.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2124 1656 ead941adf6c2faa306a3958518213c38_JaffaCakes118.exe 30 PID 1656 wrote to memory of 2124 1656 ead941adf6c2faa306a3958518213c38_JaffaCakes118.exe 30 PID 1656 wrote to memory of 2124 1656 ead941adf6c2faa306a3958518213c38_JaffaCakes118.exe 30 PID 1656 wrote to memory of 2124 1656 ead941adf6c2faa306a3958518213c38_JaffaCakes118.exe 30 PID 1656 wrote to memory of 2736 1656 ead941adf6c2faa306a3958518213c38_JaffaCakes118.exe 31 PID 1656 wrote to memory of 2736 1656 ead941adf6c2faa306a3958518213c38_JaffaCakes118.exe 31 PID 1656 wrote to memory of 2736 1656 ead941adf6c2faa306a3958518213c38_JaffaCakes118.exe 31 PID 1656 wrote to memory of 2736 1656 ead941adf6c2faa306a3958518213c38_JaffaCakes118.exe 31 PID 2124 wrote to memory of 2712 2124 server.exe 32 PID 2124 wrote to memory of 2712 2124 server.exe 32 PID 2124 wrote to memory of 2712 2124 server.exe 32 PID 2124 wrote to memory of 2712 2124 server.exe 32 PID 2124 wrote to memory of 2712 2124 server.exe 32 PID 2124 wrote to memory of 2804 2124 server.exe 33 PID 2124 wrote to memory of 2804 2124 server.exe 33 PID 2124 wrote to memory of 2804 2124 server.exe 33 PID 2124 wrote to memory of 2804 2124 server.exe 33 PID 2124 wrote to memory of 2804 2124 server.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\ead941adf6c2faa306a3958518213c38_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ead941adf6c2faa306a3958518213c38_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- System Location Discovery: System Language Discovery
PID:2712
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2804
-
-
-
C:\Users\Admin\AppData\Local\Temp\Login Spoofer.exe"C:\Users\Admin\AppData\Local\Temp\Login Spoofer.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
648KB
MD58385a37c481cb31e1ee5619d1ccff82d
SHA16232e15c86e4097663175b73a8eb18b74b060d0d
SHA2569ef507bbc32a0dbd00c30678510e23c97495303d93f7c4e91fb96f687b9e7923
SHA5129047510ca5e7082d8a6d5bee116537a414c55271caa3353de2faabdf75ca00229485883568bcccb5c342aa21bc9d29ec764e2cf2bffe32ab1a393deb1c727d68
-
Filesize
38KB
MD5a30d5e6145a02cd15ce97a97cd7ad777
SHA1e779534674158c9b73a1a4b5a6783e4c79426e37
SHA2564fc7751dfa1cfea7f29a237f08dc0e0171ed107fd50b40425e8b4346ca00f44b
SHA51245695d0215de559681bcc65eb51391347e167f33aa1396ca3689ebe85ab24f2a335dd8bdd5b5888236b3c12230320bce0c353dcf5d6cb3b0e148540acc796521