Analysis
-
max time kernel
93s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 07:27
Behavioral task
behavioral1
Sample
ead941adf6c2faa306a3958518213c38_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ead941adf6c2faa306a3958518213c38_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ead941adf6c2faa306a3958518213c38_JaffaCakes118.exe
-
Size
792KB
-
MD5
ead941adf6c2faa306a3958518213c38
-
SHA1
ca987dfb8c50c8a52ab8217fa18c4c1fac9df71f
-
SHA256
6e12b81d0caa6af558b3890f3240544528f8c5e3b64ba8fc1ff94e7e1da264b8
-
SHA512
0712e5b7c6b53753ef001dd378f03529cac384f266499185909fda2d38627c68e4b12a5a245a547e5d9ea47536c1f7d5c9c511aaa630291494c150929e961d6c
-
SSDEEP
24576:dSA6gqLF77dMY1mahfbJoda6D0rcytkOsxo6j18ZsRTEswxtmttYSztF9a06pAFQ:kA6gqLF77dMY1mahfbJoda6D0rcytkO3
Malware Config
Extracted
xtremerat
known.no-ip.biz
known1.no-ip.biz
Signatures
-
Detect XtremeRAT payload 3 IoCs
resource yara_rule behavioral2/memory/2280-21-0x0000000010000000-0x0000000010051000-memory.dmp family_xtremerat behavioral2/memory/1436-25-0x0000000010000000-0x0000000010051000-memory.dmp family_xtremerat behavioral2/memory/2280-27-0x0000000010000000-0x0000000010051000-memory.dmp family_xtremerat -
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/920-20-0x0000000000400000-0x00000000004CD000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation ead941adf6c2faa306a3958518213c38_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 1436 server.exe 1004 Login Spoofer.exe -
resource yara_rule behavioral2/files/0x00090000000233e2-4.dat upx behavioral2/memory/1436-9-0x0000000010000000-0x0000000010051000-memory.dmp upx behavioral2/memory/2280-21-0x0000000010000000-0x0000000010051000-memory.dmp upx behavioral2/memory/1436-25-0x0000000010000000-0x0000000010051000-memory.dmp upx behavioral2/memory/2280-27-0x0000000010000000-0x0000000010051000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4232 2280 WerFault.exe 84 228 2280 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ead941adf6c2faa306a3958518213c38_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Login Spoofer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1004 Login Spoofer.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 920 wrote to memory of 1436 920 ead941adf6c2faa306a3958518213c38_JaffaCakes118.exe 82 PID 920 wrote to memory of 1436 920 ead941adf6c2faa306a3958518213c38_JaffaCakes118.exe 82 PID 920 wrote to memory of 1436 920 ead941adf6c2faa306a3958518213c38_JaffaCakes118.exe 82 PID 920 wrote to memory of 1004 920 ead941adf6c2faa306a3958518213c38_JaffaCakes118.exe 83 PID 920 wrote to memory of 1004 920 ead941adf6c2faa306a3958518213c38_JaffaCakes118.exe 83 PID 920 wrote to memory of 1004 920 ead941adf6c2faa306a3958518213c38_JaffaCakes118.exe 83 PID 1436 wrote to memory of 2280 1436 server.exe 84 PID 1436 wrote to memory of 2280 1436 server.exe 84 PID 1436 wrote to memory of 2280 1436 server.exe 84 PID 1436 wrote to memory of 2280 1436 server.exe 84 PID 1436 wrote to memory of 3824 1436 server.exe 85 PID 1436 wrote to memory of 3824 1436 server.exe 85 PID 1436 wrote to memory of 3824 1436 server.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\ead941adf6c2faa306a3958518213c38_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ead941adf6c2faa306a3958518213c38_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- System Location Discovery: System Language Discovery
PID:2280 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2280 -s 4764⤵
- Program crash
PID:4232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2280 -s 5004⤵
- Program crash
PID:228
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:3824
-
-
-
C:\Users\Admin\AppData\Local\Temp\Login Spoofer.exe"C:\Users\Admin\AppData\Local\Temp\Login Spoofer.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2280 -ip 22801⤵PID:5092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2280 -ip 22801⤵PID:2036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
648KB
MD58385a37c481cb31e1ee5619d1ccff82d
SHA16232e15c86e4097663175b73a8eb18b74b060d0d
SHA2569ef507bbc32a0dbd00c30678510e23c97495303d93f7c4e91fb96f687b9e7923
SHA5129047510ca5e7082d8a6d5bee116537a414c55271caa3353de2faabdf75ca00229485883568bcccb5c342aa21bc9d29ec764e2cf2bffe32ab1a393deb1c727d68
-
Filesize
38KB
MD5a30d5e6145a02cd15ce97a97cd7ad777
SHA1e779534674158c9b73a1a4b5a6783e4c79426e37
SHA2564fc7751dfa1cfea7f29a237f08dc0e0171ed107fd50b40425e8b4346ca00f44b
SHA51245695d0215de559681bcc65eb51391347e167f33aa1396ca3689ebe85ab24f2a335dd8bdd5b5888236b3c12230320bce0c353dcf5d6cb3b0e148540acc796521