Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05-10-2024 02:40
Static task
static1
Behavioral task
behavioral1
Sample
15d715e2520a9471dd7309dda8e4bf2e_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
15d715e2520a9471dd7309dda8e4bf2e_JaffaCakes118.exe
-
Size
724KB
-
MD5
15d715e2520a9471dd7309dda8e4bf2e
-
SHA1
82985fa29b731d0a6c9c7aab99c34db3e6aa0ec2
-
SHA256
d90da2707a3babe381fcfc1cdde758969f5c53be39485e25a471587d41c02327
-
SHA512
959b7833898af629f04843644c73cef1fc99ab17e8cfc16d0833609343463dd1676623afac3375005297dc455e62e4cf0a2621e3ccc5275854f2af3f7c42879c
-
SSDEEP
12288:rhkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4a0W0n0FcquQhW:RRmJkcoQricOIQxiZY1ia0Wm0FcquQ8
Malware Config
Extracted
xtremerat
vincenzo3.no-ip.org
Signatures
-
Detect XtremeRAT payload 5 IoCs
resource yara_rule behavioral1/memory/2312-7-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral1/memory/2312-8-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral1/memory/3020-11-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral1/memory/2312-12-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral1/memory/3020-13-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1560 set thread context of 2312 1560 15d715e2520a9471dd7309dda8e4bf2e_JaffaCakes118.exe 30 -
resource yara_rule behavioral1/memory/2312-4-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/2312-7-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/2312-8-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/2312-6-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/2312-2-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/2312-1-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/3020-11-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/2312-12-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/3020-13-0x0000000010000000-0x000000001004D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 15d715e2520a9471dd7309dda8e4bf2e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1560 wrote to memory of 2312 1560 15d715e2520a9471dd7309dda8e4bf2e_JaffaCakes118.exe 30 PID 1560 wrote to memory of 2312 1560 15d715e2520a9471dd7309dda8e4bf2e_JaffaCakes118.exe 30 PID 1560 wrote to memory of 2312 1560 15d715e2520a9471dd7309dda8e4bf2e_JaffaCakes118.exe 30 PID 1560 wrote to memory of 2312 1560 15d715e2520a9471dd7309dda8e4bf2e_JaffaCakes118.exe 30 PID 1560 wrote to memory of 2312 1560 15d715e2520a9471dd7309dda8e4bf2e_JaffaCakes118.exe 30 PID 1560 wrote to memory of 2312 1560 15d715e2520a9471dd7309dda8e4bf2e_JaffaCakes118.exe 30 PID 1560 wrote to memory of 2312 1560 15d715e2520a9471dd7309dda8e4bf2e_JaffaCakes118.exe 30 PID 1560 wrote to memory of 2312 1560 15d715e2520a9471dd7309dda8e4bf2e_JaffaCakes118.exe 30 PID 2312 wrote to memory of 3020 2312 svchost.exe 31 PID 2312 wrote to memory of 3020 2312 svchost.exe 31 PID 2312 wrote to memory of 3020 2312 svchost.exe 31 PID 2312 wrote to memory of 3020 2312 svchost.exe 31 PID 2312 wrote to memory of 3020 2312 svchost.exe 31 PID 2312 wrote to memory of 2296 2312 svchost.exe 32 PID 2312 wrote to memory of 2296 2312 svchost.exe 32 PID 2312 wrote to memory of 2296 2312 svchost.exe 32 PID 2312 wrote to memory of 2296 2312 svchost.exe 32 PID 2312 wrote to memory of 2296 2312 svchost.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\15d715e2520a9471dd7309dda8e4bf2e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\15d715e2520a9471dd7309dda8e4bf2e_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- System Location Discovery: System Language Discovery
PID:3020
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2296
-
-