Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-10-2024 15:22
Static task
static1
Behavioral task
behavioral1
Sample
18a35c6ab16320bbacc6b6a8bbc7e4c0_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
18a35c6ab16320bbacc6b6a8bbc7e4c0_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
18a35c6ab16320bbacc6b6a8bbc7e4c0
-
SHA1
c67d402f5b2005feffe97268dc0a52c76a804272
-
SHA256
80c5c55f66818e550e74a81032ad7707efea157d2b5280834b5fb4376698fde8
-
SHA512
56409aa5b34da88a345596b98070039cd03b7ba86b54d062aa6b971f2ba39b781fd51095e69be262f70aa9badeaa4ef54a825a29d4bca86eeccdfa6aef13bd5f
-
SSDEEP
24576:xc9vANcCnapiZMxRnSoG5sZyeXsLDtHTbPCx/1Yn2ENFdg:xOj3S5CZsFH3PG/1OFe
Malware Config
Signatures
-
Detect XtremeRAT payload 3 IoCs
resource yara_rule behavioral2/memory/4300-59-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral2/memory/3364-60-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral2/memory/4300-62-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{I3Y2YDF6-WG3D-87OQ-3JVX-3I61EMHL820N} iexplo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{I3Y2YDF6-WG3D-87OQ-3JVX-3I61EMHL820N}\StubPath = "C:\\Windows\\InstallDir\\iexplo.exe restart" iexplo.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation 18a35c6ab16320bbacc6b6a8bbc7e4c0_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 3116 hkcmd.exe 3364 iexplo.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\iexplo.exe" iexplo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\iexplo.exe" iexplo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hkcmd = "\"C:\\Users\\Admin\\AppData\\Local\\hkcmd.exe\" /background" hkcmd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1520 set thread context of 3116 1520 18a35c6ab16320bbacc6b6a8bbc7e4c0_JaffaCakes118.exe 82 -
resource yara_rule behavioral2/files/0x000700000002349c-53.dat upx behavioral2/memory/3364-54-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral2/memory/4300-59-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral2/memory/3364-60-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral2/memory/4300-62-0x0000000000C80000-0x0000000000C95000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\InstallDir\iexplo.exe iexplo.exe File created C:\Windows\InstallDir\iexplo.exe iexplo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 18a35c6ab16320bbacc6b6a8bbc7e4c0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hkcmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4300 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1520 wrote to memory of 3116 1520 18a35c6ab16320bbacc6b6a8bbc7e4c0_JaffaCakes118.exe 82 PID 1520 wrote to memory of 3116 1520 18a35c6ab16320bbacc6b6a8bbc7e4c0_JaffaCakes118.exe 82 PID 1520 wrote to memory of 3116 1520 18a35c6ab16320bbacc6b6a8bbc7e4c0_JaffaCakes118.exe 82 PID 1520 wrote to memory of 3116 1520 18a35c6ab16320bbacc6b6a8bbc7e4c0_JaffaCakes118.exe 82 PID 1520 wrote to memory of 3116 1520 18a35c6ab16320bbacc6b6a8bbc7e4c0_JaffaCakes118.exe 82 PID 1520 wrote to memory of 3364 1520 18a35c6ab16320bbacc6b6a8bbc7e4c0_JaffaCakes118.exe 83 PID 1520 wrote to memory of 3364 1520 18a35c6ab16320bbacc6b6a8bbc7e4c0_JaffaCakes118.exe 83 PID 1520 wrote to memory of 3364 1520 18a35c6ab16320bbacc6b6a8bbc7e4c0_JaffaCakes118.exe 83 PID 3364 wrote to memory of 4300 3364 iexplo.exe 84 PID 3364 wrote to memory of 4300 3364 iexplo.exe 84 PID 3364 wrote to memory of 4300 3364 iexplo.exe 84 PID 3364 wrote to memory of 4300 3364 iexplo.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\18a35c6ab16320bbacc6b6a8bbc7e4c0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\18a35c6ab16320bbacc6b6a8bbc7e4c0_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\hkcmd.exe"C:\Users\Admin\AppData\Local\hkcmd.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3116
-
-
C:\Users\Admin\AppData\Local\iexplo.exe"C:\Users\Admin\AppData\Local\iexplo.exe"2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4300
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD518a35c6ab16320bbacc6b6a8bbc7e4c0
SHA1c67d402f5b2005feffe97268dc0a52c76a804272
SHA25680c5c55f66818e550e74a81032ad7707efea157d2b5280834b5fb4376698fde8
SHA51256409aa5b34da88a345596b98070039cd03b7ba86b54d062aa6b971f2ba39b781fd51095e69be262f70aa9badeaa4ef54a825a29d4bca86eeccdfa6aef13bd5f
-
Filesize
19KB
MD5d348fc6dd02e260f509ea5deee9ab910
SHA11ab5e596292d1d8815421fd260641cad19cc0c37
SHA256808049691225fa8e93c300e4fdc1881e961fa854f3b82d70556c4b3eeffba10d
SHA512ace722c93cedb43b38d7d4f9edbf5ba992c6cfc7fde86c121214b49531dfff7df3b78b91ef95dc5480dcb1ae289411c710be374afe7e5cc9980bb29b7f4088f5