Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 09:14
Static task
static1
Behavioral task
behavioral1
Sample
2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe
-
Size
52KB
-
MD5
2e853e58d4f430ee6068b442ab6d3a91
-
SHA1
f152c6ff99e03f482d67c2ae46660c3170d96d73
-
SHA256
37332033bbe08bdee1d50904d4acdfa9ef0bc57d6c2f439faefadd89650f4acc
-
SHA512
f095c4665d4bb33c978955ff8bcdbb95df53d8dc14c41094ae5971d2002f8e4a0b1b7c19f0bfda538d5b23c5822fd8c8b8370a86f3c530ce82b8d8e90b3c7eb6
-
SSDEEP
768:bkAOi/cMY6p+hjTGhFhB/GL4eshwv0jEZPvLANdE38lhQXsTX+9:bBVcoLBBr42E5AEs8
Malware Config
Signatures
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exesvchost.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\YahooSystem = "C:\\Users\\Admin\\AppData\\Roaming\\{1F7DD4F-00AA0-BDCD}\\svchost.exe" 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\YahooSystems = "C:\\Users\\Admin\\AppData\\Roaming\\{1F7DD4F-00AA0-BDCD}\\svchost.exe" 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\YahooSystem = "C:\\Users\\Admin\\AppData\\Roaming\\{1F7DD4F-00AA0-BDCD}\\svchost.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\YahooSystems = "C:\\Users\\Admin\\AppData\\Roaming\\{1F7DD4F-00AA0-BDCD}\\svchost.exe" svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exedescription pid Process procid_target PID 2684 set thread context of 2792 2684 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 30 -
Processes:
resource yara_rule behavioral1/memory/2792-2-0x0000000000C80000-0x0000000000C98000-memory.dmp upx behavioral1/memory/2792-4-0x0000000000C80000-0x0000000000C98000-memory.dmp upx behavioral1/memory/2792-6-0x0000000000C80000-0x0000000000C98000-memory.dmp upx behavioral1/memory/2792-5-0x0000000000C80000-0x0000000000C98000-memory.dmp upx behavioral1/memory/2736-15-0x0000000000C80000-0x0000000000C98000-memory.dmp upx behavioral1/memory/2736-17-0x0000000000C80000-0x0000000000C98000-memory.dmp upx behavioral1/memory/2792-19-0x0000000000C80000-0x0000000000C98000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
svchost.exe2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exepid Process 2684 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exedescription pid Process procid_target PID 2684 wrote to memory of 2792 2684 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 30 PID 2684 wrote to memory of 2792 2684 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 30 PID 2684 wrote to memory of 2792 2684 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 30 PID 2684 wrote to memory of 2792 2684 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 30 PID 2684 wrote to memory of 2792 2684 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 30 PID 2684 wrote to memory of 2792 2684 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 30 PID 2684 wrote to memory of 2792 2684 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 30 PID 2684 wrote to memory of 2792 2684 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 30 PID 2684 wrote to memory of 2792 2684 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 30 PID 2792 wrote to memory of 2736 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 31 PID 2792 wrote to memory of 2736 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 31 PID 2792 wrote to memory of 2736 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 31 PID 2792 wrote to memory of 2736 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 31 PID 2792 wrote to memory of 2736 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 31 PID 2792 wrote to memory of 2876 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 32 PID 2792 wrote to memory of 2876 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 32 PID 2792 wrote to memory of 2876 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 32 PID 2792 wrote to memory of 2876 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 32 PID 2792 wrote to memory of 2872 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 33 PID 2792 wrote to memory of 2872 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 33 PID 2792 wrote to memory of 2872 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 33 PID 2792 wrote to memory of 2872 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 33 PID 2792 wrote to memory of 2612 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 34 PID 2792 wrote to memory of 2612 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 34 PID 2792 wrote to memory of 2612 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 34 PID 2792 wrote to memory of 2612 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 34 PID 2792 wrote to memory of 2280 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 35 PID 2792 wrote to memory of 2280 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 35 PID 2792 wrote to memory of 2280 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 35 PID 2792 wrote to memory of 2280 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 35 PID 2792 wrote to memory of 2812 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 36 PID 2792 wrote to memory of 2812 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 36 PID 2792 wrote to memory of 2812 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 36 PID 2792 wrote to memory of 2812 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 36 PID 2792 wrote to memory of 2892 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 37 PID 2792 wrote to memory of 2892 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 37 PID 2792 wrote to memory of 2892 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 37 PID 2792 wrote to memory of 2892 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 37 PID 2792 wrote to memory of 2724 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 38 PID 2792 wrote to memory of 2724 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 38 PID 2792 wrote to memory of 2724 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 38 PID 2792 wrote to memory of 2724 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 38 PID 2792 wrote to memory of 2788 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 39 PID 2792 wrote to memory of 2788 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 39 PID 2792 wrote to memory of 2788 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 39 PID 2792 wrote to memory of 2788 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 39 PID 2792 wrote to memory of 2640 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 40 PID 2792 wrote to memory of 2640 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 40 PID 2792 wrote to memory of 2640 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 40 PID 2792 wrote to memory of 2640 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 40 PID 2792 wrote to memory of 2908 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 41 PID 2792 wrote to memory of 2908 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 41 PID 2792 wrote to memory of 2908 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 41 PID 2792 wrote to memory of 2908 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 41 PID 2792 wrote to memory of 2692 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 42 PID 2792 wrote to memory of 2692 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 42 PID 2792 wrote to memory of 2692 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 42 PID 2792 wrote to memory of 2692 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 42 PID 2792 wrote to memory of 2632 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 43 PID 2792 wrote to memory of 2632 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 43 PID 2792 wrote to memory of 2632 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 43 PID 2792 wrote to memory of 2632 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 43 PID 2792 wrote to memory of 2140 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 44 PID 2792 wrote to memory of 2140 2792 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2736
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2876
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2872
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2612
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2280
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2812
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2892
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2724
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2788
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2640
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2908
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2692
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2632
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2140
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2800
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2780
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2772
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2660
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2884
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2608
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2616
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2624
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2636
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2668
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2680
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2728
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:1440
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:3048
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2240
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:3060
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:320
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:1764
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2784
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2944
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:1680
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD52e853e58d4f430ee6068b442ab6d3a91
SHA1f152c6ff99e03f482d67c2ae46660c3170d96d73
SHA25637332033bbe08bdee1d50904d4acdfa9ef0bc57d6c2f439faefadd89650f4acc
SHA512f095c4665d4bb33c978955ff8bcdbb95df53d8dc14c41094ae5971d2002f8e4a0b1b7c19f0bfda538d5b23c5822fd8c8b8370a86f3c530ce82b8d8e90b3c7eb6