Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 09:14
Static task
static1
Behavioral task
behavioral1
Sample
2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe
-
Size
52KB
-
MD5
2e853e58d4f430ee6068b442ab6d3a91
-
SHA1
f152c6ff99e03f482d67c2ae46660c3170d96d73
-
SHA256
37332033bbe08bdee1d50904d4acdfa9ef0bc57d6c2f439faefadd89650f4acc
-
SHA512
f095c4665d4bb33c978955ff8bcdbb95df53d8dc14c41094ae5971d2002f8e4a0b1b7c19f0bfda538d5b23c5822fd8c8b8370a86f3c530ce82b8d8e90b3c7eb6
-
SSDEEP
768:bkAOi/cMY6p+hjTGhFhB/GL4eshwv0jEZPvLANdE38lhQXsTX+9:bBVcoLBBr42E5AEs8
Malware Config
Signatures
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exesvchost.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\YahooSystem = "C:\\Users\\Admin\\AppData\\Roaming\\{1F7DD4F-00AA0-BDCD}\\svchost.exe" 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YahooSystems = "C:\\Users\\Admin\\AppData\\Roaming\\{1F7DD4F-00AA0-BDCD}\\svchost.exe" 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\YahooSystem = "C:\\Users\\Admin\\AppData\\Roaming\\{1F7DD4F-00AA0-BDCD}\\svchost.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YahooSystems = "C:\\Users\\Admin\\AppData\\Roaming\\{1F7DD4F-00AA0-BDCD}\\svchost.exe" svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exedescription pid Process procid_target PID 1968 set thread context of 2516 1968 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 86 -
Processes:
resource yara_rule behavioral2/memory/2516-2-0x0000000000C80000-0x0000000000C98000-memory.dmp upx behavioral2/memory/2516-4-0x0000000000C80000-0x0000000000C98000-memory.dmp upx behavioral2/memory/2516-6-0x0000000000C80000-0x0000000000C98000-memory.dmp upx behavioral2/memory/2516-5-0x0000000000C80000-0x0000000000C98000-memory.dmp upx behavioral2/memory/1320-13-0x0000000000C80000-0x0000000000C98000-memory.dmp upx behavioral2/memory/2516-16-0x0000000000C80000-0x0000000000C98000-memory.dmp upx behavioral2/memory/1320-17-0x0000000000C80000-0x0000000000C98000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exesvchost.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exepid Process 1968 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exedescription pid Process procid_target PID 1968 wrote to memory of 2516 1968 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 86 PID 1968 wrote to memory of 2516 1968 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 86 PID 1968 wrote to memory of 2516 1968 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 86 PID 1968 wrote to memory of 2516 1968 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 86 PID 1968 wrote to memory of 2516 1968 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 86 PID 1968 wrote to memory of 2516 1968 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 86 PID 1968 wrote to memory of 2516 1968 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 86 PID 1968 wrote to memory of 2516 1968 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 86 PID 2516 wrote to memory of 1320 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 87 PID 2516 wrote to memory of 1320 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 87 PID 2516 wrote to memory of 1320 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 87 PID 2516 wrote to memory of 1320 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 87 PID 2516 wrote to memory of 2708 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 88 PID 2516 wrote to memory of 2708 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 88 PID 2516 wrote to memory of 3752 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 89 PID 2516 wrote to memory of 3752 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 89 PID 2516 wrote to memory of 3752 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 89 PID 2516 wrote to memory of 4976 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 90 PID 2516 wrote to memory of 4976 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 90 PID 2516 wrote to memory of 208 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 91 PID 2516 wrote to memory of 208 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 91 PID 2516 wrote to memory of 208 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 91 PID 2516 wrote to memory of 3304 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 92 PID 2516 wrote to memory of 3304 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 92 PID 2516 wrote to memory of 220 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 93 PID 2516 wrote to memory of 220 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 93 PID 2516 wrote to memory of 220 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 93 PID 2516 wrote to memory of 3472 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 94 PID 2516 wrote to memory of 3472 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 94 PID 2516 wrote to memory of 2208 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 95 PID 2516 wrote to memory of 2208 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 95 PID 2516 wrote to memory of 2208 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 95 PID 2516 wrote to memory of 980 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 96 PID 2516 wrote to memory of 980 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 96 PID 2516 wrote to memory of 4124 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 97 PID 2516 wrote to memory of 4124 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 97 PID 2516 wrote to memory of 4124 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 97 PID 2516 wrote to memory of 3320 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 98 PID 2516 wrote to memory of 3320 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 98 PID 2516 wrote to memory of 1528 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 99 PID 2516 wrote to memory of 1528 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 99 PID 2516 wrote to memory of 1528 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 99 PID 2516 wrote to memory of 212 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 100 PID 2516 wrote to memory of 212 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 100 PID 2516 wrote to memory of 4224 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 101 PID 2516 wrote to memory of 4224 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 101 PID 2516 wrote to memory of 4224 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 101 PID 2516 wrote to memory of 4492 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 102 PID 2516 wrote to memory of 4492 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 102 PID 2516 wrote to memory of 1736 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 103 PID 2516 wrote to memory of 1736 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 103 PID 2516 wrote to memory of 1736 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 103 PID 2516 wrote to memory of 4244 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 104 PID 2516 wrote to memory of 4244 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 104 PID 2516 wrote to memory of 1540 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 105 PID 2516 wrote to memory of 1540 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 105 PID 2516 wrote to memory of 1540 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 105 PID 2516 wrote to memory of 216 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 106 PID 2516 wrote to memory of 216 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 106 PID 2516 wrote to memory of 3816 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 107 PID 2516 wrote to memory of 3816 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 107 PID 2516 wrote to memory of 3816 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 107 PID 2516 wrote to memory of 3644 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 108 PID 2516 wrote to memory of 3644 2516 2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2e853e58d4f430ee6068b442ab6d3a91_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:2708
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4976
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:3304
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:3472
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:980
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:3320
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:212
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4492
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4244
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:216
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:3644
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:552
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4032
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:3244
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:1148
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4924
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4612
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:3804
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD52e853e58d4f430ee6068b442ab6d3a91
SHA1f152c6ff99e03f482d67c2ae46660c3170d96d73
SHA25637332033bbe08bdee1d50904d4acdfa9ef0bc57d6c2f439faefadd89650f4acc
SHA512f095c4665d4bb33c978955ff8bcdbb95df53d8dc14c41094ae5971d2002f8e4a0b1b7c19f0bfda538d5b23c5822fd8c8b8370a86f3c530ce82b8d8e90b3c7eb6