Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-10-2024 14:11
Static task
static1
Behavioral task
behavioral1
Sample
3534e70d66444b7136f24b32b9236d6f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3534e70d66444b7136f24b32b9236d6f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3534e70d66444b7136f24b32b9236d6f_JaffaCakes118.exe
-
Size
113KB
-
MD5
3534e70d66444b7136f24b32b9236d6f
-
SHA1
dfce52e15668118bda8e27a7a8a40a49ce0421ac
-
SHA256
b04aee8ab3f0db0f8d0c2111c1f6f1433782401e3b8d6c68648ab07dc16fb0cc
-
SHA512
1b20917c8b2c90b705456ff7849253c003de301405a9bccf13809b2bf964bc9300306b8db4b9ffb933f4a6b8ac030d5a0be0fb521bd2099be8088299946e3f44
-
SSDEEP
1536:SP6WMHRjb4S1tCoHZhKAWDT/7r9ZcTKECK336kcBq+4q8DWFhWGW3R:2+H5IBj7cT1F3e8DWF6R
Malware Config
Signatures
-
Detect XtremeRAT payload 10 IoCs
Processes:
resource yara_rule behavioral1/memory/2460-5-0x0000000010000000-0x0000000010045000-memory.dmp family_xtremerat behavioral1/memory/2460-13-0x0000000010000000-0x0000000010045000-memory.dmp family_xtremerat behavioral1/memory/2460-14-0x0000000010000000-0x0000000010045000-memory.dmp family_xtremerat behavioral1/memory/2460-12-0x0000000010000000-0x0000000010045000-memory.dmp family_xtremerat behavioral1/memory/2460-11-0x0000000010000000-0x0000000010045000-memory.dmp family_xtremerat behavioral1/memory/2460-8-0x0000000010000000-0x0000000010045000-memory.dmp family_xtremerat behavioral1/memory/2460-7-0x0000000010000000-0x0000000010045000-memory.dmp family_xtremerat behavioral1/memory/2460-6-0x0000000010000000-0x0000000010045000-memory.dmp family_xtremerat behavioral1/memory/2460-4-0x0000000010000000-0x0000000010045000-memory.dmp family_xtremerat behavioral1/memory/2460-15-0x0000000010000000-0x0000000010045000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
3534e70d66444b7136f24b32b9236d6f_JaffaCakes118.exedescription pid Process procid_target PID 2468 set thread context of 2460 2468 3534e70d66444b7136f24b32b9236d6f_JaffaCakes118.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
3534e70d66444b7136f24b32b9236d6f_JaffaCakes118.exe3534e70d66444b7136f24b32b9236d6f_JaffaCakes118.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3534e70d66444b7136f24b32b9236d6f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3534e70d66444b7136f24b32b9236d6f_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
3534e70d66444b7136f24b32b9236d6f_JaffaCakes118.exepid Process 2468 3534e70d66444b7136f24b32b9236d6f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
3534e70d66444b7136f24b32b9236d6f_JaffaCakes118.exe3534e70d66444b7136f24b32b9236d6f_JaffaCakes118.exedescription pid Process procid_target PID 2468 wrote to memory of 2460 2468 3534e70d66444b7136f24b32b9236d6f_JaffaCakes118.exe 30 PID 2468 wrote to memory of 2460 2468 3534e70d66444b7136f24b32b9236d6f_JaffaCakes118.exe 30 PID 2468 wrote to memory of 2460 2468 3534e70d66444b7136f24b32b9236d6f_JaffaCakes118.exe 30 PID 2468 wrote to memory of 2460 2468 3534e70d66444b7136f24b32b9236d6f_JaffaCakes118.exe 30 PID 2468 wrote to memory of 2460 2468 3534e70d66444b7136f24b32b9236d6f_JaffaCakes118.exe 30 PID 2468 wrote to memory of 2460 2468 3534e70d66444b7136f24b32b9236d6f_JaffaCakes118.exe 30 PID 2468 wrote to memory of 2460 2468 3534e70d66444b7136f24b32b9236d6f_JaffaCakes118.exe 30 PID 2468 wrote to memory of 2460 2468 3534e70d66444b7136f24b32b9236d6f_JaffaCakes118.exe 30 PID 2468 wrote to memory of 2460 2468 3534e70d66444b7136f24b32b9236d6f_JaffaCakes118.exe 30 PID 2468 wrote to memory of 2460 2468 3534e70d66444b7136f24b32b9236d6f_JaffaCakes118.exe 30 PID 2468 wrote to memory of 2460 2468 3534e70d66444b7136f24b32b9236d6f_JaffaCakes118.exe 30 PID 2468 wrote to memory of 2460 2468 3534e70d66444b7136f24b32b9236d6f_JaffaCakes118.exe 30 PID 2460 wrote to memory of 2740 2460 3534e70d66444b7136f24b32b9236d6f_JaffaCakes118.exe 31 PID 2460 wrote to memory of 2740 2460 3534e70d66444b7136f24b32b9236d6f_JaffaCakes118.exe 31 PID 2460 wrote to memory of 2740 2460 3534e70d66444b7136f24b32b9236d6f_JaffaCakes118.exe 31 PID 2460 wrote to memory of 2740 2460 3534e70d66444b7136f24b32b9236d6f_JaffaCakes118.exe 31 PID 2460 wrote to memory of 2740 2460 3534e70d66444b7136f24b32b9236d6f_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3534e70d66444b7136f24b32b9236d6f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3534e70d66444b7136f24b32b9236d6f_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\3534e70d66444b7136f24b32b9236d6f_JaffaCakes118.exe
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2740
-
-