Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 08:43
Static task
static1
Behavioral task
behavioral1
Sample
392f21ba73924a229a8b33a6bf35dd81_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
392f21ba73924a229a8b33a6bf35dd81_JaffaCakes118.exe
-
Size
374KB
-
MD5
392f21ba73924a229a8b33a6bf35dd81
-
SHA1
1fc3fc8b5e09819a743ed22aafd67c6f75f2bdfc
-
SHA256
d8f930172b112f39b14280db5559629cef31daaa253c4da61fc030bdf75709e0
-
SHA512
a7491cc15b03937f5410acdd9ffdfc7a138930efcf7548f91468fc1b4522f3a0eb0399b9d6ab7a878e78e7572953a89bc463826d72c4423607b460b6c82f08b3
-
SSDEEP
6144:aeHjx2pJNHZCYJBJl1UU2O4cBTJhv4s5C8s9vCLAes5VI8s6zXI:nHjmJDrU+Dv4KpsR0AJY8Hz4
Malware Config
Extracted
xtremerat
teschio77.no-ip.org
Signatures
-
Detect XtremeRAT payload 5 IoCs
resource yara_rule behavioral2/memory/4472-4-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/4472-5-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/4800-6-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/4472-7-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/4800-8-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Executes dropped EXE 3 IoCs
pid Process 4472 xgh89C1.tmp 3208 xgh89C1.tmp 2312 6r48C90.tmp -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\摵慰整 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\392f21ba73924a229a8b33a6bf35dd81_JaffaCakes118.exe\"" 6r48C90.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\摵慰整 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\392f21ba73924a229a8b33a6bf35dd81_JaffaCakes118.exe\"" 6r48C90.tmp -
resource yara_rule behavioral2/memory/4472-3-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/4472-4-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/4472-5-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/4800-6-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/4472-7-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/4800-8-0x0000000010000000-0x000000001004D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 112 4800 WerFault.exe 89 2696 4800 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 392f21ba73924a229a8b33a6bf35dd81_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xgh89C1.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6r48C90.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3632 wrote to memory of 4472 3632 392f21ba73924a229a8b33a6bf35dd81_JaffaCakes118.exe 85 PID 3632 wrote to memory of 4472 3632 392f21ba73924a229a8b33a6bf35dd81_JaffaCakes118.exe 85 PID 3632 wrote to memory of 4472 3632 392f21ba73924a229a8b33a6bf35dd81_JaffaCakes118.exe 85 PID 4472 wrote to memory of 3208 4472 xgh89C1.tmp 86 PID 4472 wrote to memory of 3208 4472 xgh89C1.tmp 86 PID 4472 wrote to memory of 3208 4472 xgh89C1.tmp 86 PID 4472 wrote to memory of 2312 4472 xgh89C1.tmp 88 PID 4472 wrote to memory of 2312 4472 xgh89C1.tmp 88 PID 4472 wrote to memory of 2312 4472 xgh89C1.tmp 88 PID 4472 wrote to memory of 4800 4472 xgh89C1.tmp 89 PID 4472 wrote to memory of 4800 4472 xgh89C1.tmp 89 PID 4472 wrote to memory of 4800 4472 xgh89C1.tmp 89 PID 4472 wrote to memory of 4800 4472 xgh89C1.tmp 89 PID 4472 wrote to memory of 2684 4472 xgh89C1.tmp 90 PID 4472 wrote to memory of 2684 4472 xgh89C1.tmp 90 PID 4472 wrote to memory of 2684 4472 xgh89C1.tmp 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\392f21ba73924a229a8b33a6bf35dd81_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\392f21ba73924a229a8b33a6bf35dd81_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\xgh89C1.tmpC:\Users\Admin\AppData\Local\Temp\xgh89C1.tmp2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\xgh89C1.tmpC:\Users\Admin\AppData\Local\Temp\xgh89C1.tmp3⤵
- Executes dropped EXE
PID:3208
-
-
C:\Users\Admin\AppData\Local\Temp\6r48C90.tmpC:\Users\Admin\AppData\Local\Temp\6r48C90.tmp "C:\Users\Admin\AppData\Local\Temp\392f21ba73924a229a8b33a6bf35dd81_JaffaCakes118.exe" 3 摵慰整 摵慰整3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2312
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- System Location Discovery: System Language Discovery
PID:4800 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 4804⤵
- Program crash
PID:112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 5004⤵
- Program crash
PID:2696
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:2684
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4800 -ip 48001⤵PID:1020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4800 -ip 48001⤵PID:232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD591e85bdf8f3e7df5c243126fda9122a3
SHA18158cf5797085e91fda1edd0fb9b5890a4178899
SHA25653cce0fd9285ec1696922d0da8f249ffad078a3afbab349bf864209ae06c2230
SHA512c1327669fd1279d0f053f8eb4d7304002c23cdf4b9641e8eb1041fedef0267430afa211be72297ef1e220c2f332a00b533219662cda4f4833303ffb79fc65eae
-
Filesize
85KB
MD50f07ff2024ef2f9082000863d4a15ef0
SHA144a776d42ee3279cbef92ec4a7f08d336d2483a3
SHA256d79e66dab202156e49e4b0e4946a71b5891b1f2a423af61c705b08b160a967f0
SHA5126397e5141b319e674d80d91a710447fb44784aea83f421bb1eacbdc8b9d9052ce1d2507329c3c35a5513ab36dda7372c8ce319dbec0ca6f74c9d589920e092b0