Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 15:45
Behavioral task
behavioral1
Sample
3ad56f28af3a7dacb5f2114ad4275669_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3ad56f28af3a7dacb5f2114ad4275669_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3ad56f28af3a7dacb5f2114ad4275669_JaffaCakes118.exe
-
Size
289KB
-
MD5
3ad56f28af3a7dacb5f2114ad4275669
-
SHA1
5f77cc63e764a7cf7af11a9a9fbf8d74eb3e9d35
-
SHA256
ea3dd9581f93d657b28fa00793c8391a75412442e190bb01ee266516805c6c6c
-
SHA512
8e81d73c02361a2c97d819af4c827a5d40830a867427661a933bc03845c7f8f53aeb5382afad3bce86d1d120d80dc37695c577812e3b354603aee37d67dcabb0
-
SSDEEP
6144:+r6cPpODxCdS7eOUQ41zKd1KVonBNN05dB3kRfOMu:MVcCPoBNNIn3kRWX
Malware Config
Signatures
-
Detect XtremeRAT payload 2 IoCs
resource yara_rule behavioral2/memory/2744-0-0x0000000010000000-0x0000000010098000-memory.dmp family_xtremerat behavioral2/memory/2744-2-0x0000000010000000-0x0000000010098000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3ad56f28af3a7dacb5f2114ad4275669_JaffaCakes118.exe