Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-10-2024 10:33
Static task
static1
Behavioral task
behavioral1
Sample
4c73ab4f8d0fc1b498d666e87224d1dc_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
4c73ab4f8d0fc1b498d666e87224d1dc_JaffaCakes118.exe
-
Size
377KB
-
MD5
4c73ab4f8d0fc1b498d666e87224d1dc
-
SHA1
a5017565a789626d5f94ce285cec89099600bd79
-
SHA256
db1348f472860fab808001d2e3aaa582a39913dd846369bcf03db18185061f37
-
SHA512
7361bea3dc1a8b5d595b7ddfdd10e92977f44139f8df91f5d933891bc27063cefe5c83380a740f363b3f1ae8196975494efac03bb71e6818688a0b5e3865b50a
-
SSDEEP
6144:+1dlZro5yoXc/hF/Wu6mPTg4mVhUVps/17/QNLqOYVF5iO/:+1dlZo5y7X7g4mVyU+hqOcF5iO/
Malware Config
Extracted
xtremerat
rap.no-ip.info
Signatures
-
Detect XtremeRAT payload 6 IoCs
resource yara_rule behavioral1/memory/2252-52-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/2252-50-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/2252-46-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/2612-56-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/1564-61-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/1564-64-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{2RG4TVNW-600Q-0715-7BA4-4QF3OG8545RM} notepad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2RG4TVNW-600Q-0715-7BA4-4QF3OG8545RM}\StubPath = "C:\\Windows\\system32\\InstallDir\\system.exe restart" notepad.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{2RG4TVNW-600Q-0715-7BA4-4QF3OG8545RM} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2RG4TVNW-600Q-0715-7BA4-4QF3OG8545RM}\StubPath = "C:\\Windows\\system32\\InstallDir\\system.exe" svchost.exe -
Executes dropped EXE 3 IoCs
pid Process 2500 4.exe 2696 4.exe 2252 4.exe -
Loads dropped DLL 4 IoCs
pid Process 2528 4c73ab4f8d0fc1b498d666e87224d1dc_JaffaCakes118.exe 2528 4c73ab4f8d0fc1b498d666e87224d1dc_JaffaCakes118.exe 2500 4.exe 2696 4.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Windows\\system32\\InstallDir\\system.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Windows\\system32\\InstallDir\\system.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Windows\\system32\\InstallDir\\system.exe" notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Windows\\system32\\InstallDir\\system.exe" notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\system = "%system%" notepad.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\InstallDir\system.exe notepad.exe File created C:\Windows\SysWOW64\InstallDir\system.exe notepad.exe File opened for modification C:\Windows\SysWOW64\InstallDir\ notepad.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2500 set thread context of 2696 2500 4.exe 32 PID 2696 set thread context of 2252 2696 4.exe 33 -
resource yara_rule behavioral1/memory/2500-27-0x0000000000220000-0x000000000022D000-memory.dmp upx behavioral1/memory/2500-26-0x0000000000220000-0x000000000022D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4c73ab4f8d0fc1b498d666e87224d1dc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2620 DllHost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1564 notepad.exe 2620 DllHost.exe 2620 DllHost.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2500 2528 4c73ab4f8d0fc1b498d666e87224d1dc_JaffaCakes118.exe 30 PID 2528 wrote to memory of 2500 2528 4c73ab4f8d0fc1b498d666e87224d1dc_JaffaCakes118.exe 30 PID 2528 wrote to memory of 2500 2528 4c73ab4f8d0fc1b498d666e87224d1dc_JaffaCakes118.exe 30 PID 2528 wrote to memory of 2500 2528 4c73ab4f8d0fc1b498d666e87224d1dc_JaffaCakes118.exe 30 PID 2500 wrote to memory of 2696 2500 4.exe 32 PID 2500 wrote to memory of 2696 2500 4.exe 32 PID 2500 wrote to memory of 2696 2500 4.exe 32 PID 2500 wrote to memory of 2696 2500 4.exe 32 PID 2500 wrote to memory of 2696 2500 4.exe 32 PID 2500 wrote to memory of 2696 2500 4.exe 32 PID 2696 wrote to memory of 2252 2696 4.exe 33 PID 2696 wrote to memory of 2252 2696 4.exe 33 PID 2696 wrote to memory of 2252 2696 4.exe 33 PID 2696 wrote to memory of 2252 2696 4.exe 33 PID 2696 wrote to memory of 2252 2696 4.exe 33 PID 2696 wrote to memory of 2252 2696 4.exe 33 PID 2252 wrote to memory of 2612 2252 4.exe 35 PID 2252 wrote to memory of 2612 2252 4.exe 35 PID 2252 wrote to memory of 2612 2252 4.exe 35 PID 2252 wrote to memory of 2612 2252 4.exe 35 PID 2252 wrote to memory of 2612 2252 4.exe 35 PID 2252 wrote to memory of 1564 2252 4.exe 36 PID 2252 wrote to memory of 1564 2252 4.exe 36 PID 2252 wrote to memory of 1564 2252 4.exe 36 PID 2252 wrote to memory of 1564 2252 4.exe 36 PID 2252 wrote to memory of 1564 2252 4.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c73ab4f8d0fc1b498d666e87224d1dc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4c73ab4f8d0fc1b498d666e87224d1dc_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Extracted\4.exe"C:\Extracted\4.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Extracted\4.exe"C:\Extracted\4.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Extracted\4.exe"C:\Extracted\4.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2612
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1564
-
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2620
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD50750212b585e10b2d87142eb23fe3571
SHA11f0e25f01603a0913b735ed646d3fd4f2a4de4ab
SHA2568c2031c188e75027a1c2c28f84c011b9cf968ebfc10160a0b69e5de883a2d200
SHA512562a856b9cc09c20dc9d480532cd797d4a15628045db5cd5147613457db61e280e965fcd091c5867c429d1b60e9b1f78aa5326ab9c3d40ce9b60fb93ee2d91d7
-
Filesize
231B
MD5b2122fb905776790659b668020f040ab
SHA10a7239cb8139f184809ebddcaee1b988debbc805
SHA256c391bc6ca47c4164f8874f9d0bca00a5ce6bb64d248fee0891150acde4ceeffc
SHA5127f5117b6ac3e13777b521fbf6fa3b88b5c9523d32762c0d9bc402d61dddb541ec9d93e7eabf93d04ebf6b93cabbbcf4f223345e7e160aa436da5cfe6d0432f16
-
Filesize
319KB
MD5d988c1d8874d681d65ee9f58c23bddef
SHA13cbc85478a3b177ce7c2aff59b7fce752b41707d
SHA2568f680bf217cf01be46f39a14009fbedf278337118f286fe41f7a9d286d0ecb9c
SHA5125927fce62e08fecbdd7a75891645ebad091df123196c13ed3bdc5a2fcf3e99aedf23fbcdd73d94c13adbb69025bc20d58d45dce5822b6b6cefd5c011d44cd77d