Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    17/10/2024, 19:43 UTC

General

  • Target

    5362dfbd699bc9db369a583f2591d4a7_JaffaCakes118.exe

  • Size

    328KB

  • MD5

    5362dfbd699bc9db369a583f2591d4a7

  • SHA1

    fbbf6a0f58a8ab26dfd5b8a5b6343206a576f941

  • SHA256

    30b1efaeb361d8c466686a4e03dc134a2ed3a684fa81618ee2ec2f0d5f66a7f4

  • SHA512

    1d6da8759fcdaf4aaf832a1452631b31b82933053446ec26b2e676628fac36f0f860436eafc13624dd913fb5b18efa04b66573743ff0178723330424081e237d

  • SSDEEP

    3072:cgR3xPLuCV0FxQo86uW6j3IPDnLJey+QL3l:lHVCxQo8M6jYLL0y+QL3

Malware Config

Extracted

Family

xtremerat

C2

boika.zapto.org

Signatures

  • Detect XtremeRAT payload 7 IoCs
  • XtremeRAT

    The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5362dfbd699bc9db369a583f2591d4a7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5362dfbd699bc9db369a583f2591d4a7_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2492
    • C:\Users\Admin\AppData\Local\Temp\5362dfbd699bc9db369a583f2591d4a7_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\5362dfbd699bc9db369a583f2591d4a7_JaffaCakes118.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2100
      • C:\Windows\SysWOW64\svchost.exe
        svchost.exe
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2004
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        3⤵
          PID:2104

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2004-6-0x0000000010000000-0x0000000010045000-memory.dmp

      Filesize

      276KB

    • memory/2004-9-0x0000000010000000-0x0000000010045000-memory.dmp

      Filesize

      276KB

    • memory/2004-11-0x0000000010000000-0x0000000010045000-memory.dmp

      Filesize

      276KB

    • memory/2100-2-0x0000000010000000-0x0000000010045000-memory.dmp

      Filesize

      276KB

    • memory/2100-4-0x0000000010000000-0x0000000010045000-memory.dmp

      Filesize

      276KB

    • memory/2100-3-0x0000000010000000-0x0000000010045000-memory.dmp

      Filesize

      276KB

    • memory/2100-5-0x0000000010000000-0x0000000010045000-memory.dmp

      Filesize

      276KB

    • memory/2100-10-0x0000000010000000-0x0000000010045000-memory.dmp

      Filesize

      276KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.