Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-10-2024 00:17
Static task
static1
Behavioral task
behavioral1
Sample
546dae0132f9dac504e612c9dc3c4163_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
546dae0132f9dac504e612c9dc3c4163_JaffaCakes118.exe
-
Size
90KB
-
MD5
546dae0132f9dac504e612c9dc3c4163
-
SHA1
92068400766e11dac72a5376421db7509282baa1
-
SHA256
d3e050241bc051ef74ac9f29b00a6940e86b7d9a4e379f053af78c7158c7833d
-
SHA512
53e2290b2b296b8e3849863e814a38a2947c05a7ec954dedb3c0e2f83a1db309a49e766f57f9516fbc77fb1b8f4a18721f76602878ccd16eb0f28a9bb775aa27
-
SSDEEP
1536:4l/UOz1dnuEIkYhq6ka8sCDcSm76lXwlppxEBSs1yCdMrPkz55bfU:G/v7xIj0jsCpb9qjEs3QMrPu5rU
Malware Config
Extracted
xtremerat
fofo05333.no-ip.org
Signatures
-
Detect XtremeRAT payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2312-13-0x0000000010000000-0x000000001004B000-memory.dmp family_xtremerat behavioral1/memory/2312-17-0x0000000010000000-0x000000001004B000-memory.dmp family_xtremerat behavioral1/memory/1740-20-0x0000000010000000-0x000000001004B000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Executes dropped EXE 1 IoCs
Processes:
server.exepid process 2312 server.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\server.exe upx behavioral1/memory/2312-13-0x0000000010000000-0x000000001004B000-memory.dmp upx behavioral1/memory/2312-17-0x0000000010000000-0x000000001004B000-memory.dmp upx behavioral1/memory/1740-20-0x0000000010000000-0x000000001004B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
server.exesvchost.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
546dae0132f9dac504e612c9dc3c4163_JaffaCakes118.exedescription pid process Token: SeDebugPrivilege 3012 546dae0132f9dac504e612c9dc3c4163_JaffaCakes118.exe Token: 33 3012 546dae0132f9dac504e612c9dc3c4163_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 3012 546dae0132f9dac504e612c9dc3c4163_JaffaCakes118.exe Token: 33 3012 546dae0132f9dac504e612c9dc3c4163_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 3012 546dae0132f9dac504e612c9dc3c4163_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
546dae0132f9dac504e612c9dc3c4163_JaffaCakes118.exeserver.exedescription pid process target process PID 3012 wrote to memory of 2312 3012 546dae0132f9dac504e612c9dc3c4163_JaffaCakes118.exe server.exe PID 3012 wrote to memory of 2312 3012 546dae0132f9dac504e612c9dc3c4163_JaffaCakes118.exe server.exe PID 3012 wrote to memory of 2312 3012 546dae0132f9dac504e612c9dc3c4163_JaffaCakes118.exe server.exe PID 3012 wrote to memory of 2312 3012 546dae0132f9dac504e612c9dc3c4163_JaffaCakes118.exe server.exe PID 2312 wrote to memory of 1740 2312 server.exe svchost.exe PID 2312 wrote to memory of 1740 2312 server.exe svchost.exe PID 2312 wrote to memory of 1740 2312 server.exe svchost.exe PID 2312 wrote to memory of 1740 2312 server.exe svchost.exe PID 2312 wrote to memory of 1740 2312 server.exe svchost.exe PID 2312 wrote to memory of 1828 2312 server.exe iexplore.exe PID 2312 wrote to memory of 1828 2312 server.exe iexplore.exe PID 2312 wrote to memory of 1828 2312 server.exe iexplore.exe PID 2312 wrote to memory of 1828 2312 server.exe iexplore.exe PID 2312 wrote to memory of 1828 2312 server.exe iexplore.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\546dae0132f9dac504e612c9dc3c4163_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\546dae0132f9dac504e612c9dc3c4163_JaffaCakes118.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- System Location Discovery: System Language Discovery
PID:1740
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:1828
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD517a25ac941c0c8120792bb261e9610de
SHA123edcf940b585ee7d8ff4d6ee3ab7e264f1a2ae2
SHA2562aca490f5938f1db06e8e571f429b34bd61d39c3c0a62275ef8773f5ceba4c05
SHA51223d94f02f206525eee55a9884a95b27eefcee1f139333adbf5cec55fbb64da8eecf3acd703859ee76413dfd28a95f18bc580cfd04cac4834b336625b916ca153