Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-10-2024 23:52
Static task
static1
Behavioral task
behavioral1
Sample
5f5405cf899443cf16a1a09f73d2d6d2_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
5f5405cf899443cf16a1a09f73d2d6d2_JaffaCakes118.exe
-
Size
50KB
-
MD5
5f5405cf899443cf16a1a09f73d2d6d2
-
SHA1
3a110fcc33f7897c5765c4fa7b280a914aca142b
-
SHA256
d9204eb999e60c80de07b91aedb4b2c620ef435206eaad6113c5a3adf93ac7ac
-
SHA512
16665606a7b02a4f88e4b6bcbfa20f68f5aecbb96f4da8891446b1226e1fde19d10df7b04c07aba45e72e6bc3df66e5e11fa997bb152ac0a7db3ec6be47fb22d
-
SSDEEP
768:Fw3Ws7+7jpVj61ftgm8Xor0EEuoJ4wDyQzDWuegwYYExombyC48MWa3t2:FSWs78jc6m/quoaRweZYFxomW/vWY2
Malware Config
Extracted
xtremerat
pomen18.no-ip.org
pomen18.no-ip.org
궃 e耀纭t耀壉⾛䋎뺑怘pomen18.no-ip.org
Signatures
-
Detect XtremeRAT payload 7 IoCs
Processes:
resource yara_rule behavioral2/memory/3504-14-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/4504-15-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/1384-17-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/4504-18-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/4504-23-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/3504-25-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/4504-28-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
Processes:
svchost.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\system32\\InstallDir\\Server.exe restart" svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
zao3tdvfvjt.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$pid process 1384 zao3tdvfvjt.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Realtek = "C:\\Windows\\system32\\InstallDir\\Server.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Realtek = "C:\\Windows\\system32\\InstallDir\\Server.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\InstallDir\\Server.exe" svchost.exe -
Drops file in System32 directory 3 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Windows\SysWOW64\InstallDir\Server.exe svchost.exe File created C:\Windows\SysWOW64\InstallDir\Server.exe svchost.exe File opened for modification C:\Windows\SysWOW64\InstallDir\ svchost.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\zao3tdvfvjt.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ upx behavioral2/memory/1384-12-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/3504-14-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/4504-15-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/1384-17-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/4504-18-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/4504-23-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/3504-25-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/4504-28-0x0000000010000000-0x000000001004D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2140 3504 WerFault.exe svchost.exe 3388 4504 WerFault.exe svchost.exe 1624 3504 WerFault.exe svchost.exe 2912 4504 WerFault.exe svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
zao3tdvfvjt.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$svchost.exesvchost.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zao3tdvfvjt.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
svchost.exepid process 4504 svchost.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
5f5405cf899443cf16a1a09f73d2d6d2_JaffaCakes118.exezao3tdvfvjt.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$description pid process target process PID 1828 wrote to memory of 1384 1828 5f5405cf899443cf16a1a09f73d2d6d2_JaffaCakes118.exe zao3tdvfvjt.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ PID 1828 wrote to memory of 1384 1828 5f5405cf899443cf16a1a09f73d2d6d2_JaffaCakes118.exe zao3tdvfvjt.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ PID 1828 wrote to memory of 1384 1828 5f5405cf899443cf16a1a09f73d2d6d2_JaffaCakes118.exe zao3tdvfvjt.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ PID 1384 wrote to memory of 3504 1384 zao3tdvfvjt.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ svchost.exe PID 1384 wrote to memory of 3504 1384 zao3tdvfvjt.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ svchost.exe PID 1384 wrote to memory of 3504 1384 zao3tdvfvjt.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ svchost.exe PID 1384 wrote to memory of 3504 1384 zao3tdvfvjt.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ svchost.exe PID 1384 wrote to memory of 4504 1384 zao3tdvfvjt.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ svchost.exe PID 1384 wrote to memory of 4504 1384 zao3tdvfvjt.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ svchost.exe PID 1384 wrote to memory of 4504 1384 zao3tdvfvjt.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ svchost.exe PID 1384 wrote to memory of 4504 1384 zao3tdvfvjt.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f5405cf899443cf16a1a09f73d2d6d2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5f5405cf899443cf16a1a09f73d2d6d2_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\zao3tdvfvjt.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$C:\Users\Admin\AppData\Local\Temp\zao3tdvfvjt.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- System Location Discovery: System Language Discovery
PID:3504 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3504 -s 4804⤵
- Program crash
PID:2140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3504 -s 4884⤵
- Program crash
PID:1624
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4504 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4504 -s 9684⤵
- Program crash
PID:3388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4504 -s 9764⤵
- Program crash
PID:2912
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3504 -ip 35041⤵PID:3204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4504 -ip 45041⤵PID:2232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3504 -ip 35041⤵PID:4052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4504 -ip 45041⤵PID:716
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD54bc3ef6c320cdce8d5576cb78fddb12a
SHA1a45e2ed689bb11274bc72b52a63f4c8d11e569f0
SHA256dcb94be014ee0b716ea05d127e5efd498e1a84710926198680e6bf2cd3e12c99
SHA5127939fe2bde6aad75da9c9d5badbdd736082fbfc12960c6e2c1587d0b14e0feb9ab806106168903f17ec2ec55a98c3eb0d58ee6081bc43bcc52eb21d789e9ee84