Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-10-2024 04:42
Static task
static1
Behavioral task
behavioral1
Sample
6585a16b111cd1a1d4992050a6207735_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6585a16b111cd1a1d4992050a6207735_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
6585a16b111cd1a1d4992050a6207735_JaffaCakes118.exe
-
Size
297KB
-
MD5
6585a16b111cd1a1d4992050a6207735
-
SHA1
817cd0f83fd70a49d0c7336175f507cf4b989058
-
SHA256
9ad895c6c959ef97efe53a5ac2b2f1a3c335dffabaf919faf5083b16e10d5450
-
SHA512
0fa51be1433d2060ec09748826ac03c230b8b638d661af09266b909533ce147e2a450188ab9a73e332ee20928f94ae8e5f62e7285dbfbb788ba119871f1a1e3c
-
SSDEEP
6144:nhWxjk0EdatAbulIY24ku3n6DJRMqw6B+HaBZz0mfA:nOjk0gatIMkh51z+
Malware Config
Extracted
xtremerat
2hask.no-ip.biz
Signatures
-
Detect XtremeRAT payload 14 IoCs
Processes:
resource yara_rule behavioral1/memory/2172-11-0x0000000010000000-0x0000000010048000-memory.dmp family_xtremerat behavioral1/memory/2172-13-0x0000000010000000-0x0000000010048000-memory.dmp family_xtremerat behavioral1/memory/2172-9-0x0000000010000000-0x0000000010048000-memory.dmp family_xtremerat behavioral1/memory/2172-6-0x0000000010000000-0x0000000010048000-memory.dmp family_xtremerat behavioral1/memory/2172-5-0x0000000010000000-0x0000000010048000-memory.dmp family_xtremerat behavioral1/memory/2172-4-0x0000000010000000-0x0000000010048000-memory.dmp family_xtremerat behavioral1/memory/2172-3-0x0000000010000000-0x0000000010048000-memory.dmp family_xtremerat behavioral1/memory/2172-2-0x0000000010000000-0x0000000010048000-memory.dmp family_xtremerat behavioral1/memory/2172-12-0x0000000010000000-0x0000000010048000-memory.dmp family_xtremerat behavioral1/memory/2784-16-0x0000000010000000-0x0000000010048000-memory.dmp family_xtremerat behavioral1/memory/2172-17-0x0000000010000000-0x0000000010048000-memory.dmp family_xtremerat behavioral1/memory/2784-20-0x0000000010000000-0x0000000010048000-memory.dmp family_xtremerat behavioral1/memory/2784-21-0x0000000010000000-0x0000000010048000-memory.dmp family_xtremerat behavioral1/memory/2784-22-0x0000000010000000-0x0000000010048000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
Processes:
NOTEPAD.EXEdescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{0N13TR8V-7U4H-WWIK-ALGJ-MC7CT02FHMQ7} NOTEPAD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0N13TR8V-7U4H-WWIK-ALGJ-MC7CT02FHMQ7}\StubPath = "C:\\Windows\\InstallDir\\Server.exe restart" NOTEPAD.EXE -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
NOTEPAD.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" NOTEPAD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" NOTEPAD.EXE -
Suspicious use of SetThreadContext 1 IoCs
Processes:
6585a16b111cd1a1d4992050a6207735_JaffaCakes118.exedescription pid process target process PID 2756 set thread context of 2172 2756 6585a16b111cd1a1d4992050a6207735_JaffaCakes118.exe 6585a16b111cd1a1d4992050a6207735_JaffaCakes118.exe -
Drops file in Windows directory 3 IoCs
Processes:
NOTEPAD.EXEdescription ioc process File opened for modification C:\Windows\InstallDir\Server.exe NOTEPAD.EXE File created C:\Windows\InstallDir\Server.exe NOTEPAD.EXE File opened for modification C:\Windows\InstallDir\ NOTEPAD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
NOTEPAD.EXE6585a16b111cd1a1d4992050a6207735_JaffaCakes118.exe6585a16b111cd1a1d4992050a6207735_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6585a16b111cd1a1d4992050a6207735_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6585a16b111cd1a1d4992050a6207735_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
NOTEPAD.EXEpid process 2784 NOTEPAD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
6585a16b111cd1a1d4992050a6207735_JaffaCakes118.exe6585a16b111cd1a1d4992050a6207735_JaffaCakes118.exedescription pid process target process PID 2756 wrote to memory of 2172 2756 6585a16b111cd1a1d4992050a6207735_JaffaCakes118.exe 6585a16b111cd1a1d4992050a6207735_JaffaCakes118.exe PID 2756 wrote to memory of 2172 2756 6585a16b111cd1a1d4992050a6207735_JaffaCakes118.exe 6585a16b111cd1a1d4992050a6207735_JaffaCakes118.exe PID 2756 wrote to memory of 2172 2756 6585a16b111cd1a1d4992050a6207735_JaffaCakes118.exe 6585a16b111cd1a1d4992050a6207735_JaffaCakes118.exe PID 2756 wrote to memory of 2172 2756 6585a16b111cd1a1d4992050a6207735_JaffaCakes118.exe 6585a16b111cd1a1d4992050a6207735_JaffaCakes118.exe PID 2756 wrote to memory of 2172 2756 6585a16b111cd1a1d4992050a6207735_JaffaCakes118.exe 6585a16b111cd1a1d4992050a6207735_JaffaCakes118.exe PID 2756 wrote to memory of 2172 2756 6585a16b111cd1a1d4992050a6207735_JaffaCakes118.exe 6585a16b111cd1a1d4992050a6207735_JaffaCakes118.exe PID 2756 wrote to memory of 2172 2756 6585a16b111cd1a1d4992050a6207735_JaffaCakes118.exe 6585a16b111cd1a1d4992050a6207735_JaffaCakes118.exe PID 2756 wrote to memory of 2172 2756 6585a16b111cd1a1d4992050a6207735_JaffaCakes118.exe 6585a16b111cd1a1d4992050a6207735_JaffaCakes118.exe PID 2756 wrote to memory of 2172 2756 6585a16b111cd1a1d4992050a6207735_JaffaCakes118.exe 6585a16b111cd1a1d4992050a6207735_JaffaCakes118.exe PID 2756 wrote to memory of 2172 2756 6585a16b111cd1a1d4992050a6207735_JaffaCakes118.exe 6585a16b111cd1a1d4992050a6207735_JaffaCakes118.exe PID 2756 wrote to memory of 2172 2756 6585a16b111cd1a1d4992050a6207735_JaffaCakes118.exe 6585a16b111cd1a1d4992050a6207735_JaffaCakes118.exe PID 2756 wrote to memory of 2172 2756 6585a16b111cd1a1d4992050a6207735_JaffaCakes118.exe 6585a16b111cd1a1d4992050a6207735_JaffaCakes118.exe PID 2172 wrote to memory of 2784 2172 6585a16b111cd1a1d4992050a6207735_JaffaCakes118.exe NOTEPAD.EXE PID 2172 wrote to memory of 2784 2172 6585a16b111cd1a1d4992050a6207735_JaffaCakes118.exe NOTEPAD.EXE PID 2172 wrote to memory of 2784 2172 6585a16b111cd1a1d4992050a6207735_JaffaCakes118.exe NOTEPAD.EXE PID 2172 wrote to memory of 2784 2172 6585a16b111cd1a1d4992050a6207735_JaffaCakes118.exe NOTEPAD.EXE PID 2172 wrote to memory of 2784 2172 6585a16b111cd1a1d4992050a6207735_JaffaCakes118.exe NOTEPAD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\6585a16b111cd1a1d4992050a6207735_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6585a16b111cd1a1d4992050a6207735_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\6585a16b111cd1a1d4992050a6207735_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6585a16b111cd1a1d4992050a6207735_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE3⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2784
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1