Analysis

  • max time kernel
    150s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    22-10-2024 11:59

General

  • Target

    6a6171d058c31d6b940a601e98e2b6bb_JaffaCakes118.exe

  • Size

    120KB

  • MD5

    6a6171d058c31d6b940a601e98e2b6bb

  • SHA1

    7cfa5cb756d970709e4266ef17a548bea41d5a1c

  • SHA256

    7dab7874e786405628fb032e5a2bb488c9ada6206c8af0c9c6c625584b22f523

  • SHA512

    713e4d0bc67016ed26c55ffa104376bcc4d00dedd7a3a1cb013831a2117cf6f9e677392c482e0ec8b474ab39cbf5837a49cd3d205441ae8be654b3ee40aabfc5

  • SSDEEP

    1536:D2uN491bIWinffR0tvSXk/EDhSHxuJvt96aD/nHOE90AooN/n48FCqu3iPAg:D61iffR0t0AHxWauvKTe/n4aCqK9

Malware Config

Signatures

  • Detect XtremeRAT payload 6 IoCs
  • XtremeRAT

    The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a6171d058c31d6b940a601e98e2b6bb_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6a6171d058c31d6b940a601e98e2b6bb_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Users\Admin\AppData\Local\Temp\6a6171d058c31d6b940a601e98e2b6bb_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\6a6171d058c31d6b940a601e98e2b6bb_JaffaCakes118.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2960

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2960-19-0x0000000010000000-0x000000001004A000-memory.dmp

    Filesize

    296KB

  • memory/2960-26-0x0000000010000000-0x000000001004A000-memory.dmp

    Filesize

    296KB

  • memory/2960-25-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2960-24-0x0000000010000000-0x000000001004A000-memory.dmp

    Filesize

    296KB

  • memory/2960-22-0x0000000010000000-0x000000001004A000-memory.dmp

    Filesize

    296KB

  • memory/2960-21-0x0000000010000000-0x000000001004A000-memory.dmp

    Filesize

    296KB

  • memory/2960-20-0x0000000010000000-0x000000001004A000-memory.dmp

    Filesize

    296KB

  • memory/3016-14-0x0000000000480000-0x0000000000490000-memory.dmp

    Filesize

    64KB

  • memory/3016-3-0x0000000000250000-0x0000000000260000-memory.dmp

    Filesize

    64KB

  • memory/3016-10-0x0000000000440000-0x0000000000450000-memory.dmp

    Filesize

    64KB

  • memory/3016-9-0x0000000000430000-0x0000000000440000-memory.dmp

    Filesize

    64KB

  • memory/3016-8-0x0000000000420000-0x0000000000430000-memory.dmp

    Filesize

    64KB

  • memory/3016-7-0x00000000003F0000-0x0000000000400000-memory.dmp

    Filesize

    64KB

  • memory/3016-6-0x0000000000280000-0x0000000000290000-memory.dmp

    Filesize

    64KB

  • memory/3016-5-0x0000000000270000-0x0000000000280000-memory.dmp

    Filesize

    64KB

  • memory/3016-4-0x0000000000260000-0x0000000000270000-memory.dmp

    Filesize

    64KB

  • memory/3016-11-0x0000000000450000-0x0000000000460000-memory.dmp

    Filesize

    64KB

  • memory/3016-12-0x0000000000460000-0x0000000000470000-memory.dmp

    Filesize

    64KB

  • memory/3016-0-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/3016-15-0x0000000000490000-0x00000000004A0000-memory.dmp

    Filesize

    64KB

  • memory/3016-23-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/3016-16-0x00000000004A0000-0x00000000004B0000-memory.dmp

    Filesize

    64KB

  • memory/3016-13-0x0000000000470000-0x0000000000480000-memory.dmp

    Filesize

    64KB

  • memory/3016-2-0x0000000000240000-0x0000000000250000-memory.dmp

    Filesize

    64KB

  • memory/3016-1-0x0000000000230000-0x0000000000240000-memory.dmp

    Filesize

    64KB