Analysis
-
max time kernel
133s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-10-2024 11:22
Behavioral task
behavioral1
Sample
73789cb3c7e124ba54afdb8b29b928b7_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
73789cb3c7e124ba54afdb8b29b928b7_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
73789cb3c7e124ba54afdb8b29b928b7_JaffaCakes118.exe
-
Size
40KB
-
MD5
73789cb3c7e124ba54afdb8b29b928b7
-
SHA1
f33908fb5095546b66c9bfeaef774795f0b1de27
-
SHA256
e5ffd400178ff5a64414d01582a98f8c99baeb55012ae8cbd1ad166a1747a4f0
-
SHA512
0751fb634579408d1d696ceba06ed3f54e5137b3e33d8734ce68fdd5a64ce512b0307e04913510d74f959995f68b27f985a150234e6387cba52ef0113da18392
-
SSDEEP
768:SEohghdN12Ozhiow2GkmFjf3/pxzNBwIldCzoc:Sv+zMOlw2GkmR3jBlduoc
Malware Config
Signatures
-
Detect XtremeRAT payload 1 IoCs
resource yara_rule behavioral2/memory/4420-0-0x0000000000C80000-0x0000000000C92000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 73789cb3c7e124ba54afdb8b29b928b7_JaffaCakes118.exe