Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
02-11-2024 12:28
Static task
static1
Behavioral task
behavioral1
Sample
856d1b755add5c9016d5e4af9e45277d_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
856d1b755add5c9016d5e4af9e45277d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
856d1b755add5c9016d5e4af9e45277d_JaffaCakes118.exe
-
Size
136KB
-
MD5
856d1b755add5c9016d5e4af9e45277d
-
SHA1
9379d76254ee7020733fd495cfa78971a7932826
-
SHA256
e72c74b7c2e5e2f63402c74749916d8a648e1eb6f4626eecea091fbe414adf32
-
SHA512
5762c5057551367cd846e5a25c3acadad8a9331be53e7c912263e0925b29067a9ef7b80ddf1544edc36833c8382bb90c6973ee04de041cce50e9c05ceb534bc5
-
SSDEEP
3072:y/v7xIj0jsCpawDs6tIyyXpPUMbjFhx00Jw6y4ozpgaY:wdJjrpq6Cyy5cqFgqw6WNg9
Malware Config
Extracted
xtremerat
hbooob2.no-ip.biz
Signatures
-
Detect XtremeRAT payload 6 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\T.exe family_xtremerat behavioral1/memory/2528-15-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/2832-18-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/2256-19-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/2832-22-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/2528-26-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
Processes:
explorer.exesvchost.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\system32\\windows.\\%TEMP%.exe restart" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\system32\\windows.\\%TEMP%.exe" svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
T.exepid process 2256 T.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\windows = "%ULTRAS%" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\windows = "C:\\Windows\\system32\\windows.\\%TEMP%.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\windows = "C:\\Windows\\system32\\windows.\\%TEMP%.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\windows = "C:\\Windows\\system32\\windows.\\%TEMP%.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\windows = "C:\\Windows\\system32\\windows.\\%TEMP%.exe" explorer.exe -
Drops file in System32 directory 2 IoCs
Processes:
explorer.exedescription ioc process File opened for modification C:\Windows\SysWOW64\windows\%TEMP%.exe explorer.exe File created C:\Windows\SysWOW64\windows\%TEMP%.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
explorer.exeT.exesvchost.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language T.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
856d1b755add5c9016d5e4af9e45277d_JaffaCakes118.exedescription pid process Token: SeDebugPrivilege 2060 856d1b755add5c9016d5e4af9e45277d_JaffaCakes118.exe Token: 33 2060 856d1b755add5c9016d5e4af9e45277d_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2060 856d1b755add5c9016d5e4af9e45277d_JaffaCakes118.exe Token: 33 2060 856d1b755add5c9016d5e4af9e45277d_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2060 856d1b755add5c9016d5e4af9e45277d_JaffaCakes118.exe Token: 33 2060 856d1b755add5c9016d5e4af9e45277d_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2060 856d1b755add5c9016d5e4af9e45277d_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
explorer.exepid process 2832 explorer.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
856d1b755add5c9016d5e4af9e45277d_JaffaCakes118.exeT.exedescription pid process target process PID 2060 wrote to memory of 2256 2060 856d1b755add5c9016d5e4af9e45277d_JaffaCakes118.exe T.exe PID 2060 wrote to memory of 2256 2060 856d1b755add5c9016d5e4af9e45277d_JaffaCakes118.exe T.exe PID 2060 wrote to memory of 2256 2060 856d1b755add5c9016d5e4af9e45277d_JaffaCakes118.exe T.exe PID 2060 wrote to memory of 2256 2060 856d1b755add5c9016d5e4af9e45277d_JaffaCakes118.exe T.exe PID 2256 wrote to memory of 2528 2256 T.exe svchost.exe PID 2256 wrote to memory of 2528 2256 T.exe svchost.exe PID 2256 wrote to memory of 2528 2256 T.exe svchost.exe PID 2256 wrote to memory of 2528 2256 T.exe svchost.exe PID 2256 wrote to memory of 2528 2256 T.exe svchost.exe PID 2256 wrote to memory of 2832 2256 T.exe explorer.exe PID 2256 wrote to memory of 2832 2256 T.exe explorer.exe PID 2256 wrote to memory of 2832 2256 T.exe explorer.exe PID 2256 wrote to memory of 2832 2256 T.exe explorer.exe PID 2256 wrote to memory of 2832 2256 T.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\856d1b755add5c9016d5e4af9e45277d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\856d1b755add5c9016d5e4af9e45277d_JaffaCakes118.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\T.exe"C:\Users\Admin\AppData\Local\Temp\T.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2528
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2832
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD59e84e087f1a5b245df9b2d9a49657d64
SHA166889d42d0064d68d3a9d3073f8b6a7b7871c267
SHA25638672acd04fa3e7c2e87bafa3fe974fb6ee487257694b592d24d9638b9092445
SHA5125ad7f1a85a438fb48af793dd6a0b93ba5817ac6ea728d0c8aed7ad7897528fef1c270547d80eae0f395682680f06ac4c314e2fd62fa2fde7178c998ff017cd5e