Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 23:59
Static task
static1
Behavioral task
behavioral1
Sample
916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe
-
Size
668KB
-
MD5
916bd1bf4bc489ea1fe45061d0f7210d
-
SHA1
07768f49507099f013f989b4536635a655f57660
-
SHA256
d81e62234e9763b36a8f4acac3d8f4f2061d6140d1775ddd55164b4e8197be59
-
SHA512
00f72fbb46396395b2a34790728ba23ad556e1353fa8934e42dd2212d992f5343fa65d122b672c0e728c3e2a3e6bb21fc35577d74840656c698fd3266db50e2d
-
SSDEEP
12288:POqBSJNJ/+EkGz1lr3nxGteN4r3t8UOGz624SitfLmygYiW:2CScE7z193Rit8UJ62BmhgLW
Malware Config
Extracted
xtremerat
yahoomail.3utilities.com
Signatures
-
Detect XtremeRAT payload 16 IoCs
resource yara_rule behavioral2/memory/1044-2-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral2/memory/1044-8-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral2/memory/1044-10-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral2/memory/1044-7-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral2/memory/1044-6-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral2/memory/1044-11-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral2/memory/1044-4-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral2/memory/1044-12-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral2/memory/1044-1-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral2/memory/1044-16-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral2/memory/2400-21-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral2/memory/1044-22-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral2/memory/2400-24-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral2/memory/2400-30-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral2/memory/2400-36-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral2/memory/4940-47-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\updater\\Config.exe restart" 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Config.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\updater\\Config.exe restart" Config.exe -
Executes dropped EXE 2 IoCs
pid Process 1800 Config.exe 4940 Config.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3656 set thread context of 1044 3656 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe 94 PID 1800 set thread context of 4940 1800 Config.exe 105 PID 4940 set thread context of 3932 4940 Config.exe 108 -
resource yara_rule behavioral2/memory/3932-55-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral2/memory/3932-56-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral2/memory/3932-54-0x0000000001610000-0x0000000001712000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4908 3932 WerFault.exe 108 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Config.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Config.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2400 explorer.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 3656 wrote to memory of 1044 3656 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe 94 PID 3656 wrote to memory of 1044 3656 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe 94 PID 3656 wrote to memory of 1044 3656 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe 94 PID 3656 wrote to memory of 1044 3656 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe 94 PID 3656 wrote to memory of 1044 3656 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe 94 PID 3656 wrote to memory of 1044 3656 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe 94 PID 3656 wrote to memory of 1044 3656 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe 94 PID 3656 wrote to memory of 1044 3656 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe 94 PID 3656 wrote to memory of 1044 3656 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe 94 PID 3656 wrote to memory of 1044 3656 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe 94 PID 3656 wrote to memory of 1044 3656 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe 94 PID 3656 wrote to memory of 1044 3656 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe 94 PID 3656 wrote to memory of 1044 3656 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe 94 PID 1044 wrote to memory of 4144 1044 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe 101 PID 1044 wrote to memory of 4144 1044 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe 101 PID 1044 wrote to memory of 4144 1044 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe 101 PID 1044 wrote to memory of 2400 1044 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe 102 PID 1044 wrote to memory of 2400 1044 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe 102 PID 1044 wrote to memory of 2400 1044 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe 102 PID 1044 wrote to memory of 2400 1044 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe 102 PID 2400 wrote to memory of 1800 2400 explorer.exe 104 PID 2400 wrote to memory of 1800 2400 explorer.exe 104 PID 2400 wrote to memory of 1800 2400 explorer.exe 104 PID 1800 wrote to memory of 4940 1800 Config.exe 105 PID 1800 wrote to memory of 4940 1800 Config.exe 105 PID 1800 wrote to memory of 4940 1800 Config.exe 105 PID 1800 wrote to memory of 4940 1800 Config.exe 105 PID 1800 wrote to memory of 4940 1800 Config.exe 105 PID 1800 wrote to memory of 4940 1800 Config.exe 105 PID 1800 wrote to memory of 4940 1800 Config.exe 105 PID 1800 wrote to memory of 4940 1800 Config.exe 105 PID 1800 wrote to memory of 4940 1800 Config.exe 105 PID 1800 wrote to memory of 4940 1800 Config.exe 105 PID 1800 wrote to memory of 4940 1800 Config.exe 105 PID 1800 wrote to memory of 4940 1800 Config.exe 105 PID 1800 wrote to memory of 4940 1800 Config.exe 105 PID 4940 wrote to memory of 4588 4940 Config.exe 107 PID 4940 wrote to memory of 4588 4940 Config.exe 107 PID 4940 wrote to memory of 4588 4940 Config.exe 107 PID 4940 wrote to memory of 3932 4940 Config.exe 108 PID 4940 wrote to memory of 3932 4940 Config.exe 108 PID 4940 wrote to memory of 3932 4940 Config.exe 108 PID 4940 wrote to memory of 3932 4940 Config.exe 108 PID 4940 wrote to memory of 3932 4940 Config.exe 108 PID 4940 wrote to memory of 3932 4940 Config.exe 108 PID 4940 wrote to memory of 3932 4940 Config.exe 108 PID 4940 wrote to memory of 3932 4940 Config.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:4144
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\updater\Config.exe"C:\updater\Config.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\updater\Config.exeC:\updater\Config.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:4588
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵PID:3932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3932 -s 127⤵
- Program crash
PID:4908
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3932 -ip 39321⤵PID:1144
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD528b92d0b57db85ea0a13c5ebe53f9a38
SHA1b44c1a59147be8614fb0efd76523a0d6bd266626
SHA256dcf0eaaf79af71f084c0a5b055b5dd4558cd195234dbeee3f5bcea72e77bf9f8
SHA512723998a5da5f160c2a9d6e8ef345f08c844de992584ab02bd2da6e646cdf31a2f85193e701614c415fb8bdc82104b32ee67834f5f3c1caa584382251b9e35e69
-
Filesize
343KB
MD56426d400c96fb9ffef4eaa54f6647f4c
SHA170a37871aff432790b6adf7d3fc4eb929476e082
SHA25698bba0cf4c57ecd35b227f45e4aa6dd50ef7cfb1160235cc14687c96eb09fa3c
SHA5122c8b4d3ab066cbfca6cf0c8d89d5044152b5e3d7100249cbedd1c816e3a4a94efc8bc6b79c1dab4bdf96e3ce476d6caccf625cfbe0aff3bf5e7a29dfcfa948c5
-
Filesize
668KB
MD5916bd1bf4bc489ea1fe45061d0f7210d
SHA107768f49507099f013f989b4536635a655f57660
SHA256d81e62234e9763b36a8f4acac3d8f4f2061d6140d1775ddd55164b4e8197be59
SHA51200f72fbb46396395b2a34790728ba23ad556e1353fa8934e42dd2212d992f5343fa65d122b672c0e728c3e2a3e6bb21fc35577d74840656c698fd3266db50e2d