Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 07:29
Behavioral task
behavioral1
Sample
934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe
Resource
win7-20241023-en
General
-
Target
934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe
-
Size
130KB
-
MD5
934b9bf7a3a513cb330656bdceb09359
-
SHA1
1c463f65cd451e6291bedfc38bd06ca172fc6cba
-
SHA256
ff3e4d0ad10320a804f277918b8914803b995d1b46f5c3a82636b378364bd5e2
-
SHA512
a329d83bdb661ead25bb922aa5b0337d6f625947dcb652ceae3573a4f20f8dc76e5f2a5d1ca63bbe86cef944259fa74251bbefd14d59d9496ca099942c9952dc
-
SSDEEP
3072:m1QMh8DB5J9Sb4g7uigN2KCotYCg4TILnW5NTG8x:rG8bJ9Sb4gM2nCg4kinx
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Extracted
xtremerat
mastino.no-ip.org
Signatures
-
Detect XtremeRAT payload 3 IoCs
resource yara_rule behavioral1/memory/2944-41-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral1/memory/2944-40-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral1/memory/2944-54-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat -
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Executes dropped EXE 1 IoCs
pid Process 2944 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2312 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe File opened (read-only) \??\S: 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe File opened (read-only) \??\Y: 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe File opened (read-only) \??\B: 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe File opened (read-only) \??\H: 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe File opened (read-only) \??\M: 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe File opened (read-only) \??\Z: 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe File opened (read-only) \??\I: 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe File opened (read-only) \??\L: 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe File opened (read-only) \??\T: 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe File opened (read-only) \??\P: 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe File opened (read-only) \??\Q: 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe File opened (read-only) \??\V: 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe File opened (read-only) \??\X: 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe File opened (read-only) \??\E: 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe File opened (read-only) \??\J: 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe File opened (read-only) \??\O: 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe File opened (read-only) \??\N: 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe File opened (read-only) \??\U: 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe File opened (read-only) \??\W: 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe File opened (read-only) \??\A: 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe File opened (read-only) \??\G: 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe File opened (read-only) \??\K: 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2312 set thread context of 2944 2312 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe 30 -
resource yara_rule behavioral1/memory/2312-0-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2312-5-0x0000000002750000-0x00000000037DE000-memory.dmp upx behavioral1/memory/2312-13-0x0000000002750000-0x00000000037DE000-memory.dmp upx behavioral1/memory/2312-4-0x0000000002750000-0x00000000037DE000-memory.dmp upx behavioral1/memory/2312-11-0x0000000002750000-0x00000000037DE000-memory.dmp upx behavioral1/memory/2312-12-0x0000000002750000-0x00000000037DE000-memory.dmp upx behavioral1/memory/2312-10-0x0000000002750000-0x00000000037DE000-memory.dmp upx behavioral1/memory/2312-7-0x0000000002750000-0x00000000037DE000-memory.dmp upx behavioral1/memory/2312-6-0x0000000002750000-0x00000000037DE000-memory.dmp upx behavioral1/memory/2312-3-0x0000000002750000-0x00000000037DE000-memory.dmp upx behavioral1/files/0x00080000000165c7-29.dat upx behavioral1/memory/2944-41-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/2312-42-0x0000000002750000-0x00000000037DE000-memory.dmp upx behavioral1/memory/2312-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2944-40-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/2944-54-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/2944-39-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/2944-36-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/2944-31-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/2944-32-0x0000000010000000-0x000000001004D000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2312 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 2312 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe Token: SeDebugPrivilege 2312 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe Token: SeDebugPrivilege 2312 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe Token: SeDebugPrivilege 2312 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe Token: SeDebugPrivilege 2312 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe Token: SeDebugPrivilege 2312 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe Token: SeDebugPrivilege 2312 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe Token: SeDebugPrivilege 2312 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe Token: SeDebugPrivilege 2312 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe Token: SeDebugPrivilege 2312 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe Token: SeDebugPrivilege 2312 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe Token: SeDebugPrivilege 2312 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe Token: SeDebugPrivilege 2312 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe Token: SeDebugPrivilege 2312 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe Token: SeDebugPrivilege 2312 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe Token: SeDebugPrivilege 2312 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe Token: SeDebugPrivilege 2312 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe Token: SeDebugPrivilege 2312 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe Token: SeDebugPrivilege 2312 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe Token: SeDebugPrivilege 2312 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe Token: SeDebugPrivilege 2312 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe Token: SeDebugPrivilege 2312 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2312 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2312 wrote to memory of 1092 2312 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe 19 PID 2312 wrote to memory of 1156 2312 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe 20 PID 2312 wrote to memory of 1184 2312 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe 21 PID 2312 wrote to memory of 1244 2312 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe 23 PID 2312 wrote to memory of 2944 2312 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe 30 PID 2312 wrote to memory of 2944 2312 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe 30 PID 2312 wrote to memory of 2944 2312 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe 30 PID 2312 wrote to memory of 2944 2312 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe 30 PID 2312 wrote to memory of 2944 2312 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe 30 PID 2312 wrote to memory of 2944 2312 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe 30 PID 2312 wrote to memory of 2944 2312 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe 30 PID 2312 wrote to memory of 2944 2312 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe 30 PID 2944 wrote to memory of 3068 2944 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe 31 PID 2944 wrote to memory of 3068 2944 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe 31 PID 2944 wrote to memory of 3068 2944 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe 31 PID 2944 wrote to memory of 3068 2944 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe 31 PID 2944 wrote to memory of 3068 2944 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe 31 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1092
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1156
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:3068
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1244
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
130KB
MD5934b9bf7a3a513cb330656bdceb09359
SHA11c463f65cd451e6291bedfc38bd06ca172fc6cba
SHA256ff3e4d0ad10320a804f277918b8914803b995d1b46f5c3a82636b378364bd5e2
SHA512a329d83bdb661ead25bb922aa5b0337d6f625947dcb652ceae3573a4f20f8dc76e5f2a5d1ca63bbe86cef944259fa74251bbefd14d59d9496ca099942c9952dc