Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 20:14
Static task
static1
Behavioral task
behavioral1
Sample
96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe
-
Size
327KB
-
MD5
96f932e3cc5fd67994c43e3dad93351b
-
SHA1
36e81ea5561e642700cfa4974556d05e0b181b58
-
SHA256
6a22714c77a9567aa280a90a9b212db198b3eac20fbdd8573f2411e66eb87264
-
SHA512
a842e0e06c63548ac77e299c1f62807577662fce6097148d1e07f0b81dfd3c64836534e407fe998f945ab7effae9f9117fb431235b0eb16a773156e2a2025eab
-
SSDEEP
3072:Sffbulo9s/4K/GoSu/LC/oTvMJDAOd5V1iAXo7TtOQmK6NVyDAxEWxLe4uTHG+o4:9OwvgaAxEWH+VKyERToWyNW7mvItk
Malware Config
Extracted
xtremerat
ksk35.no-ip.org
Signatures
-
Detect XtremeRAT payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2584-36-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral1/memory/2816-43-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral1/memory/2816-42-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
Processes:
server.exesvchost.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{QXK3YM6K-5UY7-3A2L-T6C3-BPE60S4PU3L5} server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{QXK3YM6K-5UY7-3A2L-T6C3-BPE60S4PU3L5}\StubPath = "C:\\Windows\\InstallDir\\svchost.exe restart" server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{QXK3YM6K-5UY7-3A2L-T6C3-BPE60S4PU3L5} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{QXK3YM6K-5UY7-3A2L-T6C3-BPE60S4PU3L5}\StubPath = "C:\\Windows\\InstallDir\\svchost.exe" svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
server.exepid process 2816 server.exe -
Loads dropped DLL 2 IoCs
Processes:
96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exepid process 2808 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe 2808 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
server.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\svchost.exe" server.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\svchost.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\svchost.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\svchost.exe" svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exedescription pid process target process PID 2664 set thread context of 2808 2664 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\server.exe upx behavioral1/memory/2584-36-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/2808-25-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/2816-43-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/2816-42-0x0000000010000000-0x000000001004D000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
Processes:
server.exedescription ioc process File opened for modification C:\Windows\InstallDir\svchost.exe server.exe File created C:\Windows\InstallDir\svchost.exe server.exe File opened for modification C:\Windows\InstallDir\ server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
DllHost.exeserver.exesvchost.exe96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
DllHost.exepid process 2728 DllHost.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exeserver.exeDllHost.exepid process 2664 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe 2808 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe 2816 server.exe 2728 DllHost.exe 2728 DllHost.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exeserver.exedescription pid process target process PID 2664 wrote to memory of 2808 2664 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe PID 2664 wrote to memory of 2808 2664 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe PID 2664 wrote to memory of 2808 2664 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe PID 2664 wrote to memory of 2808 2664 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe PID 2664 wrote to memory of 2808 2664 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe PID 2664 wrote to memory of 2808 2664 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe PID 2664 wrote to memory of 2808 2664 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe PID 2664 wrote to memory of 2808 2664 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe PID 2664 wrote to memory of 2808 2664 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe PID 2808 wrote to memory of 2816 2808 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe server.exe PID 2808 wrote to memory of 2816 2808 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe server.exe PID 2808 wrote to memory of 2816 2808 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe server.exe PID 2808 wrote to memory of 2816 2808 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe server.exe PID 2816 wrote to memory of 2584 2816 server.exe svchost.exe PID 2816 wrote to memory of 2584 2816 server.exe svchost.exe PID 2816 wrote to memory of 2584 2816 server.exe svchost.exe PID 2816 wrote to memory of 2584 2816 server.exe svchost.exe PID 2816 wrote to memory of 2584 2816 server.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2584
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2728
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD5b8bf88e561d64b6e39640ed160e1d2fe
SHA11490accdfcf3df7103fbfbbc0d7f45ec35981ed5
SHA2564b5f1c39460ff95251a09d44f862b5101d7c84ad87466281d116e9c491044c2d
SHA51278d1074a6854f897658d2a973347a87ad552cf2f2c529a2ad3a80d05c9d7e7433e2c739502347560475dd0f7f3162d0950199942a73f698968ffedb746d0c9b7
-
Filesize
33KB
MD56f097ff8ff5eb9b2d045432fc551024e
SHA158e35489f37b74f3064c380b897c8167fc053671
SHA2569c570e4b1304c569b355f6317e6475955b9e059e97efea417d67f59deb4cfa92
SHA51234a10a3ca13063ebf73552f2f726b4faa49917fa5eeda36fb13ad800d0d4d604848d599762bd9b5239d5227356f7d266b0ccffb0659ee1536f4fb677e8570e3b