Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 20:14
Static task
static1
Behavioral task
behavioral1
Sample
96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe
-
Size
327KB
-
MD5
96f932e3cc5fd67994c43e3dad93351b
-
SHA1
36e81ea5561e642700cfa4974556d05e0b181b58
-
SHA256
6a22714c77a9567aa280a90a9b212db198b3eac20fbdd8573f2411e66eb87264
-
SHA512
a842e0e06c63548ac77e299c1f62807577662fce6097148d1e07f0b81dfd3c64836534e407fe998f945ab7effae9f9117fb431235b0eb16a773156e2a2025eab
-
SSDEEP
3072:Sffbulo9s/4K/GoSu/LC/oTvMJDAOd5V1iAXo7TtOQmK6NVyDAxEWxLe4uTHG+o4:9OwvgaAxEWH+VKyERToWyNW7mvItk
Malware Config
Extracted
xtremerat
ksk35.no-ip.org
Signatures
-
Detect XtremeRAT payload 3 IoCs
resource yara_rule behavioral2/memory/1008-20-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/1008-24-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/2828-25-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{QXK3YM6K-5UY7-3A2L-T6C3-BPE60S4PU3L5} server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{QXK3YM6K-5UY7-3A2L-T6C3-BPE60S4PU3L5}\StubPath = "C:\\Windows\\InstallDir\\svchost.exe restart" server.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2828 server.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\svchost.exe" server.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\svchost.exe" server.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1596 set thread context of 2592 1596 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe 82 -
resource yara_rule behavioral2/files/0x0007000000023cb2-13.dat upx behavioral2/memory/2828-17-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/1008-20-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/1008-24-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/2828-25-0x0000000010000000-0x000000001004D000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\InstallDir\svchost.exe server.exe File opened for modification C:\Windows\InstallDir\ server.exe File opened for modification C:\Windows\InstallDir\svchost.exe server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1612 1008 WerFault.exe 84 2000 1008 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1596 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe 2592 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe 2828 server.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1596 wrote to memory of 2592 1596 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe 82 PID 1596 wrote to memory of 2592 1596 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe 82 PID 1596 wrote to memory of 2592 1596 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe 82 PID 1596 wrote to memory of 2592 1596 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe 82 PID 1596 wrote to memory of 2592 1596 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe 82 PID 1596 wrote to memory of 2592 1596 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe 82 PID 1596 wrote to memory of 2592 1596 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe 82 PID 1596 wrote to memory of 2592 1596 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe 82 PID 2592 wrote to memory of 2828 2592 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe 83 PID 2592 wrote to memory of 2828 2592 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe 83 PID 2592 wrote to memory of 2828 2592 96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe 83 PID 2828 wrote to memory of 1008 2828 server.exe 84 PID 2828 wrote to memory of 1008 2828 server.exe 84 PID 2828 wrote to memory of 1008 2828 server.exe 84 PID 2828 wrote to memory of 1008 2828 server.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\96f932e3cc5fd67994c43e3dad93351b_JaffaCakes118.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- System Location Discovery: System Language Discovery
PID:1008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1008 -s 3405⤵
- Program crash
PID:1612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1008 -s 4885⤵
- Program crash
PID:2000
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1008 -ip 10081⤵PID:2492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1008 -ip 10081⤵PID:1264
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD56f097ff8ff5eb9b2d045432fc551024e
SHA158e35489f37b74f3064c380b897c8167fc053671
SHA2569c570e4b1304c569b355f6317e6475955b9e059e97efea417d67f59deb4cfa92
SHA51234a10a3ca13063ebf73552f2f726b4faa49917fa5eeda36fb13ad800d0d4d604848d599762bd9b5239d5227356f7d266b0ccffb0659ee1536f4fb677e8570e3b