Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
27-11-2024 03:53
Static task
static1
Behavioral task
behavioral1
Sample
a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe
-
Size
286KB
-
MD5
a5c337b9a5108d6172cbca8867b42afa
-
SHA1
8886719a216391db4193ae096240fc8fa77a298d
-
SHA256
f5a67079ca773d6862aab798b84b3c175a025ae0205a15b69723c2bc5ac6ed92
-
SHA512
6cbacfb0d46046355db9146b24f7a3706d5925bb92f4139b31b872d4f3d23d38a7aad3fc362c6223c1746df20a360b89ad09990e1f0296156fe3053f64a55f6a
-
SSDEEP
3072:4vDNI+KjNTjuO8zYkS6P+pmjVItNz/jO71r06JvJiPn29D+55HSk99XJcTphigTt:023jNWspjNHSk7uXCRzl5R/cx
Malware Config
Signatures
-
Detect XtremeRAT payload 4 IoCs
resource yara_rule behavioral1/memory/2540-30-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/2864-34-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/1216-35-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/2864-37-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\winlog.exe" svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Decrypted.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\winlog.exe restart" Decrypted.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 1216 Decrypted.exe -
Loads dropped DLL 2 IoCs
pid Process 2644 a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe 2644 a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\winlog.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\winlog.exe" Decrypted.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\winlog.exe" Decrypted.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\winlog.exe" svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2376 set thread context of 2644 2376 a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe 29 -
resource yara_rule behavioral1/memory/2644-12-0x0000000001E40000-0x0000000001E55000-memory.dmp upx behavioral1/files/0x0009000000016ace-10.dat upx behavioral1/memory/2540-30-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/2864-34-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/1216-35-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/2864-37-0x0000000000C80000-0x0000000000C95000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\InstallDir\winlog.exe Decrypted.exe File created C:\Windows\InstallDir\winlog.exe Decrypted.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Decrypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2376 a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe 2644 a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe 2644 a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe 2864 explorer.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2644 2376 a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe 29 PID 2376 wrote to memory of 2644 2376 a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe 29 PID 2376 wrote to memory of 2644 2376 a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe 29 PID 2376 wrote to memory of 2644 2376 a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe 29 PID 2376 wrote to memory of 2644 2376 a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe 29 PID 2376 wrote to memory of 2644 2376 a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe 29 PID 2376 wrote to memory of 2644 2376 a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe 29 PID 2376 wrote to memory of 2644 2376 a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe 29 PID 2376 wrote to memory of 2644 2376 a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe 29 PID 2376 wrote to memory of 2644 2376 a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe 29 PID 2644 wrote to memory of 1216 2644 a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe 30 PID 2644 wrote to memory of 1216 2644 a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe 30 PID 2644 wrote to memory of 1216 2644 a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe 30 PID 2644 wrote to memory of 1216 2644 a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe 30 PID 1216 wrote to memory of 2540 1216 Decrypted.exe 31 PID 1216 wrote to memory of 2540 1216 Decrypted.exe 31 PID 1216 wrote to memory of 2540 1216 Decrypted.exe 31 PID 1216 wrote to memory of 2540 1216 Decrypted.exe 31 PID 1216 wrote to memory of 2540 1216 Decrypted.exe 31 PID 1216 wrote to memory of 2864 1216 Decrypted.exe 32 PID 1216 wrote to memory of 2864 1216 Decrypted.exe 32 PID 1216 wrote to memory of 2864 1216 Decrypted.exe 32 PID 1216 wrote to memory of 2864 1216 Decrypted.exe 32 PID 1216 wrote to memory of 2864 1216 Decrypted.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\Decrypted.exe"C:\Users\Admin\AppData\Local\Temp\Decrypted.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2540
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2864
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD5dc2282dcfe443e577797391c58388f77
SHA154fe662a36204f6bde581537fa8431013b1a7a22
SHA25608f265da5941c23c2869d05c563bf5aa65f7a4b4e54b607b8864e49b32466f8d
SHA512e14f107a00520975385c8324dfc7b784e0335721a801dedfbfeb2d867e8c67b6ddd9cd360709d29f12fdabc7da2dc21baed1725f2d42689769a6660f91febac5