Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 03:53
Static task
static1
Behavioral task
behavioral1
Sample
a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe
-
Size
286KB
-
MD5
a5c337b9a5108d6172cbca8867b42afa
-
SHA1
8886719a216391db4193ae096240fc8fa77a298d
-
SHA256
f5a67079ca773d6862aab798b84b3c175a025ae0205a15b69723c2bc5ac6ed92
-
SHA512
6cbacfb0d46046355db9146b24f7a3706d5925bb92f4139b31b872d4f3d23d38a7aad3fc362c6223c1746df20a360b89ad09990e1f0296156fe3053f64a55f6a
-
SSDEEP
3072:4vDNI+KjNTjuO8zYkS6P+pmjVItNz/jO71r06JvJiPn29D+55HSk99XJcTphigTt:023jNWspjNHSk7uXCRzl5R/cx
Malware Config
Signatures
-
Detect XtremeRAT payload 4 IoCs
resource yara_rule behavioral2/memory/5116-24-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral2/memory/3732-26-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral2/memory/3512-27-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral2/memory/3732-29-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Decrypted.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\winlog.exe restart" Decrypted.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\winlog.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3512 Decrypted.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\winlog.exe" Decrypted.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\winlog.exe" Decrypted.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\winlog.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\winlog.exe" svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1960 set thread context of 4232 1960 a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe 82 -
resource yara_rule behavioral2/files/0x000a000000023b9b-12.dat upx behavioral2/memory/3512-15-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral2/memory/5116-24-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral2/memory/3732-26-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral2/memory/3512-27-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral2/memory/3732-29-0x0000000000C80000-0x0000000000C95000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\InstallDir\winlog.exe Decrypted.exe File created C:\Windows\InstallDir\winlog.exe Decrypted.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Decrypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1960 a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe 4232 a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe 4232 a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe 3732 explorer.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1960 wrote to memory of 4232 1960 a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe 82 PID 1960 wrote to memory of 4232 1960 a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe 82 PID 1960 wrote to memory of 4232 1960 a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe 82 PID 1960 wrote to memory of 4232 1960 a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe 82 PID 1960 wrote to memory of 4232 1960 a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe 82 PID 1960 wrote to memory of 4232 1960 a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe 82 PID 1960 wrote to memory of 4232 1960 a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe 82 PID 1960 wrote to memory of 4232 1960 a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe 82 PID 1960 wrote to memory of 4232 1960 a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe 82 PID 4232 wrote to memory of 3512 4232 a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe 83 PID 4232 wrote to memory of 3512 4232 a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe 83 PID 4232 wrote to memory of 3512 4232 a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe 83 PID 3512 wrote to memory of 5116 3512 Decrypted.exe 84 PID 3512 wrote to memory of 5116 3512 Decrypted.exe 84 PID 3512 wrote to memory of 5116 3512 Decrypted.exe 84 PID 3512 wrote to memory of 5116 3512 Decrypted.exe 84 PID 3512 wrote to memory of 3732 3512 Decrypted.exe 85 PID 3512 wrote to memory of 3732 3512 Decrypted.exe 85 PID 3512 wrote to memory of 3732 3512 Decrypted.exe 85 PID 3512 wrote to memory of 3732 3512 Decrypted.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5c337b9a5108d6172cbca8867b42afa_JaffaCakes118.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\Decrypted.exe"C:\Users\Admin\AppData\Local\Temp\Decrypted.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:5116
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3732
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD5dc2282dcfe443e577797391c58388f77
SHA154fe662a36204f6bde581537fa8431013b1a7a22
SHA25608f265da5941c23c2869d05c563bf5aa65f7a4b4e54b607b8864e49b32466f8d
SHA512e14f107a00520975385c8324dfc7b784e0335721a801dedfbfeb2d867e8c67b6ddd9cd360709d29f12fdabc7da2dc21baed1725f2d42689769a6660f91febac5