Analysis
-
max time kernel
94s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 18:07
Static task
static1
Behavioral task
behavioral1
Sample
a90a788f257fcb6fb27f2add6c966340_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
a90a788f257fcb6fb27f2add6c966340_JaffaCakes118.exe
-
Size
139KB
-
MD5
a90a788f257fcb6fb27f2add6c966340
-
SHA1
963c8589e873f43f984db75c01b5e8ba5acfd172
-
SHA256
178505b0fe241c1e1e404e8258b460a3435acfba0434052dd2aec363aff7a0c8
-
SHA512
684f5f8b14e83a0e820676a2ef21918f7adfc63be3274a5a3376f96386d7a7c0add06791759f81cd289db0da6a706055ea040009ce7a0c746e533ae6d1a252d9
-
SSDEEP
3072:G/v7xIj0jsCpbDRheP5AQ8JSR+VnI14xn0azFRZ0IJxtSO3TvRdr:MdJjrpfuESR+VnIyx1zFRPxjNdr
Malware Config
Extracted
xtremerat
vista054.no-ip.biz
Signatures
-
Detect XtremeRAT payload 3 IoCs
resource yara_rule behavioral2/memory/5032-22-0x0000000010000000-0x000000001005D000-memory.dmp family_xtremerat behavioral2/memory/4992-23-0x0000000010000000-0x000000001005D000-memory.dmp family_xtremerat behavioral2/memory/5032-24-0x0000000010000000-0x000000001005D000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation a90a788f257fcb6fb27f2add6c966340_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4992 123server.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini a90a788f257fcb6fb27f2add6c966340_JaffaCakes118.exe File opened for modification C:\Windows\assembly\Desktop.ini a90a788f257fcb6fb27f2add6c966340_JaffaCakes118.exe -
resource yara_rule behavioral2/files/0x000a000000023b6b-17.dat upx behavioral2/memory/4992-20-0x0000000010000000-0x000000001005D000-memory.dmp upx behavioral2/memory/5032-22-0x0000000010000000-0x000000001005D000-memory.dmp upx behavioral2/memory/4992-23-0x0000000010000000-0x000000001005D000-memory.dmp upx behavioral2/memory/5032-24-0x0000000010000000-0x000000001005D000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly a90a788f257fcb6fb27f2add6c966340_JaffaCakes118.exe File created C:\Windows\assembly\Desktop.ini a90a788f257fcb6fb27f2add6c966340_JaffaCakes118.exe File opened for modification C:\Windows\assembly\Desktop.ini a90a788f257fcb6fb27f2add6c966340_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4860 5032 WerFault.exe 83 3864 5032 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 123server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3224 a90a788f257fcb6fb27f2add6c966340_JaffaCakes118.exe Token: 33 3224 a90a788f257fcb6fb27f2add6c966340_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 3224 a90a788f257fcb6fb27f2add6c966340_JaffaCakes118.exe Token: 33 3224 a90a788f257fcb6fb27f2add6c966340_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 3224 a90a788f257fcb6fb27f2add6c966340_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3224 wrote to memory of 4992 3224 a90a788f257fcb6fb27f2add6c966340_JaffaCakes118.exe 82 PID 3224 wrote to memory of 4992 3224 a90a788f257fcb6fb27f2add6c966340_JaffaCakes118.exe 82 PID 3224 wrote to memory of 4992 3224 a90a788f257fcb6fb27f2add6c966340_JaffaCakes118.exe 82 PID 4992 wrote to memory of 5032 4992 123server.exe 83 PID 4992 wrote to memory of 5032 4992 123server.exe 83 PID 4992 wrote to memory of 5032 4992 123server.exe 83 PID 4992 wrote to memory of 5032 4992 123server.exe 83 PID 4992 wrote to memory of 2700 4992 123server.exe 84 PID 4992 wrote to memory of 2700 4992 123server.exe 84 PID 4992 wrote to memory of 2700 4992 123server.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\a90a788f257fcb6fb27f2add6c966340_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a90a788f257fcb6fb27f2add6c966340_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\123server.exe"C:\Users\Admin\AppData\Local\Temp\123server.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- System Location Discovery: System Language Discovery
PID:5032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 4844⤵
- Program crash
PID:4860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 5044⤵
- Program crash
PID:3864
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:2700
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 5032 -ip 50321⤵PID:4920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 5032 -ip 50321⤵PID:2692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD5f89062a56c67b7e7119bf5474b2e92a0
SHA137b35f01085470b3b134b73d85d9561af912e9e5
SHA256373c5cdd917a95f83465a5c907696efbd21de9119109f7d6a052e58cce5aa1de
SHA512aa0f2290573b08e9dd9d4dfc3128a6a3427866a4a16b794490bc1129b7aa3794976f12503617f4734e54946b8d8646f87f79255f18a7819fb19542d584546cb1