Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 11:53
Static task
static1
Behavioral task
behavioral1
Sample
b10f39667824d1849ce4a03eb9c080cd_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
b10f39667824d1849ce4a03eb9c080cd_JaffaCakes118.exe
-
Size
75KB
-
MD5
b10f39667824d1849ce4a03eb9c080cd
-
SHA1
c9c976b9da57d242e6083865ccaa54e6dd05f7fb
-
SHA256
6b952d6ebb08de5eab2f3ea4c71e7180c3a94c414b3ce9a96a990e72b449b28d
-
SHA512
84141d18910ef9671fa0c43bab870c5f8260e98b82606b19f52a28c86e7e97e2043bbe8c0a07022da3aeb72082ee50946b2d3706beeddc8790b2379c9bcbb3f1
-
SSDEEP
1536:cj2qkSZZZ3gd4XUZuhgZWVg5gjwp9w0KOIeLrtqZ2:cjYUP4uhgZWV949w5ODHIZ2
Malware Config
Extracted
xtremerat
botak.no-ip.info
Signatures
-
Detect XtremeRAT payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1208-21-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/3212-23-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/1208-24-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
b10f39667824d1849ce4a03eb9c080cd_JaffaCakes118.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation b10f39667824d1849ce4a03eb9c080cd_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
Processes:
Crypted.exepid Process 3212 Crypted.exe -
Processes:
resource yara_rule behavioral2/files/0x000b000000023b7b-14.dat upx behavioral2/memory/3212-17-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/1208-21-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/3212-23-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/1208-24-0x0000000010000000-0x000000001004D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target Process procid_target 3308 1208 WerFault.exe 84 1928 1208 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Crypted.exesvchost.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Crypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
b10f39667824d1849ce4a03eb9c080cd_JaffaCakes118.exeCrypted.exedescription pid Process procid_target PID 4332 wrote to memory of 3212 4332 b10f39667824d1849ce4a03eb9c080cd_JaffaCakes118.exe 83 PID 4332 wrote to memory of 3212 4332 b10f39667824d1849ce4a03eb9c080cd_JaffaCakes118.exe 83 PID 4332 wrote to memory of 3212 4332 b10f39667824d1849ce4a03eb9c080cd_JaffaCakes118.exe 83 PID 3212 wrote to memory of 1208 3212 Crypted.exe 84 PID 3212 wrote to memory of 1208 3212 Crypted.exe 84 PID 3212 wrote to memory of 1208 3212 Crypted.exe 84 PID 3212 wrote to memory of 1208 3212 Crypted.exe 84 PID 3212 wrote to memory of 1968 3212 Crypted.exe 85 PID 3212 wrote to memory of 1968 3212 Crypted.exe 85 PID 3212 wrote to memory of 1968 3212 Crypted.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\b10f39667824d1849ce4a03eb9c080cd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b10f39667824d1849ce4a03eb9c080cd_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\Crypted.exe"C:\Users\Admin\AppData\Local\Temp\Crypted.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- System Location Discovery: System Language Discovery
PID:1208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1208 -s 4804⤵
- Program crash
PID:3308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1208 -s 5004⤵
- Program crash
PID:1928
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:1968
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1208 -ip 12081⤵PID:1220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1208 -ip 12081⤵PID:3208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD53707c298c99b776e2a92853bc1261f69
SHA1d8980775871f279b2ce7e3e9898de016af8d6898
SHA256a5a583570914f7654d572aa35687f9330fb2f56941d1589443f5b3fe37ef3294
SHA512a0d8d3d47fcc954b86f50bb0050f3d8c04b0e142f8fddcf80bfe8691e78cab96a91d5d4d946bfdbc70aeac138e9eecb55c8abc26bacc0549d965c506dd0049ae