Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 00:48
Static task
static1
Behavioral task
behavioral1
Sample
b44191c3c9dcb4646e53494ee3afa7e8_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
b44191c3c9dcb4646e53494ee3afa7e8_JaffaCakes118.exe
-
Size
423KB
-
MD5
b44191c3c9dcb4646e53494ee3afa7e8
-
SHA1
4e7503770f9a562f5790c35b1317775f8fb72c99
-
SHA256
54114739ad70292c0841ea3c00e4bdaf6e9cf15afa73a08b9d54c337ad793c6d
-
SHA512
d520c6799a7c575430537d865057bd331f7a61cf10c1f9dc4cbd717c06c84ea6dacb54b991e79880bb0dbc19f86f253df9290e03bba13384f8bdbf6074272030
-
SSDEEP
6144:+VkTJYpohmgLTfL2POVBJyIxKIw6RL1DLO2+Ibsuj4cbT37W3vdl6bIIq+qJW3Nx:gstxoa1DLwcJEj/L6bIbACo7
Malware Config
Extracted
xtremerat
emchiyeuminhanh.no-ip.org
emchiyeuminhanh.no-ip.org
Signatures
-
Detect XtremeRAT payload 4 IoCs
resource yara_rule behavioral1/memory/2520-29-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral1/memory/2860-26-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral1/memory/3000-32-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral1/memory/2520-33-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} dieukhien.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\Serv3r.exe restart" dieukhien.exe -
Executes dropped EXE 1 IoCs
pid Process 3000 dieukhien.exe -
Loads dropped DLL 2 IoCs
pid Process 376 b44191c3c9dcb4646e53494ee3afa7e8_JaffaCakes118.exe 376 b44191c3c9dcb4646e53494ee3afa7e8_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Serv3r.exe" dieukhien.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Serv3r.exe" dieukhien.exe -
resource yara_rule behavioral1/files/0x000b00000001225e-3.dat upx behavioral1/memory/3000-14-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/2520-29-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/2860-26-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/3000-32-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/2520-33-0x0000000000C80000-0x0000000000C96000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\InstallDir\ dieukhien.exe File opened for modification C:\Windows\InstallDir\Serv3r.exe dieukhien.exe File created C:\Windows\InstallDir\Serv3r.exe dieukhien.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b44191c3c9dcb4646e53494ee3afa7e8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dieukhien.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 824 DllHost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 824 DllHost.exe 824 DllHost.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 376 wrote to memory of 3000 376 b44191c3c9dcb4646e53494ee3afa7e8_JaffaCakes118.exe 30 PID 376 wrote to memory of 3000 376 b44191c3c9dcb4646e53494ee3afa7e8_JaffaCakes118.exe 30 PID 376 wrote to memory of 3000 376 b44191c3c9dcb4646e53494ee3afa7e8_JaffaCakes118.exe 30 PID 376 wrote to memory of 3000 376 b44191c3c9dcb4646e53494ee3afa7e8_JaffaCakes118.exe 30 PID 3000 wrote to memory of 2744 3000 dieukhien.exe 32 PID 3000 wrote to memory of 2744 3000 dieukhien.exe 32 PID 3000 wrote to memory of 2744 3000 dieukhien.exe 32 PID 3000 wrote to memory of 2744 3000 dieukhien.exe 32 PID 3000 wrote to memory of 2520 3000 dieukhien.exe 33 PID 3000 wrote to memory of 2520 3000 dieukhien.exe 33 PID 3000 wrote to memory of 2520 3000 dieukhien.exe 33 PID 3000 wrote to memory of 2520 3000 dieukhien.exe 33 PID 3000 wrote to memory of 2860 3000 dieukhien.exe 34 PID 3000 wrote to memory of 2860 3000 dieukhien.exe 34 PID 3000 wrote to memory of 2860 3000 dieukhien.exe 34 PID 3000 wrote to memory of 2860 3000 dieukhien.exe 34 PID 3000 wrote to memory of 2860 3000 dieukhien.exe 34 PID 3000 wrote to memory of 2520 3000 dieukhien.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\b44191c3c9dcb4646e53494ee3afa7e8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b44191c3c9dcb4646e53494ee3afa7e8_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Users\Admin\AppData\Local\Temp\dieukhien.exe"C:\Users\Admin\AppData\Local\Temp\dieukhien.exe"2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2744
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- System Location Discovery: System Language Discovery
PID:2520
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- System Location Discovery: System Language Discovery
PID:2860
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:824
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
370KB
MD59a75fbf8228195ed928c7be5efe0b3cc
SHA17899e8e0a6d18692fe5c0b56602fc82328005b6f
SHA2562c6667181088e72e1a0549eebef5ed1f1bfc3f29bff505325b19d7dcf3d953ea
SHA512ee0586ee3a70ccefbbc8262fc38bcf62836c9ffbfdf293878d2ad313e6cfe66202777077fd6b44f7de9a5d583e27fea7e801849b217f4be8002fdfc906d8a154
-
Filesize
21KB
MD5c7ce5ef12e6ad375a56fa72198a93a0b
SHA158e42309f060ab138b69c3add5e11b18f471a503
SHA256f35e31591a35ab98493c739494fffd6f5adfeea58c8ac590c9502429e61f9af5
SHA512be42a464d59245a9113461ae35e7367162e9ad6bffe13b7f732ff30f32432bf1c94b490cbe1293ab2fae68c7ceb79b0973829eada59cd38254358ac3e9892c5a