Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 00:48
Static task
static1
Behavioral task
behavioral1
Sample
b44191c3c9dcb4646e53494ee3afa7e8_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
b44191c3c9dcb4646e53494ee3afa7e8_JaffaCakes118.exe
-
Size
423KB
-
MD5
b44191c3c9dcb4646e53494ee3afa7e8
-
SHA1
4e7503770f9a562f5790c35b1317775f8fb72c99
-
SHA256
54114739ad70292c0841ea3c00e4bdaf6e9cf15afa73a08b9d54c337ad793c6d
-
SHA512
d520c6799a7c575430537d865057bd331f7a61cf10c1f9dc4cbd717c06c84ea6dacb54b991e79880bb0dbc19f86f253df9290e03bba13384f8bdbf6074272030
-
SSDEEP
6144:+VkTJYpohmgLTfL2POVBJyIxKIw6RL1DLO2+Ibsuj4cbT37W3vdl6bIIq+qJW3Nx:gstxoa1DLwcJEj/L6bIbACo7
Malware Config
Extracted
xtremerat
emchiyeuminhanh.no-ip.org
emchiyeuminhanh.no-ip.org
Signatures
-
Detect XtremeRAT payload 4 IoCs
resource yara_rule behavioral2/memory/4240-19-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral2/memory/4140-18-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral2/memory/1540-21-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral2/memory/4240-22-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} dieukhien.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\Serv3r.exe restart" dieukhien.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation b44191c3c9dcb4646e53494ee3afa7e8_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1540 dieukhien.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Serv3r.exe" dieukhien.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Serv3r.exe" dieukhien.exe -
resource yara_rule behavioral2/files/0x0008000000023cdd-4.dat upx behavioral2/memory/1540-11-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral2/memory/4240-19-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral2/memory/4140-18-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral2/memory/1540-21-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral2/memory/4240-22-0x0000000000C80000-0x0000000000C96000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\InstallDir\Serv3r.exe dieukhien.exe File created C:\Windows\InstallDir\Serv3r.exe dieukhien.exe File opened for modification C:\Windows\InstallDir\ dieukhien.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b44191c3c9dcb4646e53494ee3afa7e8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dieukhien.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 5072 wrote to memory of 1540 5072 b44191c3c9dcb4646e53494ee3afa7e8_JaffaCakes118.exe 84 PID 5072 wrote to memory of 1540 5072 b44191c3c9dcb4646e53494ee3afa7e8_JaffaCakes118.exe 84 PID 5072 wrote to memory of 1540 5072 b44191c3c9dcb4646e53494ee3afa7e8_JaffaCakes118.exe 84 PID 1540 wrote to memory of 4616 1540 dieukhien.exe 85 PID 1540 wrote to memory of 4616 1540 dieukhien.exe 85 PID 1540 wrote to memory of 4240 1540 dieukhien.exe 86 PID 1540 wrote to memory of 4240 1540 dieukhien.exe 86 PID 1540 wrote to memory of 4240 1540 dieukhien.exe 86 PID 1540 wrote to memory of 4140 1540 dieukhien.exe 87 PID 1540 wrote to memory of 4140 1540 dieukhien.exe 87 PID 1540 wrote to memory of 4140 1540 dieukhien.exe 87 PID 1540 wrote to memory of 4140 1540 dieukhien.exe 87 PID 1540 wrote to memory of 4240 1540 dieukhien.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\b44191c3c9dcb4646e53494ee3afa7e8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b44191c3c9dcb4646e53494ee3afa7e8_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\dieukhien.exe"C:\Users\Admin\AppData\Local\Temp\dieukhien.exe"2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4616
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- System Location Discovery: System Language Discovery
PID:4240
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- System Location Discovery: System Language Discovery
PID:4140
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD5c7ce5ef12e6ad375a56fa72198a93a0b
SHA158e42309f060ab138b69c3add5e11b18f471a503
SHA256f35e31591a35ab98493c739494fffd6f5adfeea58c8ac590c9502429e61f9af5
SHA512be42a464d59245a9113461ae35e7367162e9ad6bffe13b7f732ff30f32432bf1c94b490cbe1293ab2fae68c7ceb79b0973829eada59cd38254358ac3e9892c5a