Analysis
-
max time kernel
146s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
02-12-2024 19:37
Static task
static1
Behavioral task
behavioral1
Sample
b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe
-
Size
662KB
-
MD5
b9d6b508843d8ee4538e3012bd771314
-
SHA1
1346c848dd23633f2779e59204267455857c1881
-
SHA256
640647c101b1400e60bd579be1b829cdab7b431c18d14946d85032ab2f99566e
-
SHA512
89ee46028def0403efe63878f38b3a23e184ddd1b509a97cf39ef044aa96243b0e0bd9526a2d0941be676868e35400caf2bf7de4b692c3bdcfdfe1823b747de6
-
SSDEEP
12288:w9tLCL2McWmsDe5xAi1Pu3/Th12Avux7WK+O8GapLrpzL:w9ts2MbmsSHAycaQuxyKXhapLrpzL
Malware Config
Signatures
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Executes dropped EXE 1 IoCs
pid Process 2632 Server.exe -
Loads dropped DLL 1 IoCs
pid Process 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2632 set thread context of 2696 2632 Server.exe 68 -
resource yara_rule behavioral1/memory/2696-29-0x0000000001610000-0x000000000171F000-memory.dmp upx behavioral1/memory/2696-27-0x0000000001610000-0x000000000171F000-memory.dmp upx behavioral1/memory/2696-25-0x0000000001610000-0x000000000171F000-memory.dmp upx behavioral1/memory/2696-33-0x0000000001610000-0x000000000171F000-memory.dmp upx behavioral1/memory/2696-35-0x0000000001610000-0x000000000171F000-memory.dmp upx behavioral1/memory/2696-36-0x0000000001610000-0x000000000171F000-memory.dmp upx behavioral1/memory/2696-38-0x0000000001610000-0x000000000171F000-memory.dmp upx behavioral1/memory/2696-39-0x0000000001610000-0x000000000171F000-memory.dmp upx behavioral1/memory/2696-40-0x0000000001610000-0x000000000171F000-memory.dmp upx behavioral1/memory/2696-37-0x0000000001610000-0x000000000171F000-memory.dmp upx behavioral1/memory/2696-42-0x0000000001610000-0x000000000171F000-memory.dmp upx behavioral1/memory/2696-41-0x0000000001610000-0x000000000171F000-memory.dmp upx behavioral1/memory/2696-43-0x0000000001610000-0x000000000171F000-memory.dmp upx behavioral1/memory/2696-45-0x0000000001610000-0x000000000171F000-memory.dmp upx -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\InstallDir\Server.exe b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe File created C:\Windows\InstallDir\Server.exe b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe File opened for modification C:\Windows\InstallDir\ b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe File opened for modification C:\Windows\InstallDir\Server.exe Server.exe File opened for modification C:\Windows\InstallDir\ Server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2696 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2568 wrote to memory of 1484 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 30 PID 2568 wrote to memory of 1484 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 30 PID 2568 wrote to memory of 1484 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 30 PID 2568 wrote to memory of 1484 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 30 PID 2568 wrote to memory of 1484 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 30 PID 2568 wrote to memory of 1488 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 31 PID 2568 wrote to memory of 1488 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 31 PID 2568 wrote to memory of 1488 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 31 PID 2568 wrote to memory of 1488 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 31 PID 2568 wrote to memory of 2284 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 32 PID 2568 wrote to memory of 2284 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 32 PID 2568 wrote to memory of 2284 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 32 PID 2568 wrote to memory of 2284 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 32 PID 2568 wrote to memory of 2988 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 33 PID 2568 wrote to memory of 2988 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 33 PID 2568 wrote to memory of 2988 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 33 PID 2568 wrote to memory of 2988 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 33 PID 2568 wrote to memory of 1688 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 34 PID 2568 wrote to memory of 1688 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 34 PID 2568 wrote to memory of 1688 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 34 PID 2568 wrote to memory of 1688 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 34 PID 2568 wrote to memory of 2044 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 35 PID 2568 wrote to memory of 2044 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 35 PID 2568 wrote to memory of 2044 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 35 PID 2568 wrote to memory of 2044 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 35 PID 2568 wrote to memory of 2368 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 36 PID 2568 wrote to memory of 2368 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 36 PID 2568 wrote to memory of 2368 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 36 PID 2568 wrote to memory of 2368 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 36 PID 2568 wrote to memory of 2096 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 37 PID 2568 wrote to memory of 2096 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 37 PID 2568 wrote to memory of 2096 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 37 PID 2568 wrote to memory of 2096 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 37 PID 2568 wrote to memory of 2920 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 38 PID 2568 wrote to memory of 2920 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 38 PID 2568 wrote to memory of 2920 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 38 PID 2568 wrote to memory of 2920 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 38 PID 2568 wrote to memory of 2484 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 39 PID 2568 wrote to memory of 2484 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 39 PID 2568 wrote to memory of 2484 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 39 PID 2568 wrote to memory of 2484 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 39 PID 2568 wrote to memory of 2392 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 40 PID 2568 wrote to memory of 2392 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 40 PID 2568 wrote to memory of 2392 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 40 PID 2568 wrote to memory of 2392 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 40 PID 2568 wrote to memory of 1336 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 41 PID 2568 wrote to memory of 1336 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 41 PID 2568 wrote to memory of 1336 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 41 PID 2568 wrote to memory of 1336 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 41 PID 2568 wrote to memory of 1288 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 42 PID 2568 wrote to memory of 1288 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 42 PID 2568 wrote to memory of 1288 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 42 PID 2568 wrote to memory of 1288 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 42 PID 2568 wrote to memory of 2448 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 43 PID 2568 wrote to memory of 2448 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 43 PID 2568 wrote to memory of 2448 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 43 PID 2568 wrote to memory of 2448 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 43 PID 2568 wrote to memory of 2736 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 44 PID 2568 wrote to memory of 2736 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 44 PID 2568 wrote to memory of 2736 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 44 PID 2568 wrote to memory of 2736 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 44 PID 2568 wrote to memory of 1928 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 45 PID 2568 wrote to memory of 1928 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 45 PID 2568 wrote to memory of 1928 2568 b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b9d6b508843d8ee4538e3012bd771314_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1484
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:1488
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:2284
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:2988
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:1688
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:2044
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2368
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:2096
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2920
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:2484
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2392
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:1336
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:1288
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:2448
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2736
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:1928
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2772
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:2764
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2476
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:2780
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2840
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:2844
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2856
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:2868
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2824
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:2788
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2760
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:2908
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2264
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:2664
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2756
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:2968
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2656
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:2732
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2668
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:2816
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2632 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2660
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2696
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD54b8c6c28c12d13c35015ecff88ee08c1
SHA175f23c7181a3910e6fd755444e79393267f90c86
SHA256ab32c55f42d6d4e3047c574b36db6aeb40e04054ee13e611f0ab1ebdb33032e1
SHA51287e65c59dd5073a9a2a09913a0e7b8b50888ae4af6e25272259cb28762ced5935e585b2415019951a03d6db27b3a519022886bb551a2abbe149714ca52913c95
-
Filesize
356KB
MD5a0eaa79f7fc06363a4be2586faf870c4
SHA14a917e5edeb6ef24d3254cc4736c51f3328819ac
SHA25663d2efdbaadf9ab86413b83f868eefb6e1d0affc30081e3e2a10ea2605345ee3
SHA512b79494de07f28cd64edccedf84a07fb4d7a791c04832c82d301846449f5fd138af0a7c9a0e0fc9f78c0302b4a9d0c9fcc63313370962c2ee622ecac525dec4b8
-
Filesize
662KB
MD5b9d6b508843d8ee4538e3012bd771314
SHA11346c848dd23633f2779e59204267455857c1881
SHA256640647c101b1400e60bd579be1b829cdab7b431c18d14946d85032ab2f99566e
SHA51289ee46028def0403efe63878f38b3a23e184ddd1b509a97cf39ef044aa96243b0e0bd9526a2d0941be676868e35400caf2bf7de4b692c3bdcfdfe1823b747de6