Analysis

  • max time kernel
    145s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2024 03:14

General

  • Target

    bb78fc2e4428fd2d6294c258b90dc6d4_JaffaCakes118.exe

  • Size

    31KB

  • MD5

    bb78fc2e4428fd2d6294c258b90dc6d4

  • SHA1

    187e6150cb3eadc24bf8fec5a302b21a2b42a5b0

  • SHA256

    b28959bf7057d383edf738fe3a91aafd6d801b968a9f95d4ce9c6eb966be0ffd

  • SHA512

    35e0b0c8c8a2a9e15dccddb2e502fd792af82857f88ccbc4b10cf994094571e2f4911a27f6cc25de94178f2e3a270d361880ae2fb96412f0fdeae1404209fd40

  • SSDEEP

    768:rqX5npcxOhH6GzZSEjsLMIL/nriE7W5GTx6bPrxh:eX5nqOtlzcsnILO+W5PN

Malware Config

Extracted

Family

xtremerat

C2

helwan1.no-ip.info

Signatures

  • Detect XtremeRAT payload 6 IoCs
  • XtremeRAT

    The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

  • Xtremerat family
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 6 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • ASPack v2.12-2.42 3 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 30 IoCs
  • Loads dropped DLL 64 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 29 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 32 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bb78fc2e4428fd2d6294c258b90dc6d4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bb78fc2e4428fd2d6294c258b90dc6d4_JaffaCakes118.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Windows\SysWOW64\svchost.exe
      svchost.exe
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:1776
      • C:\Windows\InstallDir\1111.exe
        "C:\Windows\InstallDir\1111.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2608
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2608 -s 160
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2688
      • C:\Windows\InstallDir\1111.exe
        "C:\Windows\InstallDir\1111.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2316
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2316 -s 160
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2788
      • C:\Windows\InstallDir\1111.exe
        "C:\Windows\InstallDir\1111.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2712
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2712 -s 160
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2860
      • C:\Windows\InstallDir\1111.exe
        "C:\Windows\InstallDir\1111.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2320
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2320 -s 160
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2996
      • C:\Windows\InstallDir\1111.exe
        "C:\Windows\InstallDir\1111.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1244
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1244 -s 160
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2104
      • C:\Windows\InstallDir\1111.exe
        "C:\Windows\InstallDir\1111.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1352
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1352 -s 160
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2592
      • C:\Windows\InstallDir\1111.exe
        "C:\Windows\InstallDir\1111.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:376
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 376 -s 160
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:1628
      • C:\Windows\InstallDir\1111.exe
        "C:\Windows\InstallDir\1111.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2484
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 160
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2068
      • C:\Windows\InstallDir\1111.exe
        "C:\Windows\InstallDir\1111.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:928
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 928 -s 160
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:1504
      • C:\Windows\InstallDir\1111.exe
        "C:\Windows\InstallDir\1111.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2132
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2132 -s 160
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:1576
      • C:\Windows\InstallDir\1111.exe
        "C:\Windows\InstallDir\1111.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2248
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2248 -s 160
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:1692
      • C:\Windows\InstallDir\1111.exe
        "C:\Windows\InstallDir\1111.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1028
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1028 -s 160
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2548
      • C:\Windows\InstallDir\1111.exe
        "C:\Windows\InstallDir\1111.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2120
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2120 -s 160
          4⤵
          • Program crash
          PID:2556
      • C:\Windows\InstallDir\1111.exe
        "C:\Windows\InstallDir\1111.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:796
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 796 -s 160
          4⤵
          • Program crash
          PID:888
      • C:\Windows\InstallDir\1111.exe
        "C:\Windows\InstallDir\1111.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1588
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1588 -s 160
          4⤵
          • Program crash
          PID:1572
      • C:\Windows\InstallDir\1111.exe
        "C:\Windows\InstallDir\1111.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2388
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2388 -s 160
          4⤵
          • Program crash
          PID:1284
      • C:\Windows\InstallDir\1111.exe
        "C:\Windows\InstallDir\1111.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2852
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2852 -s 160
          4⤵
          • Program crash
          PID:2812
      • C:\Windows\InstallDir\1111.exe
        "C:\Windows\InstallDir\1111.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2644
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2644 -s 160
          4⤵
          • Program crash
          PID:2656
      • C:\Windows\InstallDir\1111.exe
        "C:\Windows\InstallDir\1111.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2904
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 160
          4⤵
          • Program crash
          PID:2732
      • C:\Windows\InstallDir\1111.exe
        "C:\Windows\InstallDir\1111.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1228
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 160
          4⤵
          • Program crash
          PID:2044
      • C:\Windows\InstallDir\1111.exe
        "C:\Windows\InstallDir\1111.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2316
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2316 -s 160
          4⤵
          • Program crash
          PID:2944
      • C:\Windows\InstallDir\1111.exe
        "C:\Windows\InstallDir\1111.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3068
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3068 -s 160
          4⤵
          • Program crash
          PID:2184
      • C:\Windows\InstallDir\1111.exe
        "C:\Windows\InstallDir\1111.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2948
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 160
          4⤵
          • Program crash
          PID:2012
      • C:\Windows\InstallDir\1111.exe
        "C:\Windows\InstallDir\1111.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1000
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1000 -s 160
          4⤵
          • Program crash
          PID:1408
      • C:\Windows\InstallDir\1111.exe
        "C:\Windows\InstallDir\1111.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2724
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 160
          4⤵
          • Program crash
          PID:2780
      • C:\Windows\InstallDir\1111.exe
        "C:\Windows\InstallDir\1111.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2096
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2096 -s 160
          4⤵
          • Program crash
          PID:1488
      • C:\Windows\InstallDir\1111.exe
        "C:\Windows\InstallDir\1111.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1968
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1968 -s 160
          4⤵
          • Program crash
          PID:2592
      • C:\Windows\InstallDir\1111.exe
        "C:\Windows\InstallDir\1111.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1128
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1128 -s 160
          4⤵
          • Program crash
          PID:408
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe"
      2⤵
        PID:2504
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        2⤵
          PID:2452
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          2⤵
            PID:2352
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            2⤵
              PID:2244
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              2⤵
                PID:2256
              • C:\Program Files\Internet Explorer\iexplore.exe
                "C:\Program Files\Internet Explorer\iexplore.exe"
                2⤵
                  PID:2308
                • C:\Program Files\Internet Explorer\iexplore.exe
                  "C:\Program Files\Internet Explorer\iexplore.exe"
                  2⤵
                    PID:2716
                  • C:\Program Files\Internet Explorer\iexplore.exe
                    "C:\Program Files\Internet Explorer\iexplore.exe"
                    2⤵
                      PID:2756
                    • C:\Windows\InstallDir\1111.exe
                      "C:\Windows\InstallDir\1111.exe"
                      2⤵
                      • Boot or Logon Autostart Execution: Active Setup
                      • Executes dropped EXE
                      • Adds Run key to start application
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of WriteProcessMemory
                      PID:2760
                      • C:\Program Files\Internet Explorer\iexplore.exe
                        "C:\Program Files\Internet Explorer\iexplore.exe"
                        3⤵
                          PID:2764
                        • C:\Program Files\Internet Explorer\iexplore.exe
                          "C:\Program Files\Internet Explorer\iexplore.exe"
                          3⤵
                            PID:2736
                          • C:\Program Files\Internet Explorer\iexplore.exe
                            "C:\Program Files\Internet Explorer\iexplore.exe"
                            3⤵
                              PID:2884
                            • C:\Program Files\Internet Explorer\iexplore.exe
                              "C:\Program Files\Internet Explorer\iexplore.exe"
                              3⤵
                                PID:2824
                              • C:\Program Files\Internet Explorer\iexplore.exe
                                "C:\Program Files\Internet Explorer\iexplore.exe"
                                3⤵
                                  PID:1668
                                • C:\Program Files\Internet Explorer\iexplore.exe
                                  "C:\Program Files\Internet Explorer\iexplore.exe"
                                  3⤵
                                    PID:2796
                                  • C:\Program Files\Internet Explorer\iexplore.exe
                                    "C:\Program Files\Internet Explorer\iexplore.exe"
                                    3⤵
                                      PID:2772
                                    • C:\Program Files\Internet Explorer\iexplore.exe
                                      "C:\Program Files\Internet Explorer\iexplore.exe"
                                      3⤵
                                        PID:2240
                                      • C:\Windows\InstallDir\1111.exe
                                        "C:\Windows\InstallDir\1111.exe"
                                        3⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        PID:2956
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -u -p 2956 -s 160
                                          4⤵
                                          • Loads dropped DLL
                                          • Program crash
                                          PID:2816

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\((Mutex)).cfg

                                    Filesize

                                    1KB

                                    MD5

                                    2667f246fba2115aff5e4f126f1a3f20

                                    SHA1

                                    65e0b63f9816699383042977c73fac075d33e9bc

                                    SHA256

                                    89d4eb464b4d0ca8eabbc1b1e04da1180603c6909aa94a9c0bd6f0a5e7dd38e1

                                    SHA512

                                    e653d57ceeb36f3f10fc91cb0dbe93ddaa0f9f90030abca37b2db5108923e418ad3211bb95b82fc3982a80c539ef96c8fddcf90b6cdcd58e97c59029bc5f6b9a

                                  • C:\Windows\InstallDir\1111.exe

                                    Filesize

                                    31KB

                                    MD5

                                    bb78fc2e4428fd2d6294c258b90dc6d4

                                    SHA1

                                    187e6150cb3eadc24bf8fec5a302b21a2b42a5b0

                                    SHA256

                                    b28959bf7057d383edf738fe3a91aafd6d801b968a9f95d4ce9c6eb966be0ffd

                                    SHA512

                                    35e0b0c8c8a2a9e15dccddb2e502fd792af82857f88ccbc4b10cf994094571e2f4911a27f6cc25de94178f2e3a270d361880ae2fb96412f0fdeae1404209fd40

                                  • memory/376-87-0x0000000000C80000-0x0000000000C99000-memory.dmp

                                    Filesize

                                    100KB

                                  • memory/1028-116-0x0000000000C80000-0x0000000000C99000-memory.dmp

                                    Filesize

                                    100KB

                                  • memory/1244-68-0x0000000000C80000-0x0000000000C99000-memory.dmp

                                    Filesize

                                    100KB

                                  • memory/1732-14-0x0000000000C80000-0x0000000000C99000-memory.dmp

                                    Filesize

                                    100KB

                                  • memory/1732-1-0x0000000000C80000-0x0000000000C99000-memory.dmp

                                    Filesize

                                    100KB

                                  • memory/1732-0-0x0000000000C80000-0x0000000000C99000-memory.dmp

                                    Filesize

                                    100KB

                                  • memory/1732-2-0x0000000000C80000-0x0000000000C99000-memory.dmp

                                    Filesize

                                    100KB

                                  • memory/1732-11-0x0000000002AA0000-0x0000000002AB9000-memory.dmp

                                    Filesize

                                    100KB

                                  • memory/1776-112-0x0000000000C60000-0x0000000000C79000-memory.dmp

                                    Filesize

                                    100KB

                                  • memory/1776-45-0x0000000000C40000-0x0000000000C59000-memory.dmp

                                    Filesize

                                    100KB

                                  • memory/1776-30-0x0000000000C40000-0x0000000000C59000-memory.dmp

                                    Filesize

                                    100KB

                                  • memory/1776-132-0x0000000000C60000-0x0000000000C79000-memory.dmp

                                    Filesize

                                    100KB

                                  • memory/1776-86-0x0000000000C60000-0x0000000000C79000-memory.dmp

                                    Filesize

                                    100KB

                                  • memory/1776-75-0x0000000000C60000-0x0000000000C79000-memory.dmp

                                    Filesize

                                    100KB

                                  • memory/1776-8-0x0000000000C80000-0x0000000000C99000-memory.dmp

                                    Filesize

                                    100KB

                                  • memory/1776-117-0x0000000000C60000-0x0000000000C79000-memory.dmp

                                    Filesize

                                    100KB

                                  • memory/1776-102-0x0000000000C60000-0x0000000000C79000-memory.dmp

                                    Filesize

                                    100KB

                                  • memory/1776-57-0x0000000000C60000-0x0000000000C79000-memory.dmp

                                    Filesize

                                    100KB

                                  • memory/1776-67-0x0000000000C60000-0x0000000000C79000-memory.dmp

                                    Filesize

                                    100KB

                                  • memory/1776-6-0x0000000000C80000-0x0000000000C99000-memory.dmp

                                    Filesize

                                    100KB

                                  • memory/2248-113-0x0000000000C80000-0x0000000000C99000-memory.dmp

                                    Filesize

                                    100KB

                                  • memory/2316-39-0x0000000000C80000-0x0000000000C99000-memory.dmp

                                    Filesize

                                    100KB

                                  • memory/2320-62-0x0000000000C80000-0x0000000000C99000-memory.dmp

                                    Filesize

                                    100KB

                                  • memory/2484-108-0x0000000000C80000-0x0000000000C99000-memory.dmp

                                    Filesize

                                    100KB

                                  • memory/2608-36-0x0000000000C80000-0x0000000000C99000-memory.dmp

                                    Filesize

                                    100KB

                                  • memory/2608-31-0x0000000000C80000-0x0000000000C99000-memory.dmp

                                    Filesize

                                    100KB

                                  • memory/2712-50-0x0000000000C80000-0x0000000000C99000-memory.dmp

                                    Filesize

                                    100KB

                                  • memory/2760-22-0x0000000000C80000-0x0000000000C99000-memory.dmp

                                    Filesize

                                    100KB

                                  • memory/2760-18-0x0000000000C80000-0x0000000000C99000-memory.dmp

                                    Filesize

                                    100KB

                                  • memory/2904-127-0x0000000000C80000-0x0000000000C99000-memory.dmp

                                    Filesize

                                    100KB

                                  • memory/2956-44-0x0000000000C80000-0x0000000000C99000-memory.dmp

                                    Filesize

                                    100KB

                                  • memory/2956-23-0x0000000000C80000-0x0000000000C99000-memory.dmp

                                    Filesize

                                    100KB