Analysis

  • max time kernel
    133s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2024 08:32

General

  • Target

    bc8e1da50706bcb8321e9801e5d0f3b0_JaffaCakes118.exe

  • Size

    256KB

  • MD5

    bc8e1da50706bcb8321e9801e5d0f3b0

  • SHA1

    d4171182fbc73dada2558a2d01a9217078625c5d

  • SHA256

    e41287f8c0fd9459833ad09d8285bb9a44690fdd172fd9a33b933f50ed21dbff

  • SHA512

    c39cf3d9fd0a5cec9b8649812c8edb948df1d39e2d8edb9fab917da3768b68825066da2bfc86d4a83d7f75353e2b0e886fb94003769d5e6a4e1de559c4b17e38

  • SSDEEP

    6144:332DaBByk9s4hw8JQl5WZl4TyQOI5JgpcvqNplcHsY85BT6V:nKMBMSw8JQpT0Iw5pKhMh2

Malware Config

Signatures

  • Detect XtremeRAT payload 4 IoCs
  • XtremeRAT

    The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

  • Xtremerat family
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc8e1da50706bcb8321e9801e5d0f3b0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bc8e1da50706bcb8321e9801e5d0f3b0_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4448
    • C:\Users\Admin\AppData\Local\Temp\bc8e1da50706bcb8321e9801e5d0f3b0_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\bc8e1da50706bcb8321e9801e5d0f3b0_JaffaCakes118.exe
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4676
      • C:\Windows\SysWOW64\calc.exe
        calc.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1048

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1048-64-0x0000000000C80000-0x0000000000C92000-memory.dmp

    Filesize

    72KB

  • memory/1048-66-0x0000000000C80000-0x0000000000C92000-memory.dmp

    Filesize

    72KB

  • memory/4448-3-0x0000000002BB0000-0x0000000002BB1000-memory.dmp

    Filesize

    4KB

  • memory/4448-58-0x0000000000400000-0x00000000004A5000-memory.dmp

    Filesize

    660KB

  • memory/4448-27-0x0000000002220000-0x0000000002221000-memory.dmp

    Filesize

    4KB

  • memory/4448-26-0x0000000002BA0000-0x0000000002BA1000-memory.dmp

    Filesize

    4KB

  • memory/4448-25-0x0000000002BA0000-0x0000000002BA1000-memory.dmp

    Filesize

    4KB

  • memory/4448-24-0x0000000002BA0000-0x0000000002BA1000-memory.dmp

    Filesize

    4KB

  • memory/4448-23-0x0000000002BA0000-0x0000000002BA1000-memory.dmp

    Filesize

    4KB

  • memory/4448-22-0x0000000002BA0000-0x0000000002BA1000-memory.dmp

    Filesize

    4KB

  • memory/4448-21-0x0000000002BA0000-0x0000000002BA1000-memory.dmp

    Filesize

    4KB

  • memory/4448-20-0x0000000002BA0000-0x0000000002BA1000-memory.dmp

    Filesize

    4KB

  • memory/4448-19-0x0000000002BA0000-0x0000000002BA1000-memory.dmp

    Filesize

    4KB

  • memory/4448-18-0x0000000002BA0000-0x0000000002BA1000-memory.dmp

    Filesize

    4KB

  • memory/4448-17-0x0000000002BA0000-0x0000000002BA1000-memory.dmp

    Filesize

    4KB

  • memory/4448-16-0x0000000002BA0000-0x0000000002BA1000-memory.dmp

    Filesize

    4KB

  • memory/4448-14-0x0000000002BB0000-0x0000000002BB1000-memory.dmp

    Filesize

    4KB

  • memory/4448-13-0x0000000002BB0000-0x0000000002BB1000-memory.dmp

    Filesize

    4KB

  • memory/4448-12-0x0000000002BB0000-0x0000000002BB1000-memory.dmp

    Filesize

    4KB

  • memory/4448-11-0x0000000002BB0000-0x0000000002BB1000-memory.dmp

    Filesize

    4KB

  • memory/4448-10-0x0000000002BB0000-0x0000000002BB1000-memory.dmp

    Filesize

    4KB

  • memory/4448-9-0x0000000002BB0000-0x0000000002BB1000-memory.dmp

    Filesize

    4KB

  • memory/4448-8-0x0000000002BB0000-0x0000000002BB1000-memory.dmp

    Filesize

    4KB

  • memory/4448-7-0x0000000002BB0000-0x0000000002BB1000-memory.dmp

    Filesize

    4KB

  • memory/4448-28-0x0000000002B40000-0x0000000002B41000-memory.dmp

    Filesize

    4KB

  • memory/4448-6-0x0000000002BB0000-0x0000000002BB1000-memory.dmp

    Filesize

    4KB

  • memory/4448-5-0x0000000002BB0000-0x0000000002BB1000-memory.dmp

    Filesize

    4KB

  • memory/4448-4-0x0000000002BB0000-0x0000000002BB1000-memory.dmp

    Filesize

    4KB

  • memory/4448-37-0x0000000002BB0000-0x0000000002BB1000-memory.dmp

    Filesize

    4KB

  • memory/4448-15-0x0000000002BB0000-0x0000000002BB1000-memory.dmp

    Filesize

    4KB

  • memory/4448-31-0x0000000002B60000-0x0000000002B61000-memory.dmp

    Filesize

    4KB

  • memory/4448-34-0x0000000002B70000-0x0000000002B71000-memory.dmp

    Filesize

    4KB

  • memory/4448-36-0x0000000002270000-0x0000000002271000-memory.dmp

    Filesize

    4KB

  • memory/4448-35-0x0000000002AF0000-0x0000000002AF1000-memory.dmp

    Filesize

    4KB

  • memory/4448-33-0x0000000002210000-0x0000000002211000-memory.dmp

    Filesize

    4KB

  • memory/4448-32-0x00000000006E0000-0x00000000006E1000-memory.dmp

    Filesize

    4KB

  • memory/4448-1-0x0000000002B50000-0x0000000002B54000-memory.dmp

    Filesize

    16KB

  • memory/4448-49-0x0000000002C10000-0x0000000002C11000-memory.dmp

    Filesize

    4KB

  • memory/4448-52-0x0000000002C70000-0x0000000002C71000-memory.dmp

    Filesize

    4KB

  • memory/4448-54-0x0000000002DB0000-0x0000000002DB1000-memory.dmp

    Filesize

    4KB

  • memory/4448-53-0x0000000000400000-0x00000000004A5000-memory.dmp

    Filesize

    660KB

  • memory/4448-51-0x0000000002C50000-0x0000000002C51000-memory.dmp

    Filesize

    4KB

  • memory/4448-50-0x0000000002C30000-0x0000000002C31000-memory.dmp

    Filesize

    4KB

  • memory/4448-46-0x0000000002BD0000-0x0000000002BD1000-memory.dmp

    Filesize

    4KB

  • memory/4448-45-0x0000000002D90000-0x0000000002D91000-memory.dmp

    Filesize

    4KB

  • memory/4448-43-0x0000000002C60000-0x0000000002C61000-memory.dmp

    Filesize

    4KB

  • memory/4448-42-0x0000000002C40000-0x0000000002C41000-memory.dmp

    Filesize

    4KB

  • memory/4448-39-0x0000000002BC0000-0x0000000002BC1000-memory.dmp

    Filesize

    4KB

  • memory/4448-48-0x0000000002BE0000-0x0000000002BE1000-memory.dmp

    Filesize

    4KB

  • memory/4448-47-0x0000000002BF0000-0x0000000002BF1000-memory.dmp

    Filesize

    4KB

  • memory/4448-44-0x0000000002DA0000-0x0000000002DA1000-memory.dmp

    Filesize

    4KB

  • memory/4448-41-0x0000000002C20000-0x0000000002C21000-memory.dmp

    Filesize

    4KB

  • memory/4448-40-0x0000000002C00000-0x0000000002C01000-memory.dmp

    Filesize

    4KB

  • memory/4448-2-0x0000000002BA0000-0x0000000002BA1000-memory.dmp

    Filesize

    4KB

  • memory/4448-38-0x0000000002BA0000-0x0000000002BA1000-memory.dmp

    Filesize

    4KB

  • memory/4448-0-0x0000000000400000-0x00000000004A5000-memory.dmp

    Filesize

    660KB

  • memory/4676-55-0x0000000000C80000-0x0000000000C92000-memory.dmp

    Filesize

    72KB

  • memory/4676-56-0x0000000000C80000-0x0000000000C92000-memory.dmp

    Filesize

    72KB