Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04/12/2024, 11:27 UTC

General

  • Target

    c2531127a3a652699f9b3d4b4215f019_JaffaCakes118.exe

  • Size

    103KB

  • MD5

    c2531127a3a652699f9b3d4b4215f019

  • SHA1

    2c67f58515dc3b2d4fed610e55ee78d26ada84be

  • SHA256

    9fb590a2bd7a2c93aa9be7fd617c5c67cdd66eebcaebc44677d04b98028929c6

  • SHA512

    e4ef76917863f2e94441bc00a4d48b049566e7b4afa78e45226f05b0d472c388add90366eb7c60ef75676696da21e5f95bd8ad698a835ec7b568fdc2326bd373

  • SSDEEP

    1536:0OghaZcYZqJC3xdTNYs9dhoh8SHsNqJH2xEXXxg7/sU1pf6urX:0PaZ0JKSs3hPSMNr8+DV

Malware Config

Extracted

Family

xtremerat

C2

kenpobot.no-ip.org

Signatures

  • Detect XtremeRAT payload 3 IoCs
  • XtremeRAT

    The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

  • Xtremerat family
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c2531127a3a652699f9b3d4b4215f019_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c2531127a3a652699f9b3d4b4215f019_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Users\Admin\AppData\Local\Temp\c2531127a3a652699f9b3d4b4215f019_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\c2531127a3a652699f9b3d4b4215f019_JaffaCakes118.exe"
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Adds Run key to start application
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2680
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        3⤵
          PID:2820
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          3⤵
            PID:2636
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            3⤵
              PID:2728
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              3⤵
                PID:2448
              • C:\Program Files\Internet Explorer\iexplore.exe
                "C:\Program Files\Internet Explorer\iexplore.exe"
                3⤵
                  PID:2792
                • C:\Program Files\Internet Explorer\iexplore.exe
                  "C:\Program Files\Internet Explorer\iexplore.exe"
                  3⤵
                    PID:2616
                  • C:\Program Files\Internet Explorer\iexplore.exe
                    "C:\Program Files\Internet Explorer\iexplore.exe"
                    3⤵
                      PID:2440
                    • C:\Program Files\Internet Explorer\iexplore.exe
                      "C:\Program Files\Internet Explorer\iexplore.exe"
                      3⤵
                        PID:2436

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • memory/2228-6-0x0000000000270000-0x0000000000280000-memory.dmp

                    Filesize

                    64KB

                  • memory/2228-9-0x00000000002E0000-0x00000000002F0000-memory.dmp

                    Filesize

                    64KB

                  • memory/2228-16-0x00000000003D0000-0x00000000003E0000-memory.dmp

                    Filesize

                    64KB

                  • memory/2228-15-0x00000000003C0000-0x00000000003D0000-memory.dmp

                    Filesize

                    64KB

                  • memory/2228-14-0x0000000000330000-0x0000000000340000-memory.dmp

                    Filesize

                    64KB

                  • memory/2228-13-0x0000000000320000-0x0000000000330000-memory.dmp

                    Filesize

                    64KB

                  • memory/2228-12-0x0000000000310000-0x0000000000320000-memory.dmp

                    Filesize

                    64KB

                  • memory/2228-11-0x0000000000300000-0x0000000000310000-memory.dmp

                    Filesize

                    64KB

                  • memory/2228-10-0x00000000002F0000-0x0000000000300000-memory.dmp

                    Filesize

                    64KB

                  • memory/2228-20-0x0000000000420000-0x000000000043B000-memory.dmp

                    Filesize

                    108KB

                  • memory/2228-8-0x00000000002D0000-0x00000000002E0000-memory.dmp

                    Filesize

                    64KB

                  • memory/2228-7-0x00000000002C0000-0x00000000002D0000-memory.dmp

                    Filesize

                    64KB

                  • memory/2228-17-0x00000000003E0000-0x00000000003F0000-memory.dmp

                    Filesize

                    64KB

                  • memory/2228-0-0x0000000000400000-0x000000000041AA00-memory.dmp

                    Filesize

                    106KB

                  • memory/2228-26-0x0000000000400000-0x000000000041AA00-memory.dmp

                    Filesize

                    106KB

                  • memory/2228-3-0x0000000000240000-0x0000000000250000-memory.dmp

                    Filesize

                    64KB

                  • memory/2228-2-0x0000000000230000-0x0000000000240000-memory.dmp

                    Filesize

                    64KB

                  • memory/2228-1-0x0000000000220000-0x0000000000230000-memory.dmp

                    Filesize

                    64KB

                  • memory/2228-4-0x0000000000250000-0x0000000000260000-memory.dmp

                    Filesize

                    64KB

                  • memory/2228-5-0x0000000000260000-0x0000000000270000-memory.dmp

                    Filesize

                    64KB

                  • memory/2680-28-0x0000000013140000-0x000000001315F000-memory.dmp

                    Filesize

                    124KB

                  • memory/2680-24-0x0000000013140000-0x000000001315F000-memory.dmp

                    Filesize

                    124KB

                  • memory/2680-23-0x0000000000400000-0x000000000041AA00-memory.dmp

                    Filesize

                    106KB

                  • memory/2680-27-0x0000000013140000-0x000000001315F000-memory.dmp

                    Filesize

                    124KB

                  • memory/2680-21-0x0000000013140000-0x000000001315F000-memory.dmp

                    Filesize

                    124KB

                  • memory/2680-32-0x0000000013140000-0x000000001315F000-memory.dmp

                    Filesize

                    124KB

                  We care about your privacy.

                  This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.