Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-12-2024 06:17
Static task
static1
Behavioral task
behavioral1
Sample
d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe
-
Size
393KB
-
MD5
d5a4b88bed3a38f350ca15b8c79355d9
-
SHA1
4ec772a58fd5810ca7ab9272ae55e95c144a6815
-
SHA256
3061e093987b420788e4e77535589b50d63c74aa8d658183b891bebb231795fb
-
SHA512
1e0b19b8974970242ad2e23d4f95b7b4c653430fafc6c170fdbb696ef5eac4cc3beb63f192f547fe8dcb3909d5be6d9913b784c78eb23534e2761dad0299a2a6
-
SSDEEP
12288:5c/m4JmYYkJUL47Botwz41mRtnJ2fRfvWuA74:5c/m4IHBLiBotKlJ2dG4
Malware Config
Signatures
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Executes dropped EXE 1 IoCs
pid Process 1644 Server.exe -
Loads dropped DLL 2 IoCs
pid Process 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1644 set thread context of 1964 1644 Server.exe 67 -
resource yara_rule behavioral1/memory/1964-27-0x0000000001610000-0x0000000001715000-memory.dmp upx behavioral1/memory/1964-23-0x0000000001610000-0x0000000001715000-memory.dmp upx behavioral1/memory/1964-25-0x0000000001610000-0x0000000001715000-memory.dmp upx behavioral1/memory/1964-30-0x0000000001610000-0x0000000001715000-memory.dmp upx behavioral1/memory/1964-32-0x0000000001610000-0x0000000001715000-memory.dmp upx behavioral1/memory/1964-31-0x0000000001610000-0x0000000001715000-memory.dmp upx behavioral1/memory/1964-34-0x0000000001610000-0x0000000001715000-memory.dmp upx behavioral1/memory/1964-35-0x0000000001610000-0x0000000001715000-memory.dmp upx behavioral1/memory/1964-33-0x0000000001610000-0x0000000001715000-memory.dmp upx behavioral1/memory/1964-36-0x0000000001610000-0x0000000001715000-memory.dmp upx behavioral1/memory/1964-39-0x0000000001610000-0x0000000001715000-memory.dmp upx behavioral1/memory/1964-40-0x0000000001610000-0x0000000001715000-memory.dmp upx -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\InstallDir\Server.exe d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe File created C:\Windows\InstallDir\Server.exe d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe File opened for modification C:\Windows\InstallDir\ d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe File opened for modification C:\Windows\InstallDir\Server.exe Server.exe File opened for modification C:\Windows\InstallDir\ Server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1964 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2068 wrote to memory of 1928 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 30 PID 2068 wrote to memory of 1928 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 30 PID 2068 wrote to memory of 1928 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 30 PID 2068 wrote to memory of 1928 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 30 PID 2068 wrote to memory of 2124 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 31 PID 2068 wrote to memory of 2124 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 31 PID 2068 wrote to memory of 2124 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 31 PID 2068 wrote to memory of 2124 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 31 PID 2068 wrote to memory of 2520 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 33 PID 2068 wrote to memory of 2520 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 33 PID 2068 wrote to memory of 2520 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 33 PID 2068 wrote to memory of 2520 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 33 PID 2068 wrote to memory of 2532 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 34 PID 2068 wrote to memory of 2532 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 34 PID 2068 wrote to memory of 2532 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 34 PID 2068 wrote to memory of 2532 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 34 PID 2068 wrote to memory of 2076 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 35 PID 2068 wrote to memory of 2076 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 35 PID 2068 wrote to memory of 2076 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 35 PID 2068 wrote to memory of 2076 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 35 PID 2068 wrote to memory of 2300 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 36 PID 2068 wrote to memory of 2300 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 36 PID 2068 wrote to memory of 2300 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 36 PID 2068 wrote to memory of 2300 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 36 PID 2068 wrote to memory of 2896 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 37 PID 2068 wrote to memory of 2896 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 37 PID 2068 wrote to memory of 2896 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 37 PID 2068 wrote to memory of 2896 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 37 PID 2068 wrote to memory of 2256 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 38 PID 2068 wrote to memory of 2256 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 38 PID 2068 wrote to memory of 2256 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 38 PID 2068 wrote to memory of 2256 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 38 PID 2068 wrote to memory of 1392 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 39 PID 2068 wrote to memory of 1392 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 39 PID 2068 wrote to memory of 1392 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 39 PID 2068 wrote to memory of 1392 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 39 PID 2068 wrote to memory of 1740 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 40 PID 2068 wrote to memory of 1740 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 40 PID 2068 wrote to memory of 1740 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 40 PID 2068 wrote to memory of 1740 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 40 PID 2068 wrote to memory of 580 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 41 PID 2068 wrote to memory of 580 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 41 PID 2068 wrote to memory of 580 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 41 PID 2068 wrote to memory of 580 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 41 PID 2068 wrote to memory of 2728 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 42 PID 2068 wrote to memory of 2728 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 42 PID 2068 wrote to memory of 2728 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 42 PID 2068 wrote to memory of 2728 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 42 PID 2068 wrote to memory of 2780 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 43 PID 2068 wrote to memory of 2780 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 43 PID 2068 wrote to memory of 2780 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 43 PID 2068 wrote to memory of 2780 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 43 PID 2068 wrote to memory of 2820 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 44 PID 2068 wrote to memory of 2820 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 44 PID 2068 wrote to memory of 2820 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 44 PID 2068 wrote to memory of 2820 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 44 PID 2068 wrote to memory of 2824 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 45 PID 2068 wrote to memory of 2824 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 45 PID 2068 wrote to memory of 2824 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 45 PID 2068 wrote to memory of 2824 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 45 PID 2068 wrote to memory of 2880 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 46 PID 2068 wrote to memory of 2880 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 46 PID 2068 wrote to memory of 2880 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 46 PID 2068 wrote to memory of 2880 2068 d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d5a4b88bed3a38f350ca15b8c79355d9_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:1928
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:2124
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2520
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:2532
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2076
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:2300
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2896
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:2256
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:1392
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:1740
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:580
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:2728
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2780
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:2820
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2824
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:2880
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2884
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:2784
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2252
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:2712
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:3008
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:2592
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2444
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:2864
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2748
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:2796
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2800
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:2892
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2836
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:2612
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2096
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:948
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2752
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:2700
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1644 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2212
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1964
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ebcffeacd1132ec28c15e761dd00dd8d
SHA1d2dc07a7c6cc2c45f6edfcddd4036dc74a3b32c2
SHA256f1099d99bddcfc16036610dd03a1871c8b3f25d5c93afd01360fa34ccc1b3e77
SHA5120c8f72e466d42c7d73c477904feb8c422d27a8e5fb406d6c4a2c4117ab31d42cae1a3cc2eeabb4db61d38efea7897fec350d586abab898e16030e3833f448286
-
Filesize
346KB
MD5b6d63330959896290103db9786bd33d6
SHA1b2558e1b4c6d9e012801a6e6564cf44fa16d6d14
SHA25638d68f85dd0d99524efb7b537ce8fc5c7494126da1455a8d700cec51ef021c24
SHA51254cd768f2df8e7e570a95073e1727465c6c22945334e33b835608b8933ef81d59eb33b3b5b434dde5c8b2f25130b417a076916fa4b7fcd9c33a133681cecc9b2
-
Filesize
393KB
MD5d5a4b88bed3a38f350ca15b8c79355d9
SHA14ec772a58fd5810ca7ab9272ae55e95c144a6815
SHA2563061e093987b420788e4e77535589b50d63c74aa8d658183b891bebb231795fb
SHA5121e0b19b8974970242ad2e23d4f95b7b4c653430fafc6c170fdbb696ef5eac4cc3beb63f192f547fe8dcb3909d5be6d9913b784c78eb23534e2761dad0299a2a6