Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
eff5e24447b287e7bccd098237ffe493_JaffaCakes118
-
Size
99KB
-
Sample
241214-wc7jfszjht
-
MD5
eff5e24447b287e7bccd098237ffe493
-
SHA1
35ace573e0fc130876fab9e68b382199918a267e
-
SHA256
b70a026b0f6cdcd61b274673ce993073020868caa1e55b77a1ee7acc396da577
-
SHA512
2571d2d91db88af7a8b93f1cedc424b32f1cf14250045736d1b4fe23456f475eedb541e990ebfc3668237722fb5b801c194b87b4a3467df20e7b5e61607bc19a
-
SSDEEP
3072:7128h67QiWeE+WI3P2nZHKrmRyZzWjlYBN3:A7QNr5nZuFBZ
Static task
static1
Behavioral task
behavioral1
Sample
eff5e24447b287e7bccd098237ffe493_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
xtremerat
besbous.no-ip.info
Targets
-
-
Target
eff5e24447b287e7bccd098237ffe493_JaffaCakes118
-
Size
99KB
-
MD5
eff5e24447b287e7bccd098237ffe493
-
SHA1
35ace573e0fc130876fab9e68b382199918a267e
-
SHA256
b70a026b0f6cdcd61b274673ce993073020868caa1e55b77a1ee7acc396da577
-
SHA512
2571d2d91db88af7a8b93f1cedc424b32f1cf14250045736d1b4fe23456f475eedb541e990ebfc3668237722fb5b801c194b87b4a3467df20e7b5e61607bc19a
-
SSDEEP
3072:7128h67QiWeE+WI3P2nZHKrmRyZzWjlYBN3:A7QNr5nZuFBZ
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1