Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
15-12-2024 06:13
Static task
static1
Behavioral task
behavioral1
Sample
f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe
-
Size
685KB
-
MD5
f2aa74f5d4ac35cd067022246655dfaf
-
SHA1
5e10b808b17403bb20f64442f74e31aefe882068
-
SHA256
e32e876c6af71b87d4a8de66c639fa6077dec93b210c1f6f2efffb5794bbc1b8
-
SHA512
7b9c06e90ba760427cfbb36bf93a35525d110f1b2117c08b0bf8fa73e9e4683afbc5e2327a0efb5227899cbcaeaf4f1e8977d89bf2d5dbe0732cc43b78616148
-
SSDEEP
12288:mQZuOWo7YNQN2YcKify3iC8ut0i1oQjUZbvFFF/Dr5uiunB+3Ygiv:mn4wQgsiK3AcIXFFf5uiuBJv
Malware Config
Extracted
xtremerat
cuore.no-ip.org
cantante1.no-ip.org
Signatures
-
Detect XtremeRAT payload 8 IoCs
resource yara_rule behavioral1/memory/2760-14-0x0000000010000000-0x0000000010056000-memory.dmp family_xtremerat behavioral1/memory/2760-16-0x0000000010000000-0x0000000010056000-memory.dmp family_xtremerat behavioral1/memory/2752-21-0x0000000010000000-0x0000000010056000-memory.dmp family_xtremerat behavioral1/memory/2760-30-0x0000000010000000-0x0000000010056000-memory.dmp family_xtremerat behavioral1/memory/2760-29-0x0000000002700000-0x000000000274D000-memory.dmp family_xtremerat behavioral1/memory/2640-35-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral1/memory/2804-37-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral1/memory/2752-38-0x0000000010000000-0x0000000010056000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Executes dropped EXE 1 IoCs
pid Process 2804 448server.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2880 set thread context of 2760 2880 f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe 30 -
resource yara_rule behavioral1/memory/2760-7-0x0000000010000000-0x0000000010056000-memory.dmp upx behavioral1/memory/2760-14-0x0000000010000000-0x0000000010056000-memory.dmp upx behavioral1/memory/2760-16-0x0000000010000000-0x0000000010056000-memory.dmp upx behavioral1/memory/2760-13-0x0000000010000000-0x0000000010056000-memory.dmp upx behavioral1/memory/2760-11-0x0000000010000000-0x0000000010056000-memory.dmp upx behavioral1/memory/2760-8-0x0000000010000000-0x0000000010056000-memory.dmp upx behavioral1/memory/2752-21-0x0000000010000000-0x0000000010056000-memory.dmp upx behavioral1/memory/2804-32-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/files/0x0007000000016fc9-31.dat upx behavioral1/memory/2760-30-0x0000000010000000-0x0000000010056000-memory.dmp upx behavioral1/memory/2760-29-0x0000000002700000-0x000000000274D000-memory.dmp upx behavioral1/memory/2640-35-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/2804-37-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/2752-38-0x0000000010000000-0x0000000010056000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\448server.exe.exe f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe File created C:\Windows\448server.exe f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 448server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2880 f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe 2880 f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2880 wrote to memory of 2760 2880 f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe 30 PID 2880 wrote to memory of 2760 2880 f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe 30 PID 2880 wrote to memory of 2760 2880 f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe 30 PID 2880 wrote to memory of 2760 2880 f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe 30 PID 2880 wrote to memory of 2760 2880 f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe 30 PID 2880 wrote to memory of 2760 2880 f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe 30 PID 2880 wrote to memory of 2760 2880 f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe 30 PID 2880 wrote to memory of 2760 2880 f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe 30 PID 2760 wrote to memory of 2752 2760 f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe 31 PID 2760 wrote to memory of 2752 2760 f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe 31 PID 2760 wrote to memory of 2752 2760 f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe 31 PID 2760 wrote to memory of 2752 2760 f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe 31 PID 2760 wrote to memory of 2752 2760 f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe 31 PID 2760 wrote to memory of 2952 2760 f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe 32 PID 2760 wrote to memory of 2952 2760 f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe 32 PID 2760 wrote to memory of 2952 2760 f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe 32 PID 2760 wrote to memory of 2952 2760 f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe 32 PID 2760 wrote to memory of 2952 2760 f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe 32 PID 2760 wrote to memory of 2804 2760 f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe 33 PID 2760 wrote to memory of 2804 2760 f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe 33 PID 2760 wrote to memory of 2804 2760 f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe 33 PID 2760 wrote to memory of 2804 2760 f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe 33 PID 2804 wrote to memory of 2640 2804 448server.exe 34 PID 2804 wrote to memory of 2640 2804 448server.exe 34 PID 2804 wrote to memory of 2640 2804 448server.exe 34 PID 2804 wrote to memory of 2640 2804 448server.exe 34 PID 2804 wrote to memory of 2640 2804 448server.exe 34 PID 2804 wrote to memory of 2700 2804 448server.exe 35 PID 2804 wrote to memory of 2700 2804 448server.exe 35 PID 2804 wrote to memory of 2700 2804 448server.exe 35 PID 2804 wrote to memory of 2700 2804 448server.exe 35 PID 2804 wrote to memory of 2700 2804 448server.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- System Location Discovery: System Language Discovery
PID:2752
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2952
-
-
C:\Windows\448server.exe"C:\Windows\448server.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- System Location Discovery: System Language Discovery
PID:2640
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2700
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD57f07af2d38bdf64426b72f1ee8ba8249
SHA12be94a223781dee9eb893a4dd6c1e1f97ce7e5d7
SHA256c8b7f993b82a699246b9a3ec2a53add2ff348e22b699bf40787a27f301316ff0
SHA512e78d76c2c2191671168299e70628e73dbf6298d98788df0f79488376798dbd5d7da0c8c9517fc5ed0eb2ff172ea9fb578f3873cbe41a28dceb3ca68244cd33cc