Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-12-2024 06:13
Static task
static1
Behavioral task
behavioral1
Sample
f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe
-
Size
685KB
-
MD5
f2aa74f5d4ac35cd067022246655dfaf
-
SHA1
5e10b808b17403bb20f64442f74e31aefe882068
-
SHA256
e32e876c6af71b87d4a8de66c639fa6077dec93b210c1f6f2efffb5794bbc1b8
-
SHA512
7b9c06e90ba760427cfbb36bf93a35525d110f1b2117c08b0bf8fa73e9e4683afbc5e2327a0efb5227899cbcaeaf4f1e8977d89bf2d5dbe0732cc43b78616148
-
SSDEEP
12288:mQZuOWo7YNQN2YcKify3iC8ut0i1oQjUZbvFFF/Dr5uiunB+3Ygiv:mn4wQgsiK3AcIXFFf5uiuBJv
Malware Config
Extracted
xtremerat
cuore.no-ip.org
cantante1.no-ip.org
Signatures
-
Detect XtremeRAT payload 8 IoCs
resource yara_rule behavioral2/memory/4472-9-0x0000000010000000-0x0000000010056000-memory.dmp family_xtremerat behavioral2/memory/4472-10-0x0000000010000000-0x0000000010056000-memory.dmp family_xtremerat behavioral2/memory/3780-13-0x0000000010000000-0x0000000010056000-memory.dmp family_xtremerat behavioral2/memory/4472-24-0x0000000010000000-0x0000000010056000-memory.dmp family_xtremerat behavioral2/memory/3780-26-0x0000000010000000-0x0000000010056000-memory.dmp family_xtremerat behavioral2/memory/1452-27-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/3368-29-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/1452-30-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3368 448server.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3028 set thread context of 4472 3028 f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe 84 -
resource yara_rule behavioral2/memory/4472-6-0x0000000010000000-0x0000000010056000-memory.dmp upx behavioral2/memory/4472-8-0x0000000010000000-0x0000000010056000-memory.dmp upx behavioral2/memory/4472-9-0x0000000010000000-0x0000000010056000-memory.dmp upx behavioral2/memory/4472-10-0x0000000010000000-0x0000000010056000-memory.dmp upx behavioral2/memory/3780-13-0x0000000010000000-0x0000000010056000-memory.dmp upx behavioral2/files/0x000a000000023b6a-19.dat upx behavioral2/memory/3368-23-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/4472-24-0x0000000010000000-0x0000000010056000-memory.dmp upx behavioral2/memory/3780-26-0x0000000010000000-0x0000000010056000-memory.dmp upx behavioral2/memory/1452-27-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/3368-29-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/1452-30-0x0000000010000000-0x000000001004D000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\448server.exe.exe f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe File created C:\Windows\448server.exe f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 4880 3780 WerFault.exe 85 4316 3780 WerFault.exe 85 4048 1452 WerFault.exe 91 1192 1452 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 448server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3028 f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe 3028 f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 3028 wrote to memory of 4472 3028 f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe 84 PID 3028 wrote to memory of 4472 3028 f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe 84 PID 3028 wrote to memory of 4472 3028 f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe 84 PID 3028 wrote to memory of 4472 3028 f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe 84 PID 3028 wrote to memory of 4472 3028 f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe 84 PID 3028 wrote to memory of 4472 3028 f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe 84 PID 3028 wrote to memory of 4472 3028 f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe 84 PID 3028 wrote to memory of 4472 3028 f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe 84 PID 4472 wrote to memory of 3780 4472 f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe 85 PID 4472 wrote to memory of 3780 4472 f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe 85 PID 4472 wrote to memory of 3780 4472 f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe 85 PID 4472 wrote to memory of 3780 4472 f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe 85 PID 4472 wrote to memory of 1088 4472 f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe 86 PID 4472 wrote to memory of 1088 4472 f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe 86 PID 4472 wrote to memory of 1088 4472 f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe 86 PID 4472 wrote to memory of 3368 4472 f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe 89 PID 4472 wrote to memory of 3368 4472 f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe 89 PID 4472 wrote to memory of 3368 4472 f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe 89 PID 3368 wrote to memory of 1452 3368 448server.exe 91 PID 3368 wrote to memory of 1452 3368 448server.exe 91 PID 3368 wrote to memory of 1452 3368 448server.exe 91 PID 3368 wrote to memory of 1452 3368 448server.exe 91 PID 3368 wrote to memory of 3196 3368 448server.exe 94 PID 3368 wrote to memory of 3196 3368 448server.exe 94 PID 3368 wrote to memory of 3196 3368 448server.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- System Location Discovery: System Language Discovery
PID:3780 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3780 -s 4804⤵
- Program crash
PID:4880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3780 -s 5044⤵
- Program crash
PID:4316
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:1088
-
-
C:\Windows\448server.exe"C:\Windows\448server.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- System Location Discovery: System Language Discovery
PID:1452 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1452 -s 4845⤵
- Program crash
PID:4048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1452 -s 5045⤵
- Program crash
PID:1192
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"4⤵PID:3196
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3780 -ip 37801⤵PID:5000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3780 -ip 37801⤵PID:3720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1452 -ip 14521⤵PID:4460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1452 -ip 14521⤵PID:3132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD57f07af2d38bdf64426b72f1ee8ba8249
SHA12be94a223781dee9eb893a4dd6c1e1f97ce7e5d7
SHA256c8b7f993b82a699246b9a3ec2a53add2ff348e22b699bf40787a27f301316ff0
SHA512e78d76c2c2191671168299e70628e73dbf6298d98788df0f79488376798dbd5d7da0c8c9517fc5ed0eb2ff172ea9fb578f3873cbe41a28dceb3ca68244cd33cc