Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19-12-2024 01:05
Static task
static1
Behavioral task
behavioral1
Sample
fdd35659b7ca2e9e62adaba2f4b222ed_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
fdd35659b7ca2e9e62adaba2f4b222ed_JaffaCakes118.exe
-
Size
64KB
-
MD5
fdd35659b7ca2e9e62adaba2f4b222ed
-
SHA1
91c0ee04caf1d74d4aaf6f65752376b39ac060dd
-
SHA256
0e3d1e8feed80ebdf7f88c897914d45d9ac6aa02924dd5281f1dd4fdcbc18f8c
-
SHA512
e973181fc7c4ffdcb0d06d556796e73dd6c6c61e82cb190a9a6d385cc7c948b941e127e452d2ed64baf465e356f344248488a7e0d8fd5eda02f4013dcf9ec8a4
-
SSDEEP
1536:PLCQ0OqJkdhcjHFv9FlF9BFfYRKYqgnqZy:PLCx4cjHL/F9BRqKY5nX
Malware Config
Signatures
-
Detect XtremeRAT payload 4 IoCs
resource yara_rule behavioral1/memory/2824-9-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/2792-16-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/2824-17-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/2792-18-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{8VCYR8D3-LV67-6V74-A610-EY11L1JV50U4} tmp72EF.tmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8VCYR8D3-LV67-6V74-A610-EY11L1JV50U4}\StubPath = "C:\\Windows\\system32\\Ins\\Server.exe restart" tmp72EF.tmp.exe -
Executes dropped EXE 1 IoCs
pid Process 2824 tmp72EF.tmp.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\x1PzhJ = "C:\\Windows\\system32\\Ins\\Server.exe" tmp72EF.tmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\R!l&lT = "C:\\Windows\\system32\\Ins\\Server.exe" tmp72EF.tmp.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Ins\Server.exe tmp72EF.tmp.exe File created C:\Windows\SysWOW64\Ins\Server.exe tmp72EF.tmp.exe -
resource yara_rule behavioral1/files/0x0033000000018650-5.dat upx behavioral1/memory/2824-9-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/2792-16-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/2824-17-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/2792-18-0x0000000000C80000-0x0000000000C95000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp72EF.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language calc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1996 fdd35659b7ca2e9e62adaba2f4b222ed_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1996 wrote to memory of 2824 1996 fdd35659b7ca2e9e62adaba2f4b222ed_JaffaCakes118.exe 30 PID 1996 wrote to memory of 2824 1996 fdd35659b7ca2e9e62adaba2f4b222ed_JaffaCakes118.exe 30 PID 1996 wrote to memory of 2824 1996 fdd35659b7ca2e9e62adaba2f4b222ed_JaffaCakes118.exe 30 PID 1996 wrote to memory of 2824 1996 fdd35659b7ca2e9e62adaba2f4b222ed_JaffaCakes118.exe 30 PID 2824 wrote to memory of 2792 2824 tmp72EF.tmp.exe 31 PID 2824 wrote to memory of 2792 2824 tmp72EF.tmp.exe 31 PID 2824 wrote to memory of 2792 2824 tmp72EF.tmp.exe 31 PID 2824 wrote to memory of 2792 2824 tmp72EF.tmp.exe 31 PID 2824 wrote to memory of 2792 2824 tmp72EF.tmp.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdd35659b7ca2e9e62adaba2f4b222ed_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fdd35659b7ca2e9e62adaba2f4b222ed_JaffaCakes118.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\tmp72EF.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp72EF.tmp.exe"2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\calc.execalc.exe3⤵
- System Location Discovery: System Language Discovery
PID:2792
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD54f6362cb66340fa8811015c1cc61d2b4
SHA17e6944ad6d84d45e564631715ab6fdcaf152476c
SHA2566096d925c879b395d605bdcd94cfd015ae81748be7ff24a02da79b653989f20a
SHA51219676b559394a80dd9193ea03be9e68a4a229d182bdcfdc8521f1eda5fd2b235a3cd5f93d80447c87d767c31c5bcb94ea542001b63c45c124e49489dd1c28240