Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03-01-2025 11:09
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6c32dc814220163427d9b8f18d4d7490.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6c32dc814220163427d9b8f18d4d7490.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_6c32dc814220163427d9b8f18d4d7490.exe
-
Size
822KB
-
MD5
6c32dc814220163427d9b8f18d4d7490
-
SHA1
5ab3ecfbad3d795c0c33c6745c85902759cbbb70
-
SHA256
0297e08c1b57115dfaa5a88450484e0c9cbce36d0170d0e973e9a86e2fefde8b
-
SHA512
bc25c97b003501780b3b23708a557f9d38c5cf359fdfe271aaf66cabc5503ea40cfd4b472e6bd60048237b0e49958e477e54562e5eb9fb58f700812292595051
-
SSDEEP
12288:U69zDWz/xwNqdlbrIX3JALF1QbOagrEGgtNryyCJuDT/PNa0AYQ/Hyw2Eq:U2DW/xbHX2YIbCQsu3/PNL7Q/HyVEq
Malware Config
Extracted
xtremerat
far3on.zapto.org
Signatures
-
Detect XtremeRAT payload 4 IoCs
resource yara_rule behavioral1/files/0x0008000000015d0e-8.dat family_xtremerat behavioral1/memory/2188-12-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/1988-13-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/2188-14-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Executes dropped EXE 1 IoCs
pid Process 1988 server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2108 wrote to memory of 1988 2108 JaffaCakes118_6c32dc814220163427d9b8f18d4d7490.exe 31 PID 2108 wrote to memory of 1988 2108 JaffaCakes118_6c32dc814220163427d9b8f18d4d7490.exe 31 PID 2108 wrote to memory of 1988 2108 JaffaCakes118_6c32dc814220163427d9b8f18d4d7490.exe 31 PID 2108 wrote to memory of 1988 2108 JaffaCakes118_6c32dc814220163427d9b8f18d4d7490.exe 31 PID 1988 wrote to memory of 2188 1988 server.exe 32 PID 1988 wrote to memory of 2188 1988 server.exe 32 PID 1988 wrote to memory of 2188 1988 server.exe 32 PID 1988 wrote to memory of 2188 1988 server.exe 32 PID 1988 wrote to memory of 2188 1988 server.exe 32 PID 1988 wrote to memory of 2192 1988 server.exe 33 PID 1988 wrote to memory of 2192 1988 server.exe 33 PID 1988 wrote to memory of 2192 1988 server.exe 33 PID 1988 wrote to memory of 2192 1988 server.exe 33 PID 1988 wrote to memory of 2192 1988 server.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6c32dc814220163427d9b8f18d4d7490.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6c32dc814220163427d9b8f18d4d7490.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\server.exeC:\Users\Admin\AppData\Local\Temp/server.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- System Location Discovery: System Language Discovery
PID:2188
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2192
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD512d27499021448c874136d36fbe339d5
SHA1c03f7073cea41da612affc49dd078a8c7b2f341e
SHA256c280699f7288524fb66a248100124757ad41c7d10585632b5363c79200f93ea1
SHA5125e93611008cfbe5c22b7e5846bfa706e583215f3bd32b4cd1e6e77d730046cf850477a9683e1b60a2d10e1868d4a397585f09083555278c0f8eab449cd6ba4c7