Analysis
-
max time kernel
93s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 11:09
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6c32dc814220163427d9b8f18d4d7490.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6c32dc814220163427d9b8f18d4d7490.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_6c32dc814220163427d9b8f18d4d7490.exe
-
Size
822KB
-
MD5
6c32dc814220163427d9b8f18d4d7490
-
SHA1
5ab3ecfbad3d795c0c33c6745c85902759cbbb70
-
SHA256
0297e08c1b57115dfaa5a88450484e0c9cbce36d0170d0e973e9a86e2fefde8b
-
SHA512
bc25c97b003501780b3b23708a557f9d38c5cf359fdfe271aaf66cabc5503ea40cfd4b472e6bd60048237b0e49958e477e54562e5eb9fb58f700812292595051
-
SSDEEP
12288:U69zDWz/xwNqdlbrIX3JALF1QbOagrEGgtNryyCJuDT/PNa0AYQ/Hyw2Eq:U2DW/xbHX2YIbCQsu3/PNL7Q/HyVEq
Malware Config
Extracted
xtremerat
far3on.zapto.org
Signatures
-
Detect XtremeRAT payload 4 IoCs
resource yara_rule behavioral2/files/0x0008000000023c77-6.dat family_xtremerat behavioral2/memory/2392-8-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/4388-9-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/2392-10-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Executes dropped EXE 1 IoCs
pid Process 4388 server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 944 2392 WerFault.exe 84 3240 2392 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 460 wrote to memory of 4388 460 JaffaCakes118_6c32dc814220163427d9b8f18d4d7490.exe 83 PID 460 wrote to memory of 4388 460 JaffaCakes118_6c32dc814220163427d9b8f18d4d7490.exe 83 PID 460 wrote to memory of 4388 460 JaffaCakes118_6c32dc814220163427d9b8f18d4d7490.exe 83 PID 4388 wrote to memory of 2392 4388 server.exe 84 PID 4388 wrote to memory of 2392 4388 server.exe 84 PID 4388 wrote to memory of 2392 4388 server.exe 84 PID 4388 wrote to memory of 2392 4388 server.exe 84 PID 4388 wrote to memory of 2588 4388 server.exe 85 PID 4388 wrote to memory of 2588 4388 server.exe 85 PID 4388 wrote to memory of 2588 4388 server.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6c32dc814220163427d9b8f18d4d7490.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6c32dc814220163427d9b8f18d4d7490.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Users\Admin\AppData\Local\Temp\server.exeC:\Users\Admin\AppData\Local\Temp/server.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- System Location Discovery: System Language Discovery
PID:2392 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 4804⤵
- Program crash
PID:944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 4884⤵
- Program crash
PID:3240
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:2588
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2392 -ip 23921⤵PID:3340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2392 -ip 23921⤵PID:2252
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD512d27499021448c874136d36fbe339d5
SHA1c03f7073cea41da612affc49dd078a8c7b2f341e
SHA256c280699f7288524fb66a248100124757ad41c7d10585632b5363c79200f93ea1
SHA5125e93611008cfbe5c22b7e5846bfa706e583215f3bd32b4cd1e6e77d730046cf850477a9683e1b60a2d10e1868d4a397585f09083555278c0f8eab449cd6ba4c7