Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
03-01-2025 18:08
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe
Resource
win7-20241023-en
General
-
Target
JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe
-
Size
944KB
-
MD5
6e7cc88bcd853bdc367674bc9533db48
-
SHA1
e1328a4a2ec375991a81a28dd00404c670748beb
-
SHA256
b3bfc99ee408e38c527d10dabc5123015b5d51cd3c8faed7339f74dd17251a41
-
SHA512
83df8ce5c5d832314d31ffde3b8d6a9a4e9a63158a7a2d78be9b345bf6b2c9c9851daf0d41ab1f244add5baa5df451eb90d70c2e70a7f809d99d7e4db3ae7506
-
SSDEEP
24576:1RmJkcoQricOIQxiZY1iaTyMt2oonDfbrlY:aJZoQrbTFZY1iaTyMtZonDfu
Malware Config
Extracted
xtremerat
vovometralha6679.no-ip.org
Signatures
-
Detect XtremeRAT payload 3 IoCs
resource yara_rule behavioral1/memory/1888-22-0x0000000010000000-0x0000000010054000-memory.dmp family_xtremerat behavioral1/memory/2900-26-0x0000000010000000-0x0000000010054000-memory.dmp family_xtremerat behavioral1/memory/2900-27-0x0000000010000000-0x0000000010054000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1888-23-0x0000000000400000-0x00000000004CC000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2116 set thread context of 1332 2116 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 30 PID 1332 set thread context of 1888 1332 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 34 -
resource yara_rule behavioral1/memory/1888-16-0x0000000010000000-0x0000000010054000-memory.dmp upx behavioral1/memory/1888-22-0x0000000010000000-0x0000000010054000-memory.dmp upx behavioral1/memory/1888-21-0x0000000010000000-0x0000000010054000-memory.dmp upx behavioral1/memory/1888-13-0x0000000010000000-0x0000000010054000-memory.dmp upx behavioral1/memory/1888-12-0x0000000010000000-0x0000000010054000-memory.dmp upx behavioral1/memory/2900-26-0x0000000010000000-0x0000000010054000-memory.dmp upx behavioral1/memory/2900-27-0x0000000010000000-0x0000000010054000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Kills process with taskkill 1 IoCs
pid Process 2408 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2408 taskkill.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1332 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2116 wrote to memory of 1332 2116 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 30 PID 2116 wrote to memory of 1332 2116 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 30 PID 2116 wrote to memory of 1332 2116 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 30 PID 2116 wrote to memory of 1332 2116 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 30 PID 2116 wrote to memory of 1332 2116 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 30 PID 2116 wrote to memory of 1332 2116 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 30 PID 2116 wrote to memory of 1332 2116 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 30 PID 1332 wrote to memory of 2392 1332 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 31 PID 1332 wrote to memory of 2392 1332 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 31 PID 1332 wrote to memory of 2392 1332 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 31 PID 1332 wrote to memory of 2392 1332 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 31 PID 2392 wrote to memory of 2408 2392 cmd.exe 33 PID 2392 wrote to memory of 2408 2392 cmd.exe 33 PID 2392 wrote to memory of 2408 2392 cmd.exe 33 PID 2392 wrote to memory of 2408 2392 cmd.exe 33 PID 1332 wrote to memory of 1888 1332 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 34 PID 1332 wrote to memory of 1888 1332 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 34 PID 1332 wrote to memory of 1888 1332 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 34 PID 1332 wrote to memory of 1888 1332 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 34 PID 1332 wrote to memory of 1888 1332 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 34 PID 1332 wrote to memory of 1888 1332 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 34 PID 1332 wrote to memory of 1888 1332 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 34 PID 1332 wrote to memory of 1888 1332 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 34 PID 1888 wrote to memory of 2900 1888 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 35 PID 1888 wrote to memory of 2900 1888 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 35 PID 1888 wrote to memory of 2900 1888 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 35 PID 1888 wrote to memory of 2900 1888 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 35 PID 1888 wrote to memory of 2900 1888 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 35 PID 1888 wrote to memory of 2180 1888 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 37 PID 1888 wrote to memory of 2180 1888 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 37 PID 1888 wrote to memory of 2180 1888 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 37 PID 1888 wrote to memory of 2180 1888 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 37 PID 1888 wrote to memory of 2180 1888 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\cmd.execmd /c taskkill -f -im CisTray.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im CisTray.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2408
-
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- System Location Discovery: System Language Discovery
PID:2900
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2180
-
-
-