Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 18:08
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe
Resource
win7-20241023-en
General
-
Target
JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe
-
Size
944KB
-
MD5
6e7cc88bcd853bdc367674bc9533db48
-
SHA1
e1328a4a2ec375991a81a28dd00404c670748beb
-
SHA256
b3bfc99ee408e38c527d10dabc5123015b5d51cd3c8faed7339f74dd17251a41
-
SHA512
83df8ce5c5d832314d31ffde3b8d6a9a4e9a63158a7a2d78be9b345bf6b2c9c9851daf0d41ab1f244add5baa5df451eb90d70c2e70a7f809d99d7e4db3ae7506
-
SSDEEP
24576:1RmJkcoQricOIQxiZY1iaTyMt2oonDfbrlY:aJZoQrbTFZY1iaTyMtZonDfu
Malware Config
Extracted
xtremerat
vovometralha6679.no-ip.org
Signatures
-
Detect XtremeRAT payload 3 IoCs
resource yara_rule behavioral2/memory/2340-10-0x0000000010000000-0x0000000010054000-memory.dmp family_xtremerat behavioral2/memory/1088-12-0x0000000010000000-0x0000000010054000-memory.dmp family_xtremerat behavioral2/memory/1088-13-0x0000000010000000-0x0000000010054000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/2340-11-0x0000000000400000-0x00000000004CC000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 780 set thread context of 3528 780 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 85 PID 3528 set thread context of 2340 3528 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 88 -
resource yara_rule behavioral2/memory/2340-5-0x0000000010000000-0x0000000010054000-memory.dmp upx behavioral2/memory/2340-9-0x0000000010000000-0x0000000010054000-memory.dmp upx behavioral2/memory/2340-10-0x0000000010000000-0x0000000010054000-memory.dmp upx behavioral2/memory/1088-12-0x0000000010000000-0x0000000010054000-memory.dmp upx behavioral2/memory/1088-13-0x0000000010000000-0x0000000010054000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1640 1088 WerFault.exe 90 4352 1088 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Kills process with taskkill 1 IoCs
pid Process 3628 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3628 taskkill.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3528 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 780 wrote to memory of 3528 780 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 85 PID 780 wrote to memory of 3528 780 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 85 PID 780 wrote to memory of 3528 780 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 85 PID 780 wrote to memory of 3528 780 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 85 PID 780 wrote to memory of 3528 780 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 85 PID 780 wrote to memory of 3528 780 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 85 PID 3528 wrote to memory of 4656 3528 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 86 PID 3528 wrote to memory of 4656 3528 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 86 PID 3528 wrote to memory of 4656 3528 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 86 PID 3528 wrote to memory of 2340 3528 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 88 PID 3528 wrote to memory of 2340 3528 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 88 PID 3528 wrote to memory of 2340 3528 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 88 PID 3528 wrote to memory of 2340 3528 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 88 PID 3528 wrote to memory of 2340 3528 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 88 PID 3528 wrote to memory of 2340 3528 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 88 PID 3528 wrote to memory of 2340 3528 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 88 PID 3528 wrote to memory of 2340 3528 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 88 PID 4656 wrote to memory of 3628 4656 cmd.exe 89 PID 4656 wrote to memory of 3628 4656 cmd.exe 89 PID 4656 wrote to memory of 3628 4656 cmd.exe 89 PID 2340 wrote to memory of 1088 2340 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 90 PID 2340 wrote to memory of 1088 2340 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 90 PID 2340 wrote to memory of 1088 2340 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 90 PID 2340 wrote to memory of 1088 2340 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 90 PID 2340 wrote to memory of 4900 2340 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 92 PID 2340 wrote to memory of 4900 2340 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 92 PID 2340 wrote to memory of 4900 2340 JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\SysWOW64\cmd.execmd /c taskkill -f -im CisTray.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im CisTray.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3628
-
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- System Location Discovery: System Language Discovery
PID:1088 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1088 -s 4805⤵
- Program crash
PID:1640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1088 -s 5045⤵
- Program crash
PID:4352
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"4⤵PID:4900
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1088 -ip 10881⤵PID:3704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1088 -ip 10881⤵PID:2396