Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04-01-2025 09:11

General

  • Target

    JaffaCakes118_78da53408cd673fd3051565f8e6ba720.exe

  • Size

    95KB

  • MD5

    78da53408cd673fd3051565f8e6ba720

  • SHA1

    ffbd94e0763ba9ae7ad39fd0cb0f290b9c587a43

  • SHA256

    b58cdf6d969afb01e8cf4ebd21b01b53ad0ea53b1d0d8126bf7ba4ca655ab3e9

  • SHA512

    8cc107bad54ceebd5c5599115737ef53f688d8ffd26aad61227b5a6da3858b64da778ee3f8bf1313ec0c5eafc8a60aa8cc84efc8b1d0d09339c80bf8ed2cf4fb

  • SSDEEP

    1536:8x70xyGJ2d0OA8Fgw3DFhBrtouYsn70vQviEcXJ4s:8axf2d2jwzRpouYsLi5p

Malware Config

Extracted

Family

xtremerat

C2

kirr.no-ip.biz

洕ዿ言C:\Windima7.no-ip.info

dee46ndal.no-ip.biz

Signatures

  • Detect XtremeRAT payload 11 IoCs
  • XtremeRAT

    The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

  • Xtremerat family
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_78da53408cd673fd3051565f8e6ba720.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_78da53408cd673fd3051565f8e6ba720.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2812
    • C:\Windows\SysWOW64\cmd.exe
      "cmd"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2816
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_78da53408cd673fd3051565f8e6ba720.exe
      JaffaCakes118_78da53408cd673fd3051565f8e6ba720.exe
      2⤵
        PID:2976
      • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_78da53408cd673fd3051565f8e6ba720.exe
        JaffaCakes118_78da53408cd673fd3051565f8e6ba720.exe
        2⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Adds Run key to start application
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2860
        • C:\Windows\SysWOW64\svchost.exe
          svchost.exe
          3⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          PID:2700
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          3⤵
            PID:2620
          • C:\Windows\SysWOW64\explorer.exe
            explorer.exe
            3⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:2872

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\InstallDir\dl.exe

        Filesize

        95KB

        MD5

        78da53408cd673fd3051565f8e6ba720

        SHA1

        ffbd94e0763ba9ae7ad39fd0cb0f290b9c587a43

        SHA256

        b58cdf6d969afb01e8cf4ebd21b01b53ad0ea53b1d0d8126bf7ba4ca655ab3e9

        SHA512

        8cc107bad54ceebd5c5599115737ef53f688d8ffd26aad61227b5a6da3858b64da778ee3f8bf1313ec0c5eafc8a60aa8cc84efc8b1d0d09339c80bf8ed2cf4fb

      • memory/2700-23-0x0000000000C80000-0x0000000000C93000-memory.dmp

        Filesize

        76KB

      • memory/2812-0-0x0000000074331000-0x0000000074332000-memory.dmp

        Filesize

        4KB

      • memory/2812-1-0x0000000074330000-0x00000000748DB000-memory.dmp

        Filesize

        5.7MB

      • memory/2812-2-0x0000000074330000-0x00000000748DB000-memory.dmp

        Filesize

        5.7MB

      • memory/2812-17-0x0000000074330000-0x00000000748DB000-memory.dmp

        Filesize

        5.7MB

      • memory/2860-10-0x0000000000C80000-0x0000000000C93000-memory.dmp

        Filesize

        76KB

      • memory/2860-11-0x0000000000C80000-0x0000000000C93000-memory.dmp

        Filesize

        76KB

      • memory/2860-16-0x0000000000C80000-0x0000000000C93000-memory.dmp

        Filesize

        76KB

      • memory/2860-9-0x0000000000C80000-0x0000000000C93000-memory.dmp

        Filesize

        76KB

      • memory/2860-8-0x0000000000C80000-0x0000000000C93000-memory.dmp

        Filesize

        76KB

      • memory/2860-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2860-7-0x0000000000C80000-0x0000000000C93000-memory.dmp

        Filesize

        76KB

      • memory/2860-6-0x0000000000C80000-0x0000000000C93000-memory.dmp

        Filesize

        76KB

      • memory/2860-5-0x0000000000C80000-0x0000000000C93000-memory.dmp

        Filesize

        76KB

      • memory/2860-14-0x0000000000C80000-0x0000000000C93000-memory.dmp

        Filesize

        76KB

      • memory/2860-15-0x0000000000C80000-0x0000000000C93000-memory.dmp

        Filesize

        76KB

      • memory/2872-27-0x0000000000C80000-0x0000000000C93000-memory.dmp

        Filesize

        76KB

      • memory/2872-29-0x0000000000C80000-0x0000000000C93000-memory.dmp

        Filesize

        76KB