Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/01/2025, 13:28
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe
-
Size
372KB
-
MD5
e8d3bb336339dd1af4d64f6fdebcfa60
-
SHA1
bf3b1b32effdde2a3e3bae15c9e76e42cb694eb8
-
SHA256
2988a2c0f0aa9ed1aa8feee24bca194bbaf8d907a5f120910db6f4bb3c7adaac
-
SHA512
ef96e5809aea41dde9cb7d24cf6dffb563cb59da379223b47b1df48c4c583c5c81edc89f7ce2a7088d0c7c6b1745e6a64f75379a15d936b21dc6545393b8aadc
-
SSDEEP
3072:8iKmc7GSk7CyEJMDtkkXfC8sbYH6irTi:RKgXXa8xH6irT
Malware Config
Signatures
-
Detect XtremeRAT payload 7 IoCs
resource yara_rule behavioral1/memory/2136-2-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/2136-4-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/2136-5-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/2136-3-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/2732-9-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/2136-10-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/2732-11-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2784 set thread context of 2136 2784 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe 30 PID 2784 set thread context of 0 2784 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2784 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2136 2784 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe 30 PID 2784 wrote to memory of 2136 2784 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe 30 PID 2784 wrote to memory of 2136 2784 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe 30 PID 2784 wrote to memory of 2136 2784 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe 30 PID 2784 wrote to memory of 2136 2784 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe 30 PID 2784 wrote to memory of 2136 2784 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe 30 PID 2784 wrote to memory of 2136 2784 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe 30 PID 2784 wrote to memory of 2136 2784 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe 30 PID 2784 wrote to memory of 2136 2784 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe 30 PID 2784 wrote to memory of 2136 2784 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe 30 PID 2784 wrote to memory of 2136 2784 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe 30 PID 2784 wrote to memory of 2136 2784 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe 30 PID 2784 wrote to memory of 2136 2784 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe 30 PID 2784 wrote to memory of 2136 2784 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe 30 PID 2136 wrote to memory of 2732 2136 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe 31 PID 2136 wrote to memory of 2732 2136 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe 31 PID 2136 wrote to memory of 2732 2136 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe 31 PID 2136 wrote to memory of 2732 2136 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe 31 PID 2136 wrote to memory of 2732 2136 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe 31 PID 2136 wrote to memory of 2812 2136 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe 32 PID 2136 wrote to memory of 2812 2136 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe 32 PID 2136 wrote to memory of 2812 2136 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe 32 PID 2136 wrote to memory of 2812 2136 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe 32 PID 2784 wrote to memory of 0 2784 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe PID 2136 wrote to memory of 2812 2136 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe 32 PID 2784 wrote to memory of 0 2784 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe PID 2784 wrote to memory of 0 2784 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe PID 2784 wrote to memory of 0 2784 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe PID 2784 wrote to memory of 0 2784 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe PID 2784 wrote to memory of 0 2784 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe PID 2784 wrote to memory of 0 2784 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe PID 2784 wrote to memory of 0 2784 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe PID 2784 wrote to memory of 0 2784 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe PID 2784 wrote to memory of 0 2784 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- System Location Discovery: System Language Discovery
PID:2732
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2812
-
-