Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
90s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/01/2025, 13:28
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe
-
Size
372KB
-
MD5
e8d3bb336339dd1af4d64f6fdebcfa60
-
SHA1
bf3b1b32effdde2a3e3bae15c9e76e42cb694eb8
-
SHA256
2988a2c0f0aa9ed1aa8feee24bca194bbaf8d907a5f120910db6f4bb3c7adaac
-
SHA512
ef96e5809aea41dde9cb7d24cf6dffb563cb59da379223b47b1df48c4c583c5c81edc89f7ce2a7088d0c7c6b1745e6a64f75379a15d936b21dc6545393b8aadc
-
SSDEEP
3072:8iKmc7GSk7CyEJMDtkkXfC8sbYH6irTi:RKgXXa8xH6irT
Malware Config
Signatures
-
Detect XtremeRAT payload 7 IoCs
resource yara_rule behavioral2/memory/3096-2-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/3096-3-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/3096-4-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/3096-5-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/4516-6-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/3096-7-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/4516-9-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 732 set thread context of 3096 732 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe 85 PID 732 set thread context of 0 732 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2296 4516 WerFault.exe 86 2084 4516 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 732 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 732 wrote to memory of 3096 732 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe 85 PID 732 wrote to memory of 3096 732 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe 85 PID 732 wrote to memory of 3096 732 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe 85 PID 732 wrote to memory of 3096 732 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe 85 PID 732 wrote to memory of 3096 732 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe 85 PID 732 wrote to memory of 3096 732 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe 85 PID 732 wrote to memory of 3096 732 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe 85 PID 732 wrote to memory of 3096 732 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe 85 PID 732 wrote to memory of 3096 732 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe 85 PID 732 wrote to memory of 3096 732 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe 85 PID 732 wrote to memory of 3096 732 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe 85 PID 732 wrote to memory of 3096 732 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe 85 PID 732 wrote to memory of 3096 732 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe 85 PID 732 wrote to memory of 0 732 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe PID 3096 wrote to memory of 4516 3096 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe 86 PID 3096 wrote to memory of 4516 3096 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe 86 PID 3096 wrote to memory of 4516 3096 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe 86 PID 732 wrote to memory of 0 732 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe PID 3096 wrote to memory of 4516 3096 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe 86 PID 732 wrote to memory of 0 732 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe PID 3096 wrote to memory of 2292 3096 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe 87 PID 3096 wrote to memory of 2292 3096 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe 87 PID 732 wrote to memory of 0 732 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe PID 3096 wrote to memory of 2292 3096 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe 87 PID 732 wrote to memory of 0 732 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe PID 732 wrote to memory of 0 732 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe PID 732 wrote to memory of 0 732 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe PID 732 wrote to memory of 0 732 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe PID 732 wrote to memory of 0 732 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe PID 732 wrote to memory of 0 732 JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e8d3bb336339dd1af4d64f6fdebcfa60.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- System Location Discovery: System Language Discovery
PID:4516 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4516 -s 4804⤵
- Program crash
PID:2296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4516 -s 4884⤵
- Program crash
PID:2084
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:2292
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4516 -ip 45161⤵PID:2224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 4516 -ip 45161⤵PID:3080