Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-01-2025 18:56
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_06c19d75fb6bdbadb8c6b7dd81705524.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_06c19d75fb6bdbadb8c6b7dd81705524.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_06c19d75fb6bdbadb8c6b7dd81705524.exe
-
Size
63KB
-
MD5
06c19d75fb6bdbadb8c6b7dd81705524
-
SHA1
976dac0eb9a014388089697073d1e5f123511230
-
SHA256
c160844694476e03be2bc9491b6dc994b952739f05ecf57352f91af3c3fa4f71
-
SHA512
f96d34abdf373f518e96417a80b53d52f7540040e10ea13889066e517faa63d36b167ef88e531845aed1452678820d5154e5caa77c379f83ee7953a9fe36ac26
-
SSDEEP
1536:ZGGLXyYF0CCPzNbuBqTRAyQ0k68IEcHKNFit:ZGayYF0jLJVNHmLIhqNi
Malware Config
Extracted
xtremerat
wasimhak.no-ip.biz
Signatures
-
Detect XtremeRAT payload 3 IoCs
resource yara_rule behavioral2/files/0x0007000000023ca8-12.dat family_xtremerat behavioral2/memory/3100-17-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral2/memory/2720-21-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\system32\\google..\\google.exe restart" winupdcenter.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\system32\\google..\\google.exe restart" svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} winupdcenter.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation winupdcenter.exe -
Executes dropped EXE 1 IoCs
pid Process 2720 winupdcenter.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\google..\\google.exe" winupdcenter.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\google..\\google.exe" winupdcenter.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\google..\\google.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\google..\\google.exe" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\google..\google.exe winupdcenter.exe File created C:\Windows\SysWOW64\google..\google.exe winupdcenter.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdcenter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2476 wrote to memory of 2720 2476 JaffaCakes118_06c19d75fb6bdbadb8c6b7dd81705524.exe 83 PID 2476 wrote to memory of 2720 2476 JaffaCakes118_06c19d75fb6bdbadb8c6b7dd81705524.exe 83 PID 2476 wrote to memory of 2720 2476 JaffaCakes118_06c19d75fb6bdbadb8c6b7dd81705524.exe 83 PID 2720 wrote to memory of 3100 2720 winupdcenter.exe 84 PID 2720 wrote to memory of 3100 2720 winupdcenter.exe 84 PID 2720 wrote to memory of 3100 2720 winupdcenter.exe 84 PID 2720 wrote to memory of 3100 2720 winupdcenter.exe 84 PID 2720 wrote to memory of 3896 2720 winupdcenter.exe 85 PID 2720 wrote to memory of 3896 2720 winupdcenter.exe 85 PID 2720 wrote to memory of 3896 2720 winupdcenter.exe 85 PID 2720 wrote to memory of 4112 2720 winupdcenter.exe 86 PID 2720 wrote to memory of 4112 2720 winupdcenter.exe 86 PID 2720 wrote to memory of 4112 2720 winupdcenter.exe 86 PID 2720 wrote to memory of 2868 2720 winupdcenter.exe 87 PID 2720 wrote to memory of 2868 2720 winupdcenter.exe 87 PID 2720 wrote to memory of 2868 2720 winupdcenter.exe 87 PID 2720 wrote to memory of 2724 2720 winupdcenter.exe 90 PID 2720 wrote to memory of 2724 2720 winupdcenter.exe 90 PID 2720 wrote to memory of 2724 2720 winupdcenter.exe 90 PID 2720 wrote to memory of 3416 2720 winupdcenter.exe 93 PID 2720 wrote to memory of 3416 2720 winupdcenter.exe 93 PID 2720 wrote to memory of 3416 2720 winupdcenter.exe 93 PID 2720 wrote to memory of 1312 2720 winupdcenter.exe 96 PID 2720 wrote to memory of 1312 2720 winupdcenter.exe 96 PID 2720 wrote to memory of 1312 2720 winupdcenter.exe 96 PID 2720 wrote to memory of 3688 2720 winupdcenter.exe 97 PID 2720 wrote to memory of 3688 2720 winupdcenter.exe 97 PID 2720 wrote to memory of 3688 2720 winupdcenter.exe 97 PID 2720 wrote to memory of 4420 2720 winupdcenter.exe 98 PID 2720 wrote to memory of 4420 2720 winupdcenter.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_06c19d75fb6bdbadb8c6b7dd81705524.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_06c19d75fb6bdbadb8c6b7dd81705524.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\winupdcenter.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\winupdcenter.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4420
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD50f8ecc96cee412f6db8f036395fd01e9
SHA1691129dea8fb0523cc4f1e41550ada9873d36bf2
SHA256da503121701324d4ff6fa26e48b142497919b2bb2b574f886bbba83fc6e73de8
SHA51223db55f5b6d183564adbf054884d4e6cbec322e9033d08fd9a752d96812a4563938c4b84832f2fdaa25f0cecd2413927cc6d0da5d38082b4e860c56f1d80e3bd