Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2025 09:37
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_15ed0d2f5cf9d29621dce578680c53ef.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_15ed0d2f5cf9d29621dce578680c53ef.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_15ed0d2f5cf9d29621dce578680c53ef.exe
-
Size
621KB
-
MD5
15ed0d2f5cf9d29621dce578680c53ef
-
SHA1
ff79ac14a29b98b526cdaae92bc140baa39c3a51
-
SHA256
fca44d3a35db8488c9665f16fa87cd166638585b4d6eca6ab2ce9896e6f63ac8
-
SHA512
df91b6ed4373ee3a257f0f565dc4c59cdc22b54d1993fa31ab5eec3bad227d0dfe229b456ec36d1d066677db0ab4d95694b3fce5a141768e3826d164c516c4b6
-
SSDEEP
12288:AJgZwAtoqhN8/xHZWB2az7I5yBtLfmCb:A6Zw4ZnAx5ZjyBhn
Malware Config
Extracted
xtremerat
loveyoubaby.zapto.org
Signatures
-
Detect XtremeRAT payload 21 IoCs
resource yara_rule behavioral2/memory/184-16-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/184-41-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/184-43-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/184-33-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/184-30-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/184-28-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/184-25-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/184-23-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/184-39-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/184-37-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/184-35-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/184-31-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/184-21-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/2536-73-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/2496-74-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/1800-75-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/1628-76-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/1628-77-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/2496-78-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/1800-79-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral2/memory/2536-80-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Executes dropped EXE 4 IoCs
pid Process 4880 2012MA~1.EXE 184 2012MA~1.exe 3340 2012MA~1.EXE 1096 2012MA~1.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" JaffaCakes118_15ed0d2f5cf9d29621dce578680c53ef.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4880 set thread context of 184 4880 2012MA~1.EXE 84 PID 3340 set thread context of 1096 3340 2012MA~1.EXE 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 8 IoCs
pid pid_target Process procid_target 2072 1628 WerFault.exe 90 4356 1800 WerFault.exe 89 464 2496 WerFault.exe 88 2200 2536 WerFault.exe 87 3420 1628 WerFault.exe 90 3328 2496 WerFault.exe 88 1664 1800 WerFault.exe 89 2176 2536 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2012MA~1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2012MA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2012MA~1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_15ed0d2f5cf9d29621dce578680c53ef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2012MA~1.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4880 2012MA~1.EXE 3340 2012MA~1.EXE -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 3940 wrote to memory of 4880 3940 JaffaCakes118_15ed0d2f5cf9d29621dce578680c53ef.exe 83 PID 3940 wrote to memory of 4880 3940 JaffaCakes118_15ed0d2f5cf9d29621dce578680c53ef.exe 83 PID 3940 wrote to memory of 4880 3940 JaffaCakes118_15ed0d2f5cf9d29621dce578680c53ef.exe 83 PID 4880 wrote to memory of 184 4880 2012MA~1.EXE 84 PID 4880 wrote to memory of 184 4880 2012MA~1.EXE 84 PID 4880 wrote to memory of 184 4880 2012MA~1.EXE 84 PID 4880 wrote to memory of 184 4880 2012MA~1.EXE 84 PID 4880 wrote to memory of 184 4880 2012MA~1.EXE 84 PID 4880 wrote to memory of 184 4880 2012MA~1.EXE 84 PID 4880 wrote to memory of 184 4880 2012MA~1.EXE 84 PID 4880 wrote to memory of 184 4880 2012MA~1.EXE 84 PID 4880 wrote to memory of 184 4880 2012MA~1.EXE 84 PID 4880 wrote to memory of 184 4880 2012MA~1.EXE 84 PID 4880 wrote to memory of 184 4880 2012MA~1.EXE 84 PID 4880 wrote to memory of 184 4880 2012MA~1.EXE 84 PID 4880 wrote to memory of 184 4880 2012MA~1.EXE 84 PID 4880 wrote to memory of 184 4880 2012MA~1.EXE 84 PID 4880 wrote to memory of 184 4880 2012MA~1.EXE 84 PID 4880 wrote to memory of 184 4880 2012MA~1.EXE 84 PID 3940 wrote to memory of 3340 3940 JaffaCakes118_15ed0d2f5cf9d29621dce578680c53ef.exe 85 PID 3940 wrote to memory of 3340 3940 JaffaCakes118_15ed0d2f5cf9d29621dce578680c53ef.exe 85 PID 3940 wrote to memory of 3340 3940 JaffaCakes118_15ed0d2f5cf9d29621dce578680c53ef.exe 85 PID 3340 wrote to memory of 1096 3340 2012MA~1.EXE 86 PID 3340 wrote to memory of 1096 3340 2012MA~1.EXE 86 PID 3340 wrote to memory of 1096 3340 2012MA~1.EXE 86 PID 3340 wrote to memory of 1096 3340 2012MA~1.EXE 86 PID 3340 wrote to memory of 1096 3340 2012MA~1.EXE 86 PID 3340 wrote to memory of 1096 3340 2012MA~1.EXE 86 PID 3340 wrote to memory of 1096 3340 2012MA~1.EXE 86 PID 3340 wrote to memory of 1096 3340 2012MA~1.EXE 86 PID 3340 wrote to memory of 1096 3340 2012MA~1.EXE 86 PID 3340 wrote to memory of 1096 3340 2012MA~1.EXE 86 PID 3340 wrote to memory of 1096 3340 2012MA~1.EXE 86 PID 3340 wrote to memory of 1096 3340 2012MA~1.EXE 86 PID 3340 wrote to memory of 1096 3340 2012MA~1.EXE 86 PID 3340 wrote to memory of 1096 3340 2012MA~1.EXE 86 PID 3340 wrote to memory of 1096 3340 2012MA~1.EXE 86 PID 3340 wrote to memory of 1096 3340 2012MA~1.EXE 86 PID 184 wrote to memory of 2536 184 2012MA~1.exe 87 PID 184 wrote to memory of 2536 184 2012MA~1.exe 87 PID 184 wrote to memory of 2536 184 2012MA~1.exe 87 PID 1096 wrote to memory of 2496 1096 2012MA~1.exe 88 PID 1096 wrote to memory of 2496 1096 2012MA~1.exe 88 PID 1096 wrote to memory of 2496 1096 2012MA~1.exe 88 PID 184 wrote to memory of 2536 184 2012MA~1.exe 87 PID 184 wrote to memory of 1800 184 2012MA~1.exe 89 PID 184 wrote to memory of 1800 184 2012MA~1.exe 89 PID 184 wrote to memory of 1800 184 2012MA~1.exe 89 PID 1096 wrote to memory of 2496 1096 2012MA~1.exe 88 PID 1096 wrote to memory of 1628 1096 2012MA~1.exe 90 PID 1096 wrote to memory of 1628 1096 2012MA~1.exe 90 PID 1096 wrote to memory of 1628 1096 2012MA~1.exe 90 PID 184 wrote to memory of 1800 184 2012MA~1.exe 89 PID 1096 wrote to memory of 1628 1096 2012MA~1.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_15ed0d2f5cf9d29621dce578680c53ef.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_15ed0d2f5cf9d29621dce578680c53ef.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2012MA~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2012MA~1.EXE2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2012MA~1.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2012MA~1.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:184 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- System Location Discovery: System Language Discovery
PID:2536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2536 -s 5085⤵
- Program crash
PID:2200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2536 -s 5165⤵
- Program crash
PID:2176
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- System Location Discovery: System Language Discovery
PID:1800 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1800 -s 6285⤵
- Program crash
PID:4356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1800 -s 7245⤵
- Program crash
PID:1664
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2012MA~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2012MA~1.EXE2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2012MA~1.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2012MA~1.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- System Location Discovery: System Language Discovery
PID:2496 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2496 -s 5045⤵
- Program crash
PID:464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2496 -s 5285⤵
- Program crash
PID:3328
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- System Location Discovery: System Language Discovery
PID:1628 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 6725⤵
- Program crash
PID:2072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 7805⤵
- Program crash
PID:3420
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2536 -ip 25361⤵PID:1416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1800 -ip 18001⤵PID:3696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2496 -ip 24961⤵PID:3084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1628 -ip 16281⤵PID:2268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1628 -ip 16281⤵PID:3936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2496 -ip 24961⤵PID:4984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2536 -ip 25361⤵PID:2748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 1800 -ip 18001⤵PID:1828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
467KB
MD52ebb2288ef726a54ac3384fad4bfac6e
SHA127975c8aca5a5fc74f0a20851849d37d7c23aadb
SHA256bbd782f445eadf66f9d9871eb41204ba2649117d280a565f028ebfe2c1261f2b
SHA512a2abcfaab0c80ce12b745e2c82eb023cd3ccd0a50c67c0bd90a551be9028cf3266c39f60f74e7828d4427e9786a3c9a78fa40da0678b75dcae6675de19206af7