Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    24-01-2025 11:57

General

  • Target

    JaffaCakes118_212a50d01f43f8b8ac60e90731bf02ca.exe

  • Size

    67KB

  • MD5

    212a50d01f43f8b8ac60e90731bf02ca

  • SHA1

    fc3581c35642ee70cb0ab21bc32317b91efc7fb1

  • SHA256

    7df599a416046e36264bdb447245f58ae6cb95cba69766fca046a7336c7787a6

  • SHA512

    b25f194a8b4f58feb3beb0da7b7040f982211abff7a40a90b9a75c35269556f19921f07113ddf6b37c95c00d4027102ccac57bcf581330ecd20261407b09fd41

  • SSDEEP

    768:zyTMaIbrJEntrMxPLuMD8sKiwMUXxCIxsmmQ62IqxA/SKFVCLTF7KFljGXc3r:zYebrJAtrjMd1wtCzZOAKKEThcas3r

Malware Config

Signatures

  • Detect XtremeRAT payload 2 IoCs
  • XtremeRAT

    The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

  • Xtremerat family
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_212a50d01f43f8b8ac60e90731bf02ca.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_212a50d01f43f8b8ac60e90731bf02ca.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2108
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe"
      2⤵
        PID:2448
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        2⤵
          PID:2476
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          2⤵
            PID:2188
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            2⤵
              PID:2724
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              2⤵
                PID:2168
              • C:\Program Files\Internet Explorer\iexplore.exe
                "C:\Program Files\Internet Explorer\iexplore.exe"
                2⤵
                  PID:2128
                • C:\Program Files\Internet Explorer\iexplore.exe
                  "C:\Program Files\Internet Explorer\iexplore.exe"
                  2⤵
                    PID:2284
                  • C:\Program Files\Internet Explorer\iexplore.exe
                    "C:\Program Files\Internet Explorer\iexplore.exe"
                    2⤵
                      PID:876

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • memory/2108-0-0x0000000013140000-0x000000001316F000-memory.dmp

                    Filesize

                    188KB

                  • memory/2108-1-0x0000000013140000-0x000000001316F000-memory.dmp

                    Filesize

                    188KB

                  • memory/2108-3-0x0000000013140000-0x000000001316F000-memory.dmp

                    Filesize

                    188KB

                  • memory/2108-5-0x0000000013140000-0x000000001316F000-memory.dmp

                    Filesize

                    188KB

                  • memory/2108-4-0x000000001315C000-0x0000000013164000-memory.dmp

                    Filesize

                    32KB

                  • memory/2108-2-0x0000000013140000-0x000000001316F000-memory.dmp

                    Filesize

                    188KB

                  • memory/2108-9-0x0000000013140000-0x000000001316F000-memory.dmp

                    Filesize

                    188KB

                  • memory/2108-10-0x000000001315C000-0x0000000013164000-memory.dmp

                    Filesize

                    32KB