Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/01/2025, 03:35

General

  • Target

    JaffaCakes118_322bf28a650ec5e79f2cb95cbcf408ca.exe

  • Size

    4.2MB

  • MD5

    322bf28a650ec5e79f2cb95cbcf408ca

  • SHA1

    4a9701ad3d0c2a8490aeb9492d048be802531169

  • SHA256

    1bb6741552bbf2b53356efb52972f7553eef5715bc5991d95341825df413bc91

  • SHA512

    4e27a345b2523391e6dcc7ca080b799aea8c42cfedbfd2317db43a887f26e6a7e35dbef60a90071d2ff5ed72fa1a3bc8feea9017786d600d1e25edf83187387c

  • SSDEEP

    98304:uFDx9x4c8hIQ4ziSqKW/B0qOnCe4fPtAZkLl+n2:Axkc8mQ429KWJ0qaK3tAZzn2

Malware Config

Extracted

Family

xtremerat

C2

danny.no-ip.org

Signatures

  • Detect XtremeRAT payload 7 IoCs
  • XtremeRAT

    The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

  • Xtremerat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_322bf28a650ec5e79f2cb95cbcf408ca.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_322bf28a650ec5e79f2cb95cbcf408ca.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3200
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_322bf28a650ec5e79f2cb95cbcf408ca.exe
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_322bf28a650ec5e79f2cb95cbcf408ca.exe"
      2⤵
      • Checks computer location settings
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:920
      • C:\Windows\SysWOW64\svchost.exe
        svchost.exe
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4692
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 480
          4⤵
          • Program crash
          PID:4920
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 476
          4⤵
          • Program crash
          PID:4004
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
        3⤵
          PID:2544
        • C:\Program Files\VideoLAN\VLC\vlc.exe
          "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Windows\system32\894Tu non mi lasciare mai - Fausto Leali.wmv.mp3"
          3⤵
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:768
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4692 -ip 4692
      1⤵
        PID:4344
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4692 -ip 4692
        1⤵
          PID:744

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\894Tu non mi lasciare mai - Fausto Leali.wmv.mp3

          Filesize

          4.0MB

          MD5

          2ff7501ecbeec22f936a4704a506f687

          SHA1

          f596a7dc2fe17160a61f46c34347f28410011d57

          SHA256

          beab94a18e79c3cf0022f591cb053ee34bba60d677a9de46c114a7b47e65e657

          SHA512

          829ca34a70f3a3f9286cbc9b5d8d4f35b6f6f2685ceec3dc2500581874c00d2ec44da85ed6150d3d68c77da24d720dcc6bb8b7516bbdc6dd39499f76c9499644

        • memory/768-31-0x00007FFE71A50000-0x00007FFE71C5B000-memory.dmp

          Filesize

          2.0MB

        • memory/768-34-0x00007FFE814B0000-0x00007FFE814D1000-memory.dmp

          Filesize

          132KB

        • memory/768-66-0x00007FFE709A0000-0x00007FFE71A50000-memory.dmp

          Filesize

          16.7MB

        • memory/768-32-0x00007FFE709A0000-0x00007FFE71A50000-memory.dmp

          Filesize

          16.7MB

        • memory/768-33-0x00007FFE814E0000-0x00007FFE81521000-memory.dmp

          Filesize

          260KB

        • memory/768-27-0x00007FFE776C0000-0x00007FFE776D7000-memory.dmp

          Filesize

          92KB

        • memory/768-35-0x00007FFE80BD0000-0x00007FFE80BE8000-memory.dmp

          Filesize

          96KB

        • memory/768-21-0x00007FF7B8410000-0x00007FF7B8508000-memory.dmp

          Filesize

          992KB

        • memory/768-22-0x00007FFE78CC0000-0x00007FFE78CF4000-memory.dmp

          Filesize

          208KB

        • memory/768-24-0x00007FFE7D410000-0x00007FFE7D428000-memory.dmp

          Filesize

          96KB

        • memory/768-28-0x00007FFE86560000-0x00007FFE86571000-memory.dmp

          Filesize

          68KB

        • memory/768-30-0x00007FFE81530000-0x00007FFE81541000-memory.dmp

          Filesize

          68KB

        • memory/768-36-0x00007FFE72A10000-0x00007FFE72A77000-memory.dmp

          Filesize

          412KB

        • memory/768-26-0x00007FFE776E0000-0x00007FFE776F1000-memory.dmp

          Filesize

          68KB

        • memory/768-29-0x00007FFE81550000-0x00007FFE8156D000-memory.dmp

          Filesize

          116KB

        • memory/768-25-0x00007FFE77700000-0x00007FFE77717000-memory.dmp

          Filesize

          92KB

        • memory/768-23-0x00007FFE71E20000-0x00007FFE720D6000-memory.dmp

          Filesize

          2.7MB

        • memory/768-37-0x00007FFE80BB0000-0x00007FFE80BC7000-memory.dmp

          Filesize

          92KB

        • memory/920-2-0x0000000010000000-0x0000000010455000-memory.dmp

          Filesize

          4.3MB

        • memory/920-4-0x0000000010000000-0x0000000010455000-memory.dmp

          Filesize

          4.3MB

        • memory/920-15-0x0000000010000000-0x0000000010455000-memory.dmp

          Filesize

          4.3MB

        • memory/920-3-0x0000000010000000-0x0000000010455000-memory.dmp

          Filesize

          4.3MB

        • memory/920-5-0x0000000010000000-0x0000000010455000-memory.dmp

          Filesize

          4.3MB

        • memory/4692-14-0x0000000010000000-0x0000000010455000-memory.dmp

          Filesize

          4.3MB

        • memory/4692-6-0x0000000010000000-0x0000000010455000-memory.dmp

          Filesize

          4.3MB