Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    96s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/01/2025, 22:35 UTC

General

  • Target

    JaffaCakes118_444af42eedf1678eba46eb04aa3310dd.exe

  • Size

    119KB

  • MD5

    444af42eedf1678eba46eb04aa3310dd

  • SHA1

    7e3d7e95820dce4ed0b2775123513fe40463332b

  • SHA256

    438e621864ee31ab757e92ef4e5120d2a8142fcd650d10f992cedfa236ea3064

  • SHA512

    b7656360ff7556589e20bc9dea5fe58dafd1e1ed7546892ce5fbadb84d24a15a234251729272a3730f42a870b8d16e87f52946a657a9272ff92a8dbedebf8d2e

  • SSDEEP

    1536:pOF7+/JyYNWJ85KSUav8lnpmVdhcHgWm1o+Uam5w01yKb:pOFS/IYNWSwSUZmnmAr157m5Z1/

Malware Config

Extracted

Family

xtremerat

C2

mikropbisey.no-ip.biz

Signatures

  • Detect XtremeRAT payload 3 IoCs
  • XtremeRAT

    The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

  • Xtremerat family
  • Suspicious use of SetThreadContext 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_444af42eedf1678eba46eb04aa3310dd.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_444af42eedf1678eba46eb04aa3310dd.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5084
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_444af42eedf1678eba46eb04aa3310dd.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_444af42eedf1678eba46eb04aa3310dd.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2848
      • C:\Windows\SysWOW64\svchost.exe
        svchost.exe
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3436
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3436 -s 480
          4⤵
          • Program crash
          PID:2472
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3436 -s 488
          4⤵
          • Program crash
          PID:4740
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
        3⤵
          PID:1076
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3436 -ip 3436
      1⤵
        PID:3368
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3436 -ip 3436
        1⤵
          PID:1196

        Network

        • flag-us
          DNS
          232.168.11.51.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          232.168.11.51.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          167.173.78.104.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          167.173.78.104.in-addr.arpa
          IN PTR
          Response
          167.173.78.104.in-addr.arpa
          IN PTR
          a104-78-173-167deploystaticakamaitechnologiescom
        • flag-us
          DNS
          217.106.137.52.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          217.106.137.52.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          50.23.12.20.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          50.23.12.20.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          241.42.69.40.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          241.42.69.40.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          31.243.111.52.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          31.243.111.52.in-addr.arpa
          IN PTR
          Response
        No results found
        • 8.8.8.8:53
          232.168.11.51.in-addr.arpa
          dns
          72 B
          158 B
          1
          1

          DNS Request

          232.168.11.51.in-addr.arpa

        • 8.8.8.8:53
          167.173.78.104.in-addr.arpa
          dns
          73 B
          139 B
          1
          1

          DNS Request

          167.173.78.104.in-addr.arpa

        • 8.8.8.8:53
          217.106.137.52.in-addr.arpa
          dns
          73 B
          147 B
          1
          1

          DNS Request

          217.106.137.52.in-addr.arpa

        • 8.8.8.8:53
          50.23.12.20.in-addr.arpa
          dns
          70 B
          156 B
          1
          1

          DNS Request

          50.23.12.20.in-addr.arpa

        • 8.8.8.8:53
          241.42.69.40.in-addr.arpa
          dns
          71 B
          145 B
          1
          1

          DNS Request

          241.42.69.40.in-addr.arpa

        • 8.8.8.8:53
          31.243.111.52.in-addr.arpa
          dns
          72 B
          158 B
          1
          1

          DNS Request

          31.243.111.52.in-addr.arpa

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2848-2-0x0000000010000000-0x000000001004B000-memory.dmp

          Filesize

          300KB

        • memory/2848-4-0x0000000010000000-0x000000001004B000-memory.dmp

          Filesize

          300KB

        • memory/2848-5-0x0000000010000000-0x000000001004B000-memory.dmp

          Filesize

          300KB

        • memory/2848-6-0x00007FFFE04D0000-0x00007FFFE06C5000-memory.dmp

          Filesize

          2.0MB

        • memory/3436-7-0x0000000010000000-0x000000001004B000-memory.dmp

          Filesize

          300KB

        • memory/3436-8-0x00007FFFE04D0000-0x00007FFFE06C5000-memory.dmp

          Filesize

          2.0MB

        • memory/3436-9-0x0000000010000000-0x000000001004B000-memory.dmp

          Filesize

          300KB

        We care about your privacy.

        This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.