Analysis
-
max time kernel
140s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-01-2025 09:40
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe
-
Size
140KB
-
MD5
3e457844b2c86318978a9dca7c16ea01
-
SHA1
a48e76b50a991ee8c4a3c2d28dc57d641a24d948
-
SHA256
627ceaf89ceee80d867b0393b6a17f68dece9f1c22003a5998cf02b036b46ffd
-
SHA512
1e77ca0f7e332ff4ea4427e1ae3e85b9f3d690f60306032609af81ad0a836adddb23dc2eb608fe4465b3feb227a53bed60275600cde255c34d093adebff0f3d9
-
SSDEEP
1536:tLNZcwmjhWyVIIm4RT2XXWxr8z+LY2G7RZ6ajv4WcD7HzjhABHs7ZGMVa:txmwwhWyNRTEWN8z+LY2SRZnR8SHsfA
Malware Config
Signatures
-
Detect XtremeRAT payload 2 IoCs
resource yara_rule behavioral1/memory/6208-473924-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral1/memory/6288-473930-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{7362HD78-2F0W-XJ21-37T3-BW118IF06NCS} JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7362HD78-2F0W-XJ21-37T3-BW118IF06NCS}\StubPath = "C:\\Windows\\rteadire\\maxthi.exe restart" JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe -
Executes dropped EXE 1 IoCs
pid Process 16448 maxthi.exe -
Loads dropped DLL 2 IoCs
pid Process 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLRW = "C:\\Windows\\rteadire\\maxthi.exe" JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCEW = "C:\\Windows\\rteadire\\maxthi.exe" JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Beamte = "C:\\Windows\\rteadire\\maxthi.exe" JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Beamte = "C:\\Windows\\rteadire\\maxthi.exe" JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1796 set thread context of 6208 1796 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 31 -
resource yara_rule behavioral1/memory/6208-473917-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/6208-473919-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/6208-473922-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/6208-473923-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/6208-473924-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/6288-473930-0x0000000000C80000-0x0000000000C96000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rteadire\maxthi.exe JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe File created C:\Windows\rteadire\maxthi.exe JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language maxthi.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1796 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 16448 maxthi.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 1796 wrote to memory of 6208 1796 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 31 PID 1796 wrote to memory of 6208 1796 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 31 PID 1796 wrote to memory of 6208 1796 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 31 PID 1796 wrote to memory of 6208 1796 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 31 PID 1796 wrote to memory of 6208 1796 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 31 PID 1796 wrote to memory of 6208 1796 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 31 PID 1796 wrote to memory of 6208 1796 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 31 PID 1796 wrote to memory of 6208 1796 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 31 PID 6208 wrote to memory of 6288 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 32 PID 6208 wrote to memory of 6288 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 32 PID 6208 wrote to memory of 6288 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 32 PID 6208 wrote to memory of 6288 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 32 PID 6208 wrote to memory of 6288 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 32 PID 6208 wrote to memory of 6316 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 33 PID 6208 wrote to memory of 6316 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 33 PID 6208 wrote to memory of 6316 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 33 PID 6208 wrote to memory of 6316 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 33 PID 6208 wrote to memory of 6316 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 33 PID 6208 wrote to memory of 6356 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 34 PID 6208 wrote to memory of 6356 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 34 PID 6208 wrote to memory of 6356 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 34 PID 6208 wrote to memory of 6356 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 34 PID 6208 wrote to memory of 6356 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 34 PID 6208 wrote to memory of 6372 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 35 PID 6208 wrote to memory of 6372 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 35 PID 6208 wrote to memory of 6372 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 35 PID 6208 wrote to memory of 6372 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 35 PID 6208 wrote to memory of 6372 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 35 PID 6208 wrote to memory of 16388 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 36 PID 6208 wrote to memory of 16388 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 36 PID 6208 wrote to memory of 16388 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 36 PID 6208 wrote to memory of 16388 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 36 PID 6208 wrote to memory of 16388 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 36 PID 6208 wrote to memory of 16400 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 37 PID 6208 wrote to memory of 16400 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 37 PID 6208 wrote to memory of 16400 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 37 PID 6208 wrote to memory of 16400 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 37 PID 6208 wrote to memory of 16400 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 37 PID 6208 wrote to memory of 16412 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 38 PID 6208 wrote to memory of 16412 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 38 PID 6208 wrote to memory of 16412 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 38 PID 6208 wrote to memory of 16412 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 38 PID 6208 wrote to memory of 16412 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 38 PID 6208 wrote to memory of 16428 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 39 PID 6208 wrote to memory of 16428 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 39 PID 6208 wrote to memory of 16428 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 39 PID 6208 wrote to memory of 16428 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 39 PID 6208 wrote to memory of 16428 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 39 PID 6208 wrote to memory of 16432 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 40 PID 6208 wrote to memory of 16432 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 40 PID 6208 wrote to memory of 16432 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 40 PID 6208 wrote to memory of 16432 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 40 PID 6208 wrote to memory of 16448 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 41 PID 6208 wrote to memory of 16448 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 41 PID 6208 wrote to memory of 16448 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 41 PID 6208 wrote to memory of 16448 6208 JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe"2⤵
- Boot or Logon Autostart Execution: Active Setup
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:6208 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- System Location Discovery: System Language Discovery
PID:6288 -
C:\Windows\rteadire\maxthi.exe"C:\Windows\rteadire\maxthi.exe"4⤵PID:109200
-
-
C:\Windows\rteadire\maxthi.exe"C:\Windows\rteadire\maxthi.exe"4⤵PID:102668
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:6316
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:6356
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:6372
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:16388
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:16400
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:16412
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:16428
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:16432
-
-
C:\Windows\rteadire\maxthi.exe"C:\Windows\rteadire\maxthi.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:16448
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD53e457844b2c86318978a9dca7c16ea01
SHA1a48e76b50a991ee8c4a3c2d28dc57d641a24d948
SHA256627ceaf89ceee80d867b0393b6a17f68dece9f1c22003a5998cf02b036b46ffd
SHA5121e77ca0f7e332ff4ea4427e1ae3e85b9f3d690f60306032609af81ad0a836adddb23dc2eb608fe4465b3feb227a53bed60275600cde255c34d093adebff0f3d9