Analysis
-
max time kernel
91s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2025 20:21
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_435b72cfbf939eb1f32f3d2f528e21c4.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_435b72cfbf939eb1f32f3d2f528e21c4.exe
-
Size
809KB
-
MD5
435b72cfbf939eb1f32f3d2f528e21c4
-
SHA1
f0320c280a25f03301586d1acd84edc9247d3da0
-
SHA256
2fe90d9427c800ef20af4d2987c95b602a47a82ca42a39b9e9c8ea82f109054a
-
SHA512
c726a5be311889f086091e2b622f66f6f6bf4a22ca0d8a57844ab1ae83ec0d964bbe8dbfae61b661aaf824ba0a6c120dae5ebf9cad7b85a376d908fe188abcaa
-
SSDEEP
12288:OuXdjyfHShflT8ZfMfHS3HHiL9QHB11hJ2BHjyDNT9Zs3Aym8Gm:OAyfHSMZU/siBKhJ2BHG9ZsQyme
Malware Config
Extracted
xtremerat
mikropbisey.no-ip.biz
Signatures
-
Detect XtremeRAT payload 3 IoCs
resource yara_rule behavioral2/memory/2584-24-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/4564-26-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/4564-27-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Executes dropped EXE 3 IoCs
pid Process 1752 TURKHA~1.EXE 780 system32.exe 2584 system32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" JaffaCakes118_435b72cfbf939eb1f32f3d2f528e21c4.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 780 set thread context of 2584 780 system32.exe 86 -
resource yara_rule behavioral2/memory/2584-17-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/2584-22-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/2584-24-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/4564-26-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/4564-27-0x0000000010000000-0x000000001004D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 792 4564 WerFault.exe 87 4932 4564 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_435b72cfbf939eb1f32f3d2f528e21c4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TURKHA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1752 TURKHA~1.EXE 780 system32.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3588 wrote to memory of 1752 3588 JaffaCakes118_435b72cfbf939eb1f32f3d2f528e21c4.exe 84 PID 3588 wrote to memory of 1752 3588 JaffaCakes118_435b72cfbf939eb1f32f3d2f528e21c4.exe 84 PID 3588 wrote to memory of 1752 3588 JaffaCakes118_435b72cfbf939eb1f32f3d2f528e21c4.exe 84 PID 3588 wrote to memory of 780 3588 JaffaCakes118_435b72cfbf939eb1f32f3d2f528e21c4.exe 85 PID 3588 wrote to memory of 780 3588 JaffaCakes118_435b72cfbf939eb1f32f3d2f528e21c4.exe 85 PID 3588 wrote to memory of 780 3588 JaffaCakes118_435b72cfbf939eb1f32f3d2f528e21c4.exe 85 PID 780 wrote to memory of 2584 780 system32.exe 86 PID 780 wrote to memory of 2584 780 system32.exe 86 PID 780 wrote to memory of 2584 780 system32.exe 86 PID 780 wrote to memory of 2584 780 system32.exe 86 PID 780 wrote to memory of 2584 780 system32.exe 86 PID 780 wrote to memory of 2584 780 system32.exe 86 PID 780 wrote to memory of 2584 780 system32.exe 86 PID 780 wrote to memory of 2584 780 system32.exe 86 PID 2584 wrote to memory of 4564 2584 system32.exe 87 PID 2584 wrote to memory of 4564 2584 system32.exe 87 PID 2584 wrote to memory of 4564 2584 system32.exe 87 PID 2584 wrote to memory of 4564 2584 system32.exe 87 PID 2584 wrote to memory of 1672 2584 system32.exe 88 PID 2584 wrote to memory of 1672 2584 system32.exe 88 PID 2584 wrote to memory of 1672 2584 system32.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_435b72cfbf939eb1f32f3d2f528e21c4.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_435b72cfbf939eb1f32f3d2f528e21c4.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\TURKHA~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\TURKHA~1.EXE2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1752
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\system32.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\system32.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\system32.exe
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- System Location Discovery: System Language Discovery
PID:4564 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4564 -s 5045⤵
- Program crash
PID:792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4564 -s 5125⤵
- Program crash
PID:4932
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"4⤵PID:1672
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4564 -ip 45641⤵PID:1584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4564 -ip 45641⤵PID:3936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
592KB
MD5644c285f2b6201f213f4965d47569733
SHA16fef57d8beb24c5c601d6fb64cbd4a692b0461ac
SHA256c37c408ff6bf45957ad8feafcffb36ef6c676756cbf24153f72d9c503d2ad63a
SHA51214022d3be8c6083401332d51c348b1c7675162f98f8db0abcb2553cb8c4d657b8f67ac18c6f3011bddd5d74943b9df692ae70a5de7dffa6f2eabca26de0f4d50
-
Filesize
389KB
MD553d7993497873f49cf664b3b8e2dbfcc
SHA1e470b1c09ac77214bb70c7852ab8f254ee4ac27d
SHA25695e923e9d29f4748efb479e142469d3468290d2e0ea77e3cce84afd22bd7b17f
SHA51250102ddcd36d5482b88a75daf29034f222c97f5227675f51eda619b70fae5f68100300ccbca8c35410ae576c5a756ec7173227f093a38ead7b9cfd155fbbdfbe