Analysis
-
max time kernel
146s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
03-02-2025 21:30
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8cc3b26117629a5641e9c4667fb07c03.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8cc3b26117629a5641e9c4667fb07c03.exe
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_8cc3b26117629a5641e9c4667fb07c03.exe
-
Size
272KB
-
MD5
8cc3b26117629a5641e9c4667fb07c03
-
SHA1
c45997887663bec504f5349ad56fa7b0a1dfdb57
-
SHA256
570e6d60f5a8ce2ff57d6f7ed19f810571ba012aa0c8c3f595b038548afcce14
-
SHA512
caf2b8c67a39f7032493f656df6b61b47aadd9d13b986197806dff351e9fbddb52131c9d65ca0155b2150c1216c4daf857ec4f9ef2210c03eb0967af8ba8afe0
-
SSDEEP
6144:MijYe4VGbYuIo0B+38EcdOEavzbToU7OYQY7GhsGplVyQIh:Mw4VrnZddWfOYTST/VyN
Malware Config
Signatures
-
Detect XtremeRAT payload 9 IoCs
resource yara_rule behavioral1/memory/2164-43-0x0000000000C80000-0x0000000000C92000-memory.dmp family_xtremerat behavioral1/memory/2164-46-0x0000000000C80000-0x0000000000C92000-memory.dmp family_xtremerat behavioral1/memory/2164-41-0x0000000000C80000-0x0000000000C92000-memory.dmp family_xtremerat behavioral1/memory/2164-39-0x0000000000C80000-0x0000000000C92000-memory.dmp family_xtremerat behavioral1/memory/2164-36-0x0000000000C80000-0x0000000000C92000-memory.dmp family_xtremerat behavioral1/memory/2164-34-0x0000000000C80000-0x0000000000C92000-memory.dmp family_xtremerat behavioral1/memory/2164-49-0x0000000000C80000-0x0000000000C92000-memory.dmp family_xtremerat behavioral1/memory/2692-58-0x0000000000C80000-0x0000000000C92000-memory.dmp family_xtremerat behavioral1/memory/2692-62-0x0000000000C80000-0x0000000000C92000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} jpgg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Program Files (x86)\\imagem\\root.exe restart" jpgg.exe -
Executes dropped EXE 3 IoCs
pid Process 2072 11.exe 2372 jpgg.exe 2164 jpgg.exe -
Loads dropped DLL 4 IoCs
pid Process 2480 JaffaCakes118_8cc3b26117629a5641e9c4667fb07c03.exe 2072 11.exe 2072 11.exe 2372 jpgg.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Program Files (x86)\\imagem\\root.exe" jpgg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Program Files (x86)\\imagem\\root.exe" jpgg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2372 set thread context of 2164 2372 jpgg.exe 32 -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\imagem\root.exe jpgg.exe File created C:\Program Files (x86)\imagem\root.exe jpgg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8cc3b26117629a5641e9c4667fb07c03.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpgg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpgg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language calc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2372 jpgg.exe 2692 calc.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2072 2480 JaffaCakes118_8cc3b26117629a5641e9c4667fb07c03.exe 30 PID 2480 wrote to memory of 2072 2480 JaffaCakes118_8cc3b26117629a5641e9c4667fb07c03.exe 30 PID 2480 wrote to memory of 2072 2480 JaffaCakes118_8cc3b26117629a5641e9c4667fb07c03.exe 30 PID 2480 wrote to memory of 2072 2480 JaffaCakes118_8cc3b26117629a5641e9c4667fb07c03.exe 30 PID 2072 wrote to memory of 2372 2072 11.exe 31 PID 2072 wrote to memory of 2372 2072 11.exe 31 PID 2072 wrote to memory of 2372 2072 11.exe 31 PID 2072 wrote to memory of 2372 2072 11.exe 31 PID 2372 wrote to memory of 2164 2372 jpgg.exe 32 PID 2372 wrote to memory of 2164 2372 jpgg.exe 32 PID 2372 wrote to memory of 2164 2372 jpgg.exe 32 PID 2372 wrote to memory of 2164 2372 jpgg.exe 32 PID 2372 wrote to memory of 2164 2372 jpgg.exe 32 PID 2372 wrote to memory of 2164 2372 jpgg.exe 32 PID 2372 wrote to memory of 2164 2372 jpgg.exe 32 PID 2372 wrote to memory of 2164 2372 jpgg.exe 32 PID 2372 wrote to memory of 2164 2372 jpgg.exe 32 PID 2372 wrote to memory of 2164 2372 jpgg.exe 32 PID 2372 wrote to memory of 2164 2372 jpgg.exe 32 PID 2372 wrote to memory of 2164 2372 jpgg.exe 32 PID 2164 wrote to memory of 2692 2164 jpgg.exe 33 PID 2164 wrote to memory of 2692 2164 jpgg.exe 33 PID 2164 wrote to memory of 2692 2164 jpgg.exe 33 PID 2164 wrote to memory of 2692 2164 jpgg.exe 33 PID 2164 wrote to memory of 2692 2164 jpgg.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8cc3b26117629a5641e9c4667fb07c03.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8cc3b26117629a5641e9c4667fb07c03.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\11.exe"C:\Users\Admin\AppData\Local\Temp\11.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\jpgg.exe"C:\Users\Admin\AppData\Local\Temp\jpgg.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\jpgg.exeC:\Users\Admin\AppData\Local\Temp\jpgg.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\calc.execalc.exe5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2692
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD5937ca1e47a3b26c535e9590189ed6ba4
SHA1271e8d46a5ad42a174c545375acc28470a12c469
SHA25680e13874dac35cfaf935ff64705c90cfb8f92e0474a5b13041862d88746531c6
SHA512947349b1bbd86b55b563a314e5fb823dc42eb0eb972db5330c1d3bd1607f0f2e1108673ad83723e1e179a4ab821b8609aada3a390494b4c5f46178e95b53298a
-
Filesize
216KB
MD555baef9d701bec9a2c44cccd7ce1333d
SHA14935ebd06b5e26fb5e7bac8c74ada12e03d7a6ac
SHA256c812954b2900388eb929892a63329a23fbdfe28809b4c5cbc6f4c26ffcfa9325
SHA512af4e330b0f1ceb6bc211766574fef677ed8836c171f759bfd134afca010417c9e8fe46b66a34a9890a87f765660702ddb02a15861afd29a00010ee72c4718533