Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-02-2025 05:09
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_902d76af3d87637270a79b109f6f74c2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_902d76af3d87637270a79b109f6f74c2.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_902d76af3d87637270a79b109f6f74c2.exe
-
Size
129KB
-
MD5
902d76af3d87637270a79b109f6f74c2
-
SHA1
0d9c98f1652a0e10155cc7e6fd26a825de549871
-
SHA256
b8af7d26e306e76d81fc6fd153a961088f79b18f33b92931d7ddb33939f66bce
-
SHA512
1095c8cf7d43cf13035a1a34dce0f78401f8c14e1306463253afa1a2238a48816b9520c2db2042b8d6099888bb586646132cccdea0dfee68cad0ddb6913935c5
-
SSDEEP
3072:xmzpIq1STxz/V+WUIWCnbhgw95wGG2hS+lA1:IpF1STp0vCnbhgws7Ke1
Malware Config
Extracted
xtremerat
guillaume50130.no-ip.org
Signatures
-
Detect XtremeRAT payload 5 IoCs
resource yara_rule behavioral1/memory/2736-2-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/2736-3-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/2736-4-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/2736-5-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/2736-6-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2860 set thread context of 2736 2860 JaffaCakes118_902d76af3d87637270a79b109f6f74c2.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_902d76af3d87637270a79b109f6f74c2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_902d76af3d87637270a79b109f6f74c2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2860 JaffaCakes118_902d76af3d87637270a79b109f6f74c2.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2736 2860 JaffaCakes118_902d76af3d87637270a79b109f6f74c2.exe 30 PID 2860 wrote to memory of 2736 2860 JaffaCakes118_902d76af3d87637270a79b109f6f74c2.exe 30 PID 2860 wrote to memory of 2736 2860 JaffaCakes118_902d76af3d87637270a79b109f6f74c2.exe 30 PID 2860 wrote to memory of 2736 2860 JaffaCakes118_902d76af3d87637270a79b109f6f74c2.exe 30 PID 2860 wrote to memory of 2736 2860 JaffaCakes118_902d76af3d87637270a79b109f6f74c2.exe 30 PID 2860 wrote to memory of 2736 2860 JaffaCakes118_902d76af3d87637270a79b109f6f74c2.exe 30 PID 2860 wrote to memory of 2736 2860 JaffaCakes118_902d76af3d87637270a79b109f6f74c2.exe 30 PID 2860 wrote to memory of 2736 2860 JaffaCakes118_902d76af3d87637270a79b109f6f74c2.exe 30 PID 2860 wrote to memory of 2736 2860 JaffaCakes118_902d76af3d87637270a79b109f6f74c2.exe 30 PID 2860 wrote to memory of 2736 2860 JaffaCakes118_902d76af3d87637270a79b109f6f74c2.exe 30 PID 2860 wrote to memory of 2736 2860 JaffaCakes118_902d76af3d87637270a79b109f6f74c2.exe 30 PID 2860 wrote to memory of 2736 2860 JaffaCakes118_902d76af3d87637270a79b109f6f74c2.exe 30 PID 2860 wrote to memory of 2736 2860 JaffaCakes118_902d76af3d87637270a79b109f6f74c2.exe 30 PID 2860 wrote to memory of 2736 2860 JaffaCakes118_902d76af3d87637270a79b109f6f74c2.exe 30 PID 2736 wrote to memory of 2708 2736 JaffaCakes118_902d76af3d87637270a79b109f6f74c2.exe 31 PID 2736 wrote to memory of 2708 2736 JaffaCakes118_902d76af3d87637270a79b109f6f74c2.exe 31 PID 2736 wrote to memory of 2708 2736 JaffaCakes118_902d76af3d87637270a79b109f6f74c2.exe 31 PID 2736 wrote to memory of 2708 2736 JaffaCakes118_902d76af3d87637270a79b109f6f74c2.exe 31 PID 2736 wrote to memory of 2708 2736 JaffaCakes118_902d76af3d87637270a79b109f6f74c2.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_902d76af3d87637270a79b109f6f74c2.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_902d76af3d87637270a79b109f6f74c2.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_902d76af3d87637270a79b109f6f74c2.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_902d76af3d87637270a79b109f6f74c2.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2708
-
-