Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-02-2025 15:19
Behavioral task
behavioral1
Sample
JaffaCakes118_a0f79b7b8f5bce76f9d6ca94293d7538.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_a0f79b7b8f5bce76f9d6ca94293d7538.exe
-
Size
535KB
-
MD5
a0f79b7b8f5bce76f9d6ca94293d7538
-
SHA1
898f057bfc60817ede94d9664b840486f2385164
-
SHA256
80be7acd19b153b6afc35df2842a55f255b77254915acd16def77b5130087de1
-
SHA512
34aee253d49e53d59f55fc99eb913d8c71afada504b311692f8256612805104fb388d2249a45673fd8a53d2a5bea3ad76def2c0ccd4db464aef75d172ca81896
-
SSDEEP
12288:6GuWm0QRVRdgFkEXIc0pg3xTX2ep3vWQrWKZZo/:Xc7dgadoTXFdeaWM+/
Malware Config
Signatures
-
Detect XtremeRAT payload 4 IoCs
resource yara_rule behavioral1/memory/2192-29-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/600-33-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/2624-34-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/600-36-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{WI0S0J7A-BN72-NO77-52AY-3K5H2N2G8E37}\StubPath = "C:\\Windows\\system32\\InstallDir\\blank.exe" svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{WI0S0J7A-BN72-NO77-52AY-3K5H2N2G8E37} server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{WI0S0J7A-BN72-NO77-52AY-3K5H2N2G8E37}\StubPath = "C:\\Windows\\system32\\InstallDir\\blank.exe restart" server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{WI0S0J7A-BN72-NO77-52AY-3K5H2N2G8E37} svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2624 server.exe -
Loads dropped DLL 4 IoCs
pid Process 2896 JaffaCakes118_a0f79b7b8f5bce76f9d6ca94293d7538.exe 2896 JaffaCakes118_a0f79b7b8f5bce76f9d6ca94293d7538.exe 2896 JaffaCakes118_a0f79b7b8f5bce76f9d6ca94293d7538.exe 2896 JaffaCakes118_a0f79b7b8f5bce76f9d6ca94293d7538.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\InstallDir\\blank.exe" server.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\InstallDir\\blank.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\InstallDir\\blank.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\InstallDir\\blank.exe" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\InstallDir\blank.exe server.exe File opened for modification C:\Windows\SysWOW64\InstallDir\blank.exe server.exe -
resource yara_rule behavioral1/memory/2896-0-0x0000000000400000-0x0000000000596000-memory.dmp upx behavioral1/files/0x0008000000015e48-5.dat upx behavioral1/memory/2896-9-0x0000000003BE0000-0x0000000003BF5000-memory.dmp upx behavioral1/memory/2896-14-0x0000000003BE0000-0x0000000003BF5000-memory.dmp upx behavioral1/memory/2192-29-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/600-33-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/2624-34-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/600-36-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/2896-37-0x0000000000400000-0x0000000000596000-memory.dmp upx behavioral1/memory/2896-38-0x0000000003BE0000-0x0000000003BF0000-memory.dmp upx behavioral1/memory/2896-39-0x0000000000400000-0x0000000000596000-memory.dmp upx behavioral1/memory/2896-40-0x0000000000400000-0x0000000000596000-memory.dmp upx behavioral1/memory/2896-41-0x0000000000400000-0x0000000000596000-memory.dmp upx behavioral1/memory/2896-42-0x0000000000400000-0x0000000000596000-memory.dmp upx behavioral1/memory/2896-43-0x0000000000400000-0x0000000000596000-memory.dmp upx behavioral1/memory/2896-44-0x0000000000400000-0x0000000000596000-memory.dmp upx behavioral1/memory/2896-45-0x0000000000400000-0x0000000000596000-memory.dmp upx behavioral1/memory/2896-46-0x0000000000400000-0x0000000000596000-memory.dmp upx behavioral1/memory/2896-47-0x0000000000400000-0x0000000000596000-memory.dmp upx behavioral1/memory/2896-48-0x0000000000400000-0x0000000000596000-memory.dmp upx behavioral1/memory/2896-49-0x0000000000400000-0x0000000000596000-memory.dmp upx behavioral1/memory/2896-50-0x0000000000400000-0x0000000000596000-memory.dmp upx behavioral1/memory/2896-51-0x0000000000400000-0x0000000000596000-memory.dmp upx behavioral1/memory/2896-52-0x0000000000400000-0x0000000000596000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_a0f79b7b8f5bce76f9d6ca94293d7538.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2896 JaffaCakes118_a0f79b7b8f5bce76f9d6ca94293d7538.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2896 JaffaCakes118_a0f79b7b8f5bce76f9d6ca94293d7538.exe 2896 JaffaCakes118_a0f79b7b8f5bce76f9d6ca94293d7538.exe 600 explorer.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2896 wrote to memory of 2624 2896 JaffaCakes118_a0f79b7b8f5bce76f9d6ca94293d7538.exe 30 PID 2896 wrote to memory of 2624 2896 JaffaCakes118_a0f79b7b8f5bce76f9d6ca94293d7538.exe 30 PID 2896 wrote to memory of 2624 2896 JaffaCakes118_a0f79b7b8f5bce76f9d6ca94293d7538.exe 30 PID 2896 wrote to memory of 2624 2896 JaffaCakes118_a0f79b7b8f5bce76f9d6ca94293d7538.exe 30 PID 2624 wrote to memory of 2192 2624 server.exe 31 PID 2624 wrote to memory of 2192 2624 server.exe 31 PID 2624 wrote to memory of 2192 2624 server.exe 31 PID 2624 wrote to memory of 2192 2624 server.exe 31 PID 2624 wrote to memory of 2192 2624 server.exe 31 PID 2624 wrote to memory of 600 2624 server.exe 32 PID 2624 wrote to memory of 600 2624 server.exe 32 PID 2624 wrote to memory of 600 2624 server.exe 32 PID 2624 wrote to memory of 600 2624 server.exe 32 PID 2624 wrote to memory of 600 2624 server.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a0f79b7b8f5bce76f9d6ca94293d7538.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a0f79b7b8f5bce76f9d6ca94293d7538.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe" cd$2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2192
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:600
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD54903fed7be13b3083b59f19bb3e1c62b
SHA196ddfd8acf0aa41d3cd8224fcd893878e429d4ab
SHA25687162eca70b101610a3aff424bdaee76bd6474898d35fb5a3f69233a88392688
SHA51258c692d20e085f94bff3261578a32796aca73868fae89aeb7975e40ff1ae066179957076c20fa0e2b4f46787c244a8aabbdbe99238ad2a18d967dc586340c16d