Analysis

  • max time kernel
    150s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-02-2025 04:33

General

  • Target

    JaffaCakes118_a7522dc42b76f61883564549343933a5.exe

  • Size

    226KB

  • MD5

    a7522dc42b76f61883564549343933a5

  • SHA1

    e88bfb65b7a1436670834958e2e034368ba1e499

  • SHA256

    7fce756c9892c833c77140ca318cfdc5e53aac47f22e32e17a7355ac8b3c7a41

  • SHA512

    1f42bbd6d59b6540fa0096aa83393264c8ee7c4492a971e06eb29166a6aa7397e35920f7ec55ea3f7a7f283637811922ddaf74d970858e111799e6df58ecde6b

  • SSDEEP

    6144:UOy2YCh2Lsj520BIQzTpJw7GQwdKX5w+OGhLeUGC9UEBGMw:UOy2YUusU2JzTk7N/XWzGd5t

Malware Config

Signatures

  • XtremeRAT

    The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

  • Xtremerat family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a7522dc42b76f61883564549343933a5.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a7522dc42b76f61883564549343933a5.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2272
    • C:\Users\Admin\AppData\Local\Xenocode\ApplianceCaches\Morph_01.09.2011_203056.exe_v35447B84\TheApp\STUBEXE\@APPDATALOCAL@\Temp\Morph_01.09.2011_203056.exe
      "C:\Users\Admin\AppData\Local\Temp\Morph_01.09.2011_203056.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1136
      • C:\Windows\SysWOW64\svchost.exe
        svchost.exe
        3⤵
        • System Location Discovery: System Language Discovery
        PID:548
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        3⤵
          PID:1084

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Local\Xenocode\ApplianceCaches\Morph_01.09.2011_203056.exe_v35447B84\TheApp\STUBEXE\@APPDATALOCAL@\Temp\Morph_01.09.2011_203056.exe

      Filesize

      16KB

      MD5

      20720c0ec4c367ccf700f088f1565df1

      SHA1

      73991685537120b648d602aac6b4874b5625daf0

      SHA256

      f27abb0dca90a9e403d4fab3148f6dc5bfdb4217893e96b2dea0953df31a2b10

      SHA512

      48609af85c6afdfc0a15997079475c7fbc82f92bfadd5159ee38e83475312daa1e72459fa2f2733bd1257af5627c4faf39d0cf856f740c15f0b8f5a419be2681

    • memory/2272-246-0x0000000000460000-0x00000000004B2000-memory.dmp

      Filesize

      328KB

    • memory/2272-36-0x0000000000460000-0x00000000004B2000-memory.dmp

      Filesize

      328KB

    • memory/2272-12-0x0000000000460000-0x00000000004B2000-memory.dmp

      Filesize

      328KB

    • memory/2272-10-0x0000000000460000-0x00000000004B2000-memory.dmp

      Filesize

      328KB

    • memory/2272-8-0x0000000000460000-0x00000000004B2000-memory.dmp

      Filesize

      328KB

    • memory/2272-2-0x0000000000460000-0x00000000004B2000-memory.dmp

      Filesize

      328KB

    • memory/2272-16-0x0000000000460000-0x00000000004B2000-memory.dmp

      Filesize

      328KB

    • memory/2272-1-0x0000000000460000-0x00000000004B2000-memory.dmp

      Filesize

      328KB

    • memory/2272-22-0x0000000000460000-0x00000000004B2000-memory.dmp

      Filesize

      328KB

    • memory/2272-24-0x0000000000460000-0x00000000004B2000-memory.dmp

      Filesize

      328KB

    • memory/2272-44-0x0000000000460000-0x00000000004B2000-memory.dmp

      Filesize

      328KB

    • memory/2272-52-0x0000000000460000-0x00000000004B2000-memory.dmp

      Filesize

      328KB

    • memory/2272-66-0x0000000000460000-0x00000000004B2000-memory.dmp

      Filesize

      328KB

    • memory/2272-163-0x0000000000460000-0x00000000004B2000-memory.dmp

      Filesize

      328KB

    • memory/2272-194-0x0000000000460000-0x00000000004B2000-memory.dmp

      Filesize

      328KB

    • memory/2272-14-0x0000000000460000-0x00000000004B2000-memory.dmp

      Filesize

      328KB

    • memory/2272-20-0x0000000000460000-0x00000000004B2000-memory.dmp

      Filesize

      328KB

    • memory/2272-18-0x0000000000460000-0x00000000004B2000-memory.dmp

      Filesize

      328KB

    • memory/2272-26-0x0000000000460000-0x00000000004B2000-memory.dmp

      Filesize

      328KB

    • memory/2272-34-0x0000000000460000-0x00000000004B2000-memory.dmp

      Filesize

      328KB

    • memory/2272-45-0x0000000077D60000-0x0000000077D61000-memory.dmp

      Filesize

      4KB

    • memory/2272-195-0x0000000000460000-0x00000000004B2000-memory.dmp

      Filesize

      328KB

    • memory/2272-6-0x0000000000460000-0x00000000004B2000-memory.dmp

      Filesize

      328KB

    • memory/2272-4-0x0000000000460000-0x00000000004B2000-memory.dmp

      Filesize

      328KB

    • memory/2272-180-0x0000000000460000-0x00000000004B2000-memory.dmp

      Filesize

      328KB

    • memory/2272-217-0x0000000000460000-0x00000000004B2000-memory.dmp

      Filesize

      328KB

    • memory/2272-191-0x0000000077D60000-0x0000000077D61000-memory.dmp

      Filesize

      4KB

    • memory/2272-232-0x0000000000460000-0x00000000004B2000-memory.dmp

      Filesize

      328KB

    • memory/2272-177-0x0000000000460000-0x00000000004B2000-memory.dmp

      Filesize

      328KB

    • memory/2272-165-0x0000000000460000-0x00000000004B2000-memory.dmp

      Filesize

      328KB

    • memory/2272-64-0x0000000000460000-0x00000000004B2000-memory.dmp

      Filesize

      328KB

    • memory/2272-62-0x0000000000460000-0x00000000004B2000-memory.dmp

      Filesize

      328KB

    • memory/2272-60-0x0000000000460000-0x00000000004B2000-memory.dmp

      Filesize

      328KB

    • memory/2272-58-0x0000000000460000-0x00000000004B2000-memory.dmp

      Filesize

      328KB

    • memory/2272-56-0x0000000000460000-0x00000000004B2000-memory.dmp

      Filesize

      328KB

    • memory/2272-54-0x0000000000460000-0x00000000004B2000-memory.dmp

      Filesize

      328KB

    • memory/2272-50-0x0000000000460000-0x00000000004B2000-memory.dmp

      Filesize

      328KB

    • memory/2272-48-0x0000000000460000-0x00000000004B2000-memory.dmp

      Filesize

      328KB

    • memory/2272-46-0x0000000000460000-0x00000000004B2000-memory.dmp

      Filesize

      328KB

    • memory/2272-40-0x0000000000460000-0x00000000004B2000-memory.dmp

      Filesize

      328KB

    • memory/2272-38-0x0000000000460000-0x00000000004B2000-memory.dmp

      Filesize

      328KB

    • memory/2272-0-0x0000000000460000-0x00000000004B2000-memory.dmp

      Filesize

      328KB

    • memory/2272-32-0x0000000000460000-0x00000000004B2000-memory.dmp

      Filesize

      328KB

    • memory/2272-30-0x0000000000460000-0x00000000004B2000-memory.dmp

      Filesize

      328KB

    • memory/2272-28-0x0000000000460000-0x00000000004B2000-memory.dmp

      Filesize

      328KB

    • memory/2272-250-0x0000000000460000-0x00000000004B2000-memory.dmp

      Filesize

      328KB

    • memory/2272-268-0x0000000000460000-0x00000000004B2000-memory.dmp

      Filesize

      328KB