Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
08-02-2025 04:13
Behavioral task
behavioral1
Sample
JaffaCakes118_bede504f34a28906459bb40b346a512c.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_bede504f34a28906459bb40b346a512c.exe
-
Size
2.0MB
-
MD5
bede504f34a28906459bb40b346a512c
-
SHA1
414431aa97798a7365008c720fbb9cc088e692b0
-
SHA256
72385796e68f246015c4204f3751ef4e8c4d8bb636fd7eeb16d4807f9d68b59f
-
SHA512
f571970313b0912c032cfb9a6b804cdbd75af540ac8562d25a6cc8085ac6f93fd7d42613ccaf99c4351a62cf74601c5e9b7bacc5f73d969c3bdf93f1b8f9445f
-
SSDEEP
49152:2SV3+XvHQ5LbvZMBalN7VBwQhnmCTtJ8Sv2LyFPXd3m:2SBSQ5Lbecl7wy/vJFPZm
Malware Config
Signatures
-
Detect XtremeRAT payload 6 IoCs
resource yara_rule behavioral2/memory/3956-30-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral2/memory/3956-31-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral2/memory/3956-48-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral2/memory/2188-54-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral2/memory/3884-60-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral2/memory/3884-64-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} final.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Program Files (x86)\\InstallDir\\smss.exe restart" final.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Program Files (x86)\\InstallDir\\smss.exe restart" smss.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 30 3644 Process not Found -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3591594829-2464889670-1367169939-1000\Control Panel\International\Geo\Nation final.exe -
Executes dropped EXE 6 IoCs
pid Process 2764 final.exe 228 Asrar_3.exe 3956 final.exe 2492 smss.exe 2188 smss.exe 3884 smss.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Program Files (x86)\\InstallDir\\smss.exe" final.exe Set value (str) \REGISTRY\USER\S-1-5-21-3591594829-2464889670-1367169939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Program Files (x86)\\InstallDir\\smss.exe" final.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Program Files (x86)\\InstallDir\\smss.exe" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3591594829-2464889670-1367169939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Program Files (x86)\\InstallDir\\smss.exe" smss.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/3120-21-0x0000000000400000-0x00000000004B5000-memory.dmp autoit_exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\server.exe.mbxcfg final.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2764 set thread context of 3956 2764 final.exe 87 PID 2492 set thread context of 2188 2492 smss.exe 97 -
resource yara_rule behavioral2/memory/3120-0-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/3120-21-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/3956-26-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral2/memory/3956-29-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral2/memory/3956-30-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral2/memory/3956-31-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral2/memory/3956-48-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral2/memory/2188-54-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral2/memory/2188-53-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral2/memory/3884-60-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral2/memory/3884-64-0x0000000000C80000-0x0000000000C95000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\InstallDir\smss.exe final.exe File created C:\Program Files (x86)\InstallDir\smss.exe final.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Asrar_3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language final.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_bede504f34a28906459bb40b346a512c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language final.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2156 MicrosoftEdgeUpdate.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Asrar_3.exe Key created \REGISTRY\USER\S-1-5-21-3591594829-2464889670-1367169939-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Asrar_3.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3956 final.exe 3956 final.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 228 Asrar_3.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2764 final.exe 228 Asrar_3.exe 2492 smss.exe 3884 smss.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 3120 wrote to memory of 2764 3120 JaffaCakes118_bede504f34a28906459bb40b346a512c.exe 85 PID 3120 wrote to memory of 2764 3120 JaffaCakes118_bede504f34a28906459bb40b346a512c.exe 85 PID 3120 wrote to memory of 2764 3120 JaffaCakes118_bede504f34a28906459bb40b346a512c.exe 85 PID 3120 wrote to memory of 228 3120 JaffaCakes118_bede504f34a28906459bb40b346a512c.exe 86 PID 3120 wrote to memory of 228 3120 JaffaCakes118_bede504f34a28906459bb40b346a512c.exe 86 PID 3120 wrote to memory of 228 3120 JaffaCakes118_bede504f34a28906459bb40b346a512c.exe 86 PID 2764 wrote to memory of 3956 2764 final.exe 87 PID 2764 wrote to memory of 3956 2764 final.exe 87 PID 2764 wrote to memory of 3956 2764 final.exe 87 PID 2764 wrote to memory of 3956 2764 final.exe 87 PID 2764 wrote to memory of 3956 2764 final.exe 87 PID 2764 wrote to memory of 3956 2764 final.exe 87 PID 2764 wrote to memory of 3956 2764 final.exe 87 PID 2764 wrote to memory of 3956 2764 final.exe 87 PID 3956 wrote to memory of 4924 3956 final.exe 88 PID 3956 wrote to memory of 4924 3956 final.exe 88 PID 3956 wrote to memory of 4924 3956 final.exe 88 PID 3956 wrote to memory of 4220 3956 final.exe 89 PID 3956 wrote to memory of 4220 3956 final.exe 89 PID 3956 wrote to memory of 4220 3956 final.exe 89 PID 3956 wrote to memory of 5104 3956 final.exe 90 PID 3956 wrote to memory of 5104 3956 final.exe 90 PID 3956 wrote to memory of 5104 3956 final.exe 90 PID 3956 wrote to memory of 2296 3956 final.exe 91 PID 3956 wrote to memory of 2296 3956 final.exe 91 PID 3956 wrote to memory of 2296 3956 final.exe 91 PID 3956 wrote to memory of 4748 3956 final.exe 92 PID 3956 wrote to memory of 4748 3956 final.exe 92 PID 3956 wrote to memory of 4748 3956 final.exe 92 PID 3956 wrote to memory of 2748 3956 final.exe 93 PID 3956 wrote to memory of 2748 3956 final.exe 93 PID 3956 wrote to memory of 2748 3956 final.exe 93 PID 3956 wrote to memory of 3720 3956 final.exe 94 PID 3956 wrote to memory of 3720 3956 final.exe 94 PID 3956 wrote to memory of 3720 3956 final.exe 94 PID 3956 wrote to memory of 4500 3956 final.exe 95 PID 3956 wrote to memory of 4500 3956 final.exe 95 PID 3956 wrote to memory of 2492 3956 final.exe 96 PID 3956 wrote to memory of 2492 3956 final.exe 96 PID 3956 wrote to memory of 2492 3956 final.exe 96 PID 2492 wrote to memory of 2188 2492 smss.exe 97 PID 2492 wrote to memory of 2188 2492 smss.exe 97 PID 2492 wrote to memory of 2188 2492 smss.exe 97 PID 2492 wrote to memory of 2188 2492 smss.exe 97 PID 2492 wrote to memory of 2188 2492 smss.exe 97 PID 2492 wrote to memory of 2188 2492 smss.exe 97 PID 2492 wrote to memory of 2188 2492 smss.exe 97 PID 2492 wrote to memory of 2188 2492 smss.exe 97 PID 2188 wrote to memory of 3884 2188 smss.exe 98 PID 2188 wrote to memory of 3884 2188 smss.exe 98 PID 2188 wrote to memory of 3884 2188 smss.exe 98 PID 2188 wrote to memory of 3884 2188 smss.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bede504f34a28906459bb40b346a512c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bede504f34a28906459bb40b346a512c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\final.exeC:\Users\Admin\AppData\Local\Temp/final.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\final.exeC:\Users\Admin\AppData\Local\Temp\final.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"4⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"4⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"4⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"4⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"4⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"4⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"4⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"4⤵PID:4500
-
-
C:\Program Files (x86)\InstallDir\smss.exe"C:\Program Files (x86)\InstallDir\smss.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Program Files (x86)\InstallDir\smss.exe"C:\Program Files (x86)\InstallDir\smss.exe"5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\InstallDir\smss.exesmss.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3884
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Asrar_3.exeC:\Users\Admin\AppData\Local\Temp/Asrar_3.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:228
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIzIiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU1NzgiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODAxNjUyMzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MzUzMzgxNDQ2Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2156
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.7MB
MD5b9a1bf137aecbd36e234fa08bb4ac69b
SHA1b24b2d9159dfbd3eb28993cd6bbb2fe05e4d2d8a
SHA25615738d22ac6eacf1f54cc155bde72d368f81ab2525dd2f64733a36e31d8b137e
SHA512e08168999544934683600846b8ae0785dad4f1a9ac46e2e0416980930fff08614bca184fe6430314a752d106bcc0f98692a2237a3b3e4a9f26d839b0f9536e10
-
Filesize
592KB
MD5adfb50bb910167bc3cfe04400718ca08
SHA1844f0684b40cd79a910333151783392bb69b717d
SHA25627ef002d724edd175c32649a4335ca5a26b12eb221ad846ee300e933060925f5
SHA512644daf1c23286370ebe2c525d4647114f92e4f26e837ea053fc33da1deb2b9e9c0b161dea13fef416ea5d02ebe1cd294c56f0933d2d41918fa1479656539ec28
-
Filesize
1KB
MD5f84414c79d8f4143afda296aaaa9ea42
SHA1d1414e5cc8e189be1f0f9e2161fb56ad0d6af777
SHA256ef3b627ae9b0b7598b28ea2236883b7aef88be90ffddab8950a4b10dd4ebbc99
SHA5122f6e8d065c064a14f0a36dda55e76547bd5830275fc45777bf3b7630f9df26bc8fbc1a2829c7525fd2b12c1f66972f673bcb47734ea0a165c33efff50c56bec5
-
Filesize
297B
MD54eabb8b873346f1d44e52285c1535857
SHA1c9f9502717e53d7964fc69bdae56c835c0165d09
SHA2560524dbbcbc9c74560be985af54d7b3330b49bd919f68fa0e923b773b2037f90a
SHA512bd3c7ea4ea3ff51c4730aba573880a3779c0d9b46247d4605f9c9b3351fb81204054bf97d37f3e5db5ce6b15833ef5937418493db3188d19c9368ed4f84ec713