Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    08-02-2025 16:06

General

  • Target

    JaffaCakes118_c4d68b8c618bfad2459943e06f1f177c.exe

  • Size

    647KB

  • MD5

    c4d68b8c618bfad2459943e06f1f177c

  • SHA1

    617ebff247f2e94f6ad3121e431cadf546cd3af6

  • SHA256

    a45fd35b5abaa6f5336e7be70633ad6835b9010260c7da463d196279866ddd9b

  • SHA512

    a032c036b40a4b9db2313ffc71a41d064f07569de87a7798c3bf9fdc85236b8a611354be0b4f60c63171b5e0aa06202648d9137b3cc2759dc3c8478c0bb69eb5

  • SSDEEP

    12288:dc2zkJ/kM/0PNyPWUCK/lGRgOUqmq9kR6lhKXLvRBF8eYF83r8:dc2A5s1K/cRgOnmq9g6m3F8eYC78

Malware Config

Extracted

Family

xtremerat

C2

surrogates7.no-ip.org

Signatures

  • Detect XtremeRAT payload 10 IoCs
  • XtremeRAT

    The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

  • Xtremerat family
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c4d68b8c618bfad2459943e06f1f177c.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c4d68b8c618bfad2459943e06f1f177c.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2872
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c4d68b8c618bfad2459943e06f1f177c.exe
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c4d68b8c618bfad2459943e06f1f177c.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2904
      • C:\Windows\SysWOW64\svchost.exe
        svchost.exe
        3⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:2884
      • C:\Windows\SysWOW64\explorer.exe
        explorer.exe
        3⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Deletes itself
        • Adds Run key to start application
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\InstallDir\svchost.exe

    Filesize

    647KB

    MD5

    c4d68b8c618bfad2459943e06f1f177c

    SHA1

    617ebff247f2e94f6ad3121e431cadf546cd3af6

    SHA256

    a45fd35b5abaa6f5336e7be70633ad6835b9010260c7da463d196279866ddd9b

    SHA512

    a032c036b40a4b9db2313ffc71a41d064f07569de87a7798c3bf9fdc85236b8a611354be0b4f60c63171b5e0aa06202648d9137b3cc2759dc3c8478c0bb69eb5

  • memory/2712-46-0x0000000010000000-0x000000001004A000-memory.dmp

    Filesize

    296KB

  • memory/2712-48-0x0000000010000000-0x000000001004A000-memory.dmp

    Filesize

    296KB

  • memory/2872-16-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2872-6-0x0000000002510000-0x0000000002511000-memory.dmp

    Filesize

    4KB

  • memory/2872-3-0x00000000024F0000-0x00000000024F1000-memory.dmp

    Filesize

    4KB

  • memory/2872-11-0x0000000003610000-0x0000000003611000-memory.dmp

    Filesize

    4KB

  • memory/2872-14-0x0000000003610000-0x0000000003611000-memory.dmp

    Filesize

    4KB

  • memory/2872-13-0x0000000003610000-0x0000000003611000-memory.dmp

    Filesize

    4KB

  • memory/2872-12-0x0000000003610000-0x0000000003611000-memory.dmp

    Filesize

    4KB

  • memory/2872-10-0x00000000035C0000-0x00000000035C3000-memory.dmp

    Filesize

    12KB

  • memory/2872-9-0x00000000035D0000-0x00000000035D1000-memory.dmp

    Filesize

    4KB

  • memory/2872-8-0x0000000002550000-0x0000000002551000-memory.dmp

    Filesize

    4KB

  • memory/2872-7-0x00000000024D0000-0x00000000024D1000-memory.dmp

    Filesize

    4KB

  • memory/2872-17-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2872-18-0x00000000035E0000-0x00000000035E1000-memory.dmp

    Filesize

    4KB

  • memory/2872-0-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2872-1-0x0000000000380000-0x00000000003E0000-memory.dmp

    Filesize

    384KB

  • memory/2872-4-0x00000000024E0000-0x00000000024E1000-memory.dmp

    Filesize

    4KB

  • memory/2872-5-0x0000000002540000-0x0000000002541000-memory.dmp

    Filesize

    4KB

  • memory/2872-39-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2872-40-0x0000000000380000-0x00000000003E0000-memory.dmp

    Filesize

    384KB

  • memory/2884-43-0x0000000010000000-0x000000001004A000-memory.dmp

    Filesize

    296KB

  • memory/2904-33-0x0000000010000000-0x000000001004A000-memory.dmp

    Filesize

    296KB

  • memory/2904-29-0x0000000010000000-0x000000001004A000-memory.dmp

    Filesize

    296KB

  • memory/2904-27-0x0000000010000000-0x000000001004A000-memory.dmp

    Filesize

    296KB

  • memory/2904-24-0x0000000010000000-0x000000001004A000-memory.dmp

    Filesize

    296KB

  • memory/2904-21-0x0000000010000000-0x000000001004A000-memory.dmp

    Filesize

    296KB

  • memory/2904-35-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2904-36-0x0000000010000000-0x000000001004A000-memory.dmp

    Filesize

    296KB

  • memory/2904-37-0x0000000010000000-0x000000001004A000-memory.dmp

    Filesize

    296KB

  • memory/2904-31-0x0000000010000000-0x000000001004A000-memory.dmp

    Filesize

    296KB

  • memory/2904-25-0x0000000010000000-0x000000001004A000-memory.dmp

    Filesize

    296KB