Analysis
-
max time kernel
149s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
10-02-2025 19:43
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_deeb2500038e367d8a4baa0ba5b6cdc3.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_deeb2500038e367d8a4baa0ba5b6cdc3.exe
Resource
win10v2004-20250207-en
General
-
Target
JaffaCakes118_deeb2500038e367d8a4baa0ba5b6cdc3.exe
-
Size
683KB
-
MD5
deeb2500038e367d8a4baa0ba5b6cdc3
-
SHA1
6850d425a44bbb770800e1e167daad441a4d229b
-
SHA256
3f6cdddacc5ad8f48bf9afdf228cd7058500f653cbf3466f66e9fca02222d5cc
-
SHA512
ce69c9b00dd0c77e950466addc1fa17ce65645b099c486e2aa354c5b503b889d5016bacefb4d7d57af725d39e50d0928cbf396f95f989b57808dc1bcd6fed85f
-
SSDEEP
12288:Mutrzh9xOXki5l1V2SrwDE8b09uDdLqCNQruBLiqawOLB2fm4Yi5Zpi+ZmLbyMvq:Mutr5OUi5l1V26uA9e8CN0KLiveYuZpX
Malware Config
Extracted
xtremerat
baseeem.no-ip.biz
Signatures
-
Detect XtremeRAT payload 4 IoCs
resource yara_rule behavioral1/memory/3048-40-0x0000000010000000-0x0000000010045000-memory.dmp family_xtremerat behavioral1/memory/3048-43-0x0000000010000000-0x0000000010045000-memory.dmp family_xtremerat behavioral1/memory/3048-42-0x0000000010000000-0x0000000010045000-memory.dmp family_xtremerat behavioral1/memory/2800-49-0x0000000010000000-0x0000000010045000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Executes dropped EXE 3 IoCs
pid Process 1508 2.exe 2908 2.exe 3048 2.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1508 set thread context of 2908 1508 2.exe 30 PID 1508 set thread context of 3048 1508 2.exe 31 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\2.exe JaffaCakes118_deeb2500038e367d8a4baa0ba5b6cdc3.exe File opened for modification C:\Windows\2.exe JaffaCakes118_deeb2500038e367d8a4baa0ba5b6cdc3.exe File created C:\Windows\__tmp_rar_sfx_access_check_259546148 JaffaCakes118_deeb2500038e367d8a4baa0ba5b6cdc3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_deeb2500038e367d8a4baa0ba5b6cdc3.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2908 2.exe 2908 2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1508 2.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 1996 wrote to memory of 1508 1996 JaffaCakes118_deeb2500038e367d8a4baa0ba5b6cdc3.exe 29 PID 1996 wrote to memory of 1508 1996 JaffaCakes118_deeb2500038e367d8a4baa0ba5b6cdc3.exe 29 PID 1996 wrote to memory of 1508 1996 JaffaCakes118_deeb2500038e367d8a4baa0ba5b6cdc3.exe 29 PID 1996 wrote to memory of 1508 1996 JaffaCakes118_deeb2500038e367d8a4baa0ba5b6cdc3.exe 29 PID 1996 wrote to memory of 1508 1996 JaffaCakes118_deeb2500038e367d8a4baa0ba5b6cdc3.exe 29 PID 1996 wrote to memory of 1508 1996 JaffaCakes118_deeb2500038e367d8a4baa0ba5b6cdc3.exe 29 PID 1996 wrote to memory of 1508 1996 JaffaCakes118_deeb2500038e367d8a4baa0ba5b6cdc3.exe 29 PID 1508 wrote to memory of 2908 1508 2.exe 30 PID 1508 wrote to memory of 2908 1508 2.exe 30 PID 1508 wrote to memory of 2908 1508 2.exe 30 PID 1508 wrote to memory of 2908 1508 2.exe 30 PID 1508 wrote to memory of 2908 1508 2.exe 30 PID 1508 wrote to memory of 2908 1508 2.exe 30 PID 1508 wrote to memory of 2908 1508 2.exe 30 PID 1508 wrote to memory of 2908 1508 2.exe 30 PID 2908 wrote to memory of 1244 2908 2.exe 20 PID 2908 wrote to memory of 1244 2908 2.exe 20 PID 2908 wrote to memory of 1244 2908 2.exe 20 PID 2908 wrote to memory of 1244 2908 2.exe 20 PID 1508 wrote to memory of 3048 1508 2.exe 31 PID 1508 wrote to memory of 3048 1508 2.exe 31 PID 1508 wrote to memory of 3048 1508 2.exe 31 PID 1508 wrote to memory of 3048 1508 2.exe 31 PID 1508 wrote to memory of 3048 1508 2.exe 31 PID 1508 wrote to memory of 3048 1508 2.exe 31 PID 1508 wrote to memory of 3048 1508 2.exe 31 PID 1508 wrote to memory of 3048 1508 2.exe 31 PID 1508 wrote to memory of 3048 1508 2.exe 31 PID 1508 wrote to memory of 3048 1508 2.exe 31 PID 1508 wrote to memory of 3048 1508 2.exe 31 PID 1508 wrote to memory of 3048 1508 2.exe 31 PID 1508 wrote to memory of 3048 1508 2.exe 31 PID 1508 wrote to memory of 3048 1508 2.exe 31 PID 3048 wrote to memory of 2800 3048 2.exe 32 PID 3048 wrote to memory of 2800 3048 2.exe 32 PID 3048 wrote to memory of 2800 3048 2.exe 32 PID 3048 wrote to memory of 2800 3048 2.exe 32 PID 3048 wrote to memory of 2800 3048 2.exe 32 PID 3048 wrote to memory of 2712 3048 2.exe 33 PID 3048 wrote to memory of 2712 3048 2.exe 33 PID 3048 wrote to memory of 2712 3048 2.exe 33 PID 3048 wrote to memory of 2712 3048 2.exe 33 PID 3048 wrote to memory of 2712 3048 2.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_deeb2500038e367d8a4baa0ba5b6cdc3.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_deeb2500038e367d8a4baa0ba5b6cdc3.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\WINDOWS\2.exe"C:\WINDOWS\2.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\WINDOWS\2.exe"C:\WINDOWS\2.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2908
-
-
C:\WINDOWS\2.exe"C:\WINDOWS\2.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:2800
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:2712
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5f6fa82dffba7032efe5cdf2e336785df
SHA1426a766ebc0302c9411eae1003afef2d1c8d609b
SHA2566d7c604815b26bf577577eb0e9f3dc04591b06199817a3bf4b5100f22a11ed2c
SHA512aefae1242be62114c7b0561954c7318511e8b6ab133e48b04cdfe406b09caaba0458e02cf51ef277aef864ef84257eeb9d0d9ff69e1e5559d16b42773520a396