Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/02/2025, 08:52
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e49fa59b2facb42650cf29c60d653990.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_e49fa59b2facb42650cf29c60d653990.exe
-
Size
1.4MB
-
MD5
e49fa59b2facb42650cf29c60d653990
-
SHA1
4d1bfbae0b3c5047c40be4fed63a4218bbf480d6
-
SHA256
e25d2f5f09c95ea6c0dd5e5db8be55dac4bf913f87e4ac1ab8ce863027432ce1
-
SHA512
b7ddeea87fdc218d8c1765be9b34c9399f120d6f6df46b39af887c25cbde894a17952156282d08aabaa842094ddc7f0aeee91f2bf4e6632a89ad2e85a7b5b62b
-
SSDEEP
24576:7xRRtXc2uqRePccDXfZak5hSg0f6AsEwmHfy5yWgjT3NvIrf1ajRumgTaI2:rz6uaDRN5hSg0f6AxwmHf2gjT3Bi1ajh
Malware Config
Extracted
xtremerat
stoya.no-ip.biz
Signatures
-
Detect XtremeRAT payload 4 IoCs
resource yara_rule behavioral1/memory/2696-28-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral1/memory/1440-37-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral1/memory/2696-45-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral1/memory/2696-39-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Executes dropped EXE 3 IoCs
pid Process 2716 osmnl.exe 2696 osmnl.exe 2756 Launcher.exe -
Loads dropped DLL 7 IoCs
pid Process 2664 JaffaCakes118_e49fa59b2facb42650cf29c60d653990.exe 2664 JaffaCakes118_e49fa59b2facb42650cf29c60d653990.exe 2716 osmnl.exe 2716 osmnl.exe 2696 osmnl.exe 2664 JaffaCakes118_e49fa59b2facb42650cf29c60d653990.exe 2756 Launcher.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" JaffaCakes118_e49fa59b2facb42650cf29c60d653990.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2716 osmnl.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2716 set thread context of 2696 2716 osmnl.exe 31 -
resource yara_rule behavioral1/memory/2696-21-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/2696-28-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/2696-27-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/2696-24-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/1440-37-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/2696-45-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/2696-39-0x0000000010000000-0x000000001004D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language osmnl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Launcher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_e49fa59b2facb42650cf29c60d653990.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language osmnl.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2716 osmnl.exe 2716 osmnl.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2716 2664 JaffaCakes118_e49fa59b2facb42650cf29c60d653990.exe 30 PID 2664 wrote to memory of 2716 2664 JaffaCakes118_e49fa59b2facb42650cf29c60d653990.exe 30 PID 2664 wrote to memory of 2716 2664 JaffaCakes118_e49fa59b2facb42650cf29c60d653990.exe 30 PID 2664 wrote to memory of 2716 2664 JaffaCakes118_e49fa59b2facb42650cf29c60d653990.exe 30 PID 2664 wrote to memory of 2716 2664 JaffaCakes118_e49fa59b2facb42650cf29c60d653990.exe 30 PID 2664 wrote to memory of 2716 2664 JaffaCakes118_e49fa59b2facb42650cf29c60d653990.exe 30 PID 2664 wrote to memory of 2716 2664 JaffaCakes118_e49fa59b2facb42650cf29c60d653990.exe 30 PID 2716 wrote to memory of 2696 2716 osmnl.exe 31 PID 2716 wrote to memory of 2696 2716 osmnl.exe 31 PID 2716 wrote to memory of 2696 2716 osmnl.exe 31 PID 2716 wrote to memory of 2696 2716 osmnl.exe 31 PID 2716 wrote to memory of 2696 2716 osmnl.exe 31 PID 2716 wrote to memory of 2696 2716 osmnl.exe 31 PID 2716 wrote to memory of 2696 2716 osmnl.exe 31 PID 2716 wrote to memory of 2696 2716 osmnl.exe 31 PID 2716 wrote to memory of 2696 2716 osmnl.exe 31 PID 2716 wrote to memory of 2696 2716 osmnl.exe 31 PID 2716 wrote to memory of 2696 2716 osmnl.exe 31 PID 2716 wrote to memory of 2696 2716 osmnl.exe 31 PID 2696 wrote to memory of 1440 2696 osmnl.exe 32 PID 2696 wrote to memory of 1440 2696 osmnl.exe 32 PID 2696 wrote to memory of 1440 2696 osmnl.exe 32 PID 2696 wrote to memory of 1440 2696 osmnl.exe 32 PID 2696 wrote to memory of 1440 2696 osmnl.exe 32 PID 2696 wrote to memory of 1440 2696 osmnl.exe 32 PID 2696 wrote to memory of 1440 2696 osmnl.exe 32 PID 2664 wrote to memory of 2756 2664 JaffaCakes118_e49fa59b2facb42650cf29c60d653990.exe 33 PID 2664 wrote to memory of 2756 2664 JaffaCakes118_e49fa59b2facb42650cf29c60d653990.exe 33 PID 2664 wrote to memory of 2756 2664 JaffaCakes118_e49fa59b2facb42650cf29c60d653990.exe 33 PID 2664 wrote to memory of 2756 2664 JaffaCakes118_e49fa59b2facb42650cf29c60d653990.exe 33 PID 2664 wrote to memory of 2756 2664 JaffaCakes118_e49fa59b2facb42650cf29c60d653990.exe 33 PID 2664 wrote to memory of 2756 2664 JaffaCakes118_e49fa59b2facb42650cf29c60d653990.exe 33 PID 2664 wrote to memory of 2756 2664 JaffaCakes118_e49fa59b2facb42650cf29c60d653990.exe 33 PID 2696 wrote to memory of 1440 2696 osmnl.exe 32 PID 2696 wrote to memory of 2744 2696 osmnl.exe 34 PID 2696 wrote to memory of 2744 2696 osmnl.exe 34 PID 2696 wrote to memory of 2744 2696 osmnl.exe 34 PID 2696 wrote to memory of 2744 2696 osmnl.exe 34 PID 2696 wrote to memory of 2744 2696 osmnl.exe 34 PID 2696 wrote to memory of 2744 2696 osmnl.exe 34 PID 2696 wrote to memory of 2744 2696 osmnl.exe 34 PID 2696 wrote to memory of 2744 2696 osmnl.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e49fa59b2facb42650cf29c60d653990.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e49fa59b2facb42650cf29c60d653990.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\osmnl.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\osmnl.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\osmnl.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\osmnl.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- System Location Discovery: System Language Discovery
PID:1440
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2744
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Launcher.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Launcher.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
650KB
MD526ef202fea01db6426848b2b949c1916
SHA19e4fdd1d5f12f891882b8bdbcdf8b8cff9b14f22
SHA256d020bd6a5b4e40398dd9b21003c5340748f0a8ce5290a9efc3608099b57b4601
SHA5128388f77ce7955393c91ad6397cce15f5fe51821390e4d422199f06ff6d1a160da4f15c47ad892f26af778bb8402734f5093c6f572f675ef4228ee99fe85ee15d
-
Filesize
799KB
MD5ebc6be19c16f96c9c32ce8c1e9f305c3
SHA1cec8bd4eac6a1b32024b62dd0a73fd7e8ae72658
SHA2560ff0f089829eb2952d33b694161924bde78e0dfb60a80df082ce618ec7b72944
SHA512a2148001191b10fc6bd2a7bf0b85e00b825d1ac42389ec16b91a4f64bb6096c7257ef1b3a5fb88ccb2b59fa130a2b02d30ad5c85a94894de0ec6f86eb0a071f9