Analysis

  • max time kernel
    123s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-02-2025 10:06

General

  • Target

    JaffaCakes118_202a45ed616e20b8c1e512722638c03a.exe

  • Size

    21KB

  • MD5

    202a45ed616e20b8c1e512722638c03a

  • SHA1

    c61e2ad1d313db36b8383ced8fa9bc3db1d1e381

  • SHA256

    3277cbc82b81ddd5938472c1daa4a8801058315ac836f66ce2807bbfa7b35ec6

  • SHA512

    e7fb6396298a6ad216ddef852556d5435259b6b9e06716144a6247f400204652276062d471ac20fda10b9b3027f384ff56759498e4e7e9d6a292507e9ac2c2ac

  • SSDEEP

    384:q7IdmF+TH95xJMu/0PlxjV8BINhuLJ37tMOpuqqz3KK7eIVmivhraUbzJzvGrBkV:q7IsF8HdbKjV8BX7Vy6K7eIVTvhrachL

Malware Config

Signatures

  • Detect XtremeRAT payload 1 IoCs
  • XtremeRAT

    The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

  • Xtremerat family
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_202a45ed616e20b8c1e512722638c03a.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_202a45ed616e20b8c1e512722638c03a.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1576
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1576 -s 500
      2⤵
      • Program crash
      PID:5032
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1576 -ip 1576
    1⤵
      PID:2932

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1576-0-0x0000000000C80000-0x0000000000C96000-memory.dmp

      Filesize

      88KB

    • memory/1576-1-0x0000000000C80000-0x0000000000C96000-memory.dmp

      Filesize

      88KB