Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/02/2025, 12:04
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_25d2ddbce9d5949b943fe58930507134.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_25d2ddbce9d5949b943fe58930507134.exe
-
Size
92KB
-
MD5
25d2ddbce9d5949b943fe58930507134
-
SHA1
c687874a70222d227bb24f814859a47ab12b56e4
-
SHA256
1391317a47c89d0565b3a43a8ffeda8bf9a540ce1d9941ddbb5cd42e0ebfe4cb
-
SHA512
711b0a79cc4ab687dc5f475179b8b18ba95a1066c1754bcdf0548171e464ad0ac211a0a9a96628b0043275c70ab57d3f55194dd1b03464204ec033f3c51d75e3
-
SSDEEP
1536:VKxpv88ouifThnmVfm/mzS64JD+E4qxw882jJpSdQvXQKwvJpL1:GpqSVfBS6S+QxB82adONwvJpB
Malware Config
Signatures
-
Detect XtremeRAT payload 4 IoCs
resource yara_rule behavioral1/memory/1156-47-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/1156-45-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/2704-59-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/1156-63-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{HI0PI403-N7C2-5518-H4V5-ATTB36P5FE8V} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{HI0PI403-N7C2-5518-H4V5-ATTB36P5FE8V}\StubPath = "C:\\Windows\\system32\\InstallDir\\opdat.exe" svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{HI0PI403-N7C2-5518-H4V5-ATTB36P5FE8V} 55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{HI0PI403-N7C2-5518-H4V5-ATTB36P5FE8V}\StubPath = "C:\\Windows\\system32\\InstallDir\\opdat.exe restart" 55.exe -
Executes dropped EXE 2 IoCs
pid Process 2136 55.exe 1156 55.exe -
Loads dropped DLL 3 IoCs
pid Process 2380 JaffaCakes118_25d2ddbce9d5949b943fe58930507134.exe 2380 JaffaCakes118_25d2ddbce9d5949b943fe58930507134.exe 2136 55.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\InstallDir\\opdat.exe" 55.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\InstallDir\\opdat.exe" 55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\InstallDir\\opdat.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\InstallDir\\opdat.exe" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\InstallDir\opdat.exe 55.exe File created C:\Windows\SysWOW64\InstallDir\opdat.exe 55.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2136 set thread context of 1156 2136 55.exe 31 -
resource yara_rule behavioral1/memory/1156-36-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/1156-37-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/1156-47-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/1156-45-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/1156-43-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/1156-40-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/2704-59-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/1156-63-0x0000000000C80000-0x0000000000C95000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_25d2ddbce9d5949b943fe58930507134.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 55.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 55.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2992 DllHost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2136 55.exe 1156 55.exe 2992 DllHost.exe 2992 DllHost.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2136 2380 JaffaCakes118_25d2ddbce9d5949b943fe58930507134.exe 30 PID 2380 wrote to memory of 2136 2380 JaffaCakes118_25d2ddbce9d5949b943fe58930507134.exe 30 PID 2380 wrote to memory of 2136 2380 JaffaCakes118_25d2ddbce9d5949b943fe58930507134.exe 30 PID 2380 wrote to memory of 2136 2380 JaffaCakes118_25d2ddbce9d5949b943fe58930507134.exe 30 PID 2136 wrote to memory of 1156 2136 55.exe 31 PID 2136 wrote to memory of 1156 2136 55.exe 31 PID 2136 wrote to memory of 1156 2136 55.exe 31 PID 2136 wrote to memory of 1156 2136 55.exe 31 PID 2136 wrote to memory of 1156 2136 55.exe 31 PID 2136 wrote to memory of 1156 2136 55.exe 31 PID 2136 wrote to memory of 1156 2136 55.exe 31 PID 2136 wrote to memory of 1156 2136 55.exe 31 PID 1156 wrote to memory of 2704 1156 55.exe 33 PID 1156 wrote to memory of 2704 1156 55.exe 33 PID 1156 wrote to memory of 2704 1156 55.exe 33 PID 1156 wrote to memory of 2704 1156 55.exe 33 PID 1156 wrote to memory of 2704 1156 55.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_25d2ddbce9d5949b943fe58930507134.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_25d2ddbce9d5949b943fe58930507134.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\55.exe"C:\Users\Admin\AppData\Local\Temp\55.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\55.exeC:\Users\Admin\AppData\Local\Temp\55.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2704
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2992
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD583bcfdaf642fe1692bebb4e46431b7b1
SHA1d90de53d9105e4bfb6f45c102efb4f21ff132c12
SHA25605364955c6fdd54183f3fea36bbf6193bf319edc4c2370adae5cf537cf6fa9ac
SHA512da41e13a0dd3875c5bcc18d42296ed7d9cfd83ee01d5f095ae39144b9d0e1051cdc9905d96c48560e5f58e612a5d652481588630f2670b1ab2f2413e8169b70e
-
Filesize
187B
MD5bc48041f1457a3639872b4de20a2dac9
SHA12fb6d90be5e55bcc8a452a09d12955ac43cdb5b1
SHA256d7d7f32dca4f383b1f4451e58fe2429df8e56a8d3543e62f4cda8f73f81e749e
SHA5124fe56f82d899adbb81f618307a67cb0a01d1f3974a5eec33f2e2aa6f0d6256f44491e41fa97637bfa641712fa7d1ddcb174f938c4a90a3043cf28eb18c5905c7
-
Filesize
45KB
MD5d7c7170f6f46e95a10695157088a620f
SHA1e8d9826b0f60014187dedfa1307c16be28e93fa2
SHA2562e2f911153571516a6df4fa008e756e6c93f038068e5ec37e91dc9c720b975f8
SHA512bede756d0425d19d389f6a3ed396a4336d4c491e239eabcd299bbab6b8ac849e2056b90e13b011310ec93ae69c6aea1a6f5c85b86b11175d09e797fed9c4eee5