Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
104s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2025, 13:44
Behavioral task
behavioral1
Sample
JaffaCakes118_8654d8fa16db286eb4b52d6b6120bbab.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_8654d8fa16db286eb4b52d6b6120bbab.exe
-
Size
327KB
-
MD5
8654d8fa16db286eb4b52d6b6120bbab
-
SHA1
18ae3877c5a1351cde54147233aaf0be1cb35253
-
SHA256
f566ebe5b24d23958dedd568f084188819d2b873f5a2e769dfe63a791983eea5
-
SHA512
3cdeb91b346de70c431ed90c0946f7bb54d0f3641053066b2a0614bcdd8775157c24247f5e1cb86af7ae5b5b1776eeca08bc296c8e47245e8d5ec9c2d6f2e964
-
SSDEEP
6144:Q1db49+rEg024fpLZazEjvE/rbay19tSt4bO2BaDmeBJe59kIkzxMJR:QjkArEN249AyE/rbaMct4bO2/V09MJR
Malware Config
Extracted
xtremerat
achkar.no-ip.biz
Signatures
-
Detect XtremeRAT payload 3 IoCs
resource yara_rule behavioral2/memory/5140-14-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/3904-15-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/5140-17-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Executes dropped EXE 1 IoCs
pid Process 3904 server.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/2608-13-0x0000000000400000-0x00000000004C1000-memory.dmp autoit_exe -
resource yara_rule behavioral2/memory/2608-0-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral2/files/0x00090000000227aa-5.dat upx behavioral2/memory/3904-10-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/2608-13-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral2/memory/5140-14-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/3904-15-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/5140-17-0x0000000010000000-0x000000001004D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 5316 5140 WerFault.exe 89 5792 5140 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8654d8fa16db286eb4b52d6b6120bbab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2608 wrote to memory of 3904 2608 JaffaCakes118_8654d8fa16db286eb4b52d6b6120bbab.exe 87 PID 2608 wrote to memory of 3904 2608 JaffaCakes118_8654d8fa16db286eb4b52d6b6120bbab.exe 87 PID 2608 wrote to memory of 3904 2608 JaffaCakes118_8654d8fa16db286eb4b52d6b6120bbab.exe 87 PID 3904 wrote to memory of 5140 3904 server.exe 89 PID 3904 wrote to memory of 5140 3904 server.exe 89 PID 3904 wrote to memory of 5140 3904 server.exe 89 PID 3904 wrote to memory of 5140 3904 server.exe 89 PID 3904 wrote to memory of 5136 3904 server.exe 90 PID 3904 wrote to memory of 5136 3904 server.exe 90 PID 3904 wrote to memory of 5136 3904 server.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8654d8fa16db286eb4b52d6b6120bbab.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8654d8fa16db286eb4b52d6b6120bbab.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\server.exeC:\Users\Admin\AppData\Local\Temp/server.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- System Location Discovery: System Language Discovery
PID:5140 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5140 -s 4804⤵
- Program crash
PID:5316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5140 -s 4884⤵
- Program crash
PID:5792
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:5136
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5140 -ip 51401⤵PID:1824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 5140 -ip 51401⤵PID:5388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5bb582905c2bf1a555207710f67f5a08f
SHA162700b9245bde91fbeb085669be0a78b24abc2c3
SHA256c6ce05b889e21be0f82f046e36656244f9cc42e3a482e69d9dfc9244742e2c01
SHA5129e3dbc54084c6526e988e578f821afe150a1b084ece6ac673514c53f4c2bd85afd15a146f06b29d0bf6eb7460b34e2556a171e4606a5c13ec50ce5686f4c3469