Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/03/2025, 17:14

General

  • Target

    JaffaCakes118_8c70020a29bc1a430f48a15f5c780985.exe

  • Size

    704KB

  • MD5

    8c70020a29bc1a430f48a15f5c780985

  • SHA1

    dd318efaa5f36bbdecf9cf29e55d74c1f81bf5e0

  • SHA256

    e8da0bd688256c7e5c300cad84a041c09ff6f26ff7a5be28ebabb3146a06ddcb

  • SHA512

    37346db43ea2fec81ec810cd09a1f74f823a1fe5d9f5e98bf67788511b7623420fb998ca9f8c586f6b9b93d5c53d5b4651197f23994602903f3e74566f343c0d

  • SSDEEP

    12288:V4zTkLn8a0gC+khD5YMlLKv3cLXsUp8sQ3crW0/rRcWSTQeSC1j:VXntiBCMlYsLHpBQ3+/rtSc1C

Malware Config

Extracted

Family

xtremerat

C2

thuthuatgame.zapto.org

Extracted

Family

latentbot

C2

thuthuatgame.zapto.org

Signatures

  • Detect XtremeRAT payload 4 IoCs
  • LatentBot

    Modular trojan written in Delphi which has been in-the-wild since 2013.

  • Latentbot family
  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • XtremeRAT

    The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

  • Xtremerat family
  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • UPX packed file 17 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8c70020a29bc1a430f48a15f5c780985.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8c70020a29bc1a430f48a15f5c780985.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2360
    • C:\Users\Admin\AppData\Local\Temp\DISS AU VIP BY AC QUY DO.EXE
      "C:\Users\Admin\AppData\Local\Temp\DISS AU VIP BY AC QUY DO.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:4872
    • C:\Users\Admin\AppData\Local\Temp\SERVER.EXE
      "C:\Users\Admin\AppData\Local\Temp\SERVER.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Adds policy Run key to start application
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5328
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
        3⤵
          PID:4936
        • C:\Windows\SysWOW64\explorer.exe
          explorer.exe
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:4952
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x4b0 0x3d0
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2488

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\DISS AU VIP BY AC QUY DO.EXE

      Filesize

      602KB

      MD5

      a64a2406a7e1f964a6f92169777b10f6

      SHA1

      d38491f831a4808091ea9bd556ddadd216262b1c

      SHA256

      cb2df4cb0ac7114de2b4f2860d78ea15a6a29ccb599602fa230d0cdd05edcf48

      SHA512

      8dba9277ba8b7aac5c15a7c977fa617c8e8982cfe123216eb4957491cdd808d92238fcd05146891d315a5471689600e0f069e015762811d5ee3aa993466338b2

    • C:\Users\Admin\AppData\Local\Temp\SERVER.EXE

      Filesize

      45KB

      MD5

      3dd24ffc2761b7eb396766f587249292

      SHA1

      4a6b6e574503ecd595c1840322fe4011b411d9cc

      SHA256

      8cc2a3f378194e9e6ab730f466a178d1a35cfd6af3897f08b7af8359be03a273

      SHA512

      4ad1e2683f0c6a449496e7b9cc31c897802fc37f58a39e69010fa3d4a8637067a933908f52a8742cd6c5277365ec941fceecc3972a9c001bb7059eb47762b2b7

    • memory/4872-34-0x0000000000400000-0x0000000000597000-memory.dmp

      Filesize

      1.6MB

    • memory/4872-35-0x0000000000400000-0x0000000000597000-memory.dmp

      Filesize

      1.6MB

    • memory/4872-44-0x0000000000400000-0x0000000000597000-memory.dmp

      Filesize

      1.6MB

    • memory/4872-28-0x0000000000400000-0x0000000000597000-memory.dmp

      Filesize

      1.6MB

    • memory/4872-43-0x0000000000400000-0x0000000000597000-memory.dmp

      Filesize

      1.6MB

    • memory/4872-31-0x0000000000400000-0x0000000000597000-memory.dmp

      Filesize

      1.6MB

    • memory/4872-32-0x0000000000400000-0x0000000000597000-memory.dmp

      Filesize

      1.6MB

    • memory/4872-33-0x0000000000400000-0x0000000000597000-memory.dmp

      Filesize

      1.6MB

    • memory/4872-16-0x0000000000400000-0x0000000000597000-memory.dmp

      Filesize

      1.6MB

    • memory/4872-42-0x0000000000400000-0x0000000000597000-memory.dmp

      Filesize

      1.6MB

    • memory/4872-36-0x0000000000400000-0x0000000000597000-memory.dmp

      Filesize

      1.6MB

    • memory/4872-37-0x0000000000400000-0x0000000000597000-memory.dmp

      Filesize

      1.6MB

    • memory/4872-38-0x0000000000400000-0x0000000000597000-memory.dmp

      Filesize

      1.6MB

    • memory/4872-39-0x0000000000400000-0x0000000000597000-memory.dmp

      Filesize

      1.6MB

    • memory/4872-40-0x0000000000400000-0x0000000000597000-memory.dmp

      Filesize

      1.6MB

    • memory/4872-41-0x0000000000400000-0x0000000000597000-memory.dmp

      Filesize

      1.6MB

    • memory/4952-26-0x0000000000C80000-0x0000000000C93000-memory.dmp

      Filesize

      76KB

    • memory/4952-30-0x0000000000C80000-0x0000000000C93000-memory.dmp

      Filesize

      76KB

    • memory/5328-27-0x0000000000C80000-0x0000000000C93000-memory.dmp

      Filesize

      76KB