Analysis
-
max time kernel
103s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
07/04/2025, 18:29
General
-
Target
JaffaCakes118_a05cb17861be3132760f054dddcbd241.exe
-
Size
97KB
-
MD5
a05cb17861be3132760f054dddcbd241
-
SHA1
46b3c98e572d70a625e7d7c788145f055c939f2b
-
SHA256
131678102693d7cb312432265a563e56ec7c05f120f7ea8615df3827807fe770
-
SHA512
fe8bf2a583497da347e2f3515ce527fc9e7e974b954374d38b1e88ce54bda410d42d3e7701d0396c7cdc478f7a76f1872c2f6d8021cac9d1a4614a9c38e67459
-
SSDEEP
3072:KNW7dEvotvX5gXI3oWBcljfed0zQVQen482qlezyx+V:KNW7mvIJuIn6xOQYN2qlezO0
Malware Config
Signatures
-
Detect XtremeRAT payload 3 IoCs
resource yara_rule behavioral1/memory/5592-1-0x0000000010000000-0x000000001005D000-memory.dmp family_xtremerat behavioral1/memory/5636-5-0x0000000010000000-0x000000001005D000-memory.dmp family_xtremerat behavioral1/memory/5592-6-0x0000000010000000-0x000000001005D000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
resource yara_rule behavioral1/memory/5636-0-0x0000000010000000-0x000000001005D000-memory.dmp upx behavioral1/memory/5592-1-0x0000000010000000-0x000000001005D000-memory.dmp upx behavioral1/memory/5636-5-0x0000000010000000-0x000000001005D000-memory.dmp upx behavioral1/memory/5592-6-0x0000000010000000-0x000000001005D000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\177twak.jpg.exe JaffaCakes118_a05cb17861be3132760f054dddcbd241.exe File created C:\Windows\177twak.jpg JaffaCakes118_a05cb17861be3132760f054dddcbd241.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1544 5592 WerFault.exe 85 980 5592 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_a05cb17861be3132760f054dddcbd241.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 5636 wrote to memory of 5592 5636 JaffaCakes118_a05cb17861be3132760f054dddcbd241.exe 85 PID 5636 wrote to memory of 5592 5636 JaffaCakes118_a05cb17861be3132760f054dddcbd241.exe 85 PID 5636 wrote to memory of 5592 5636 JaffaCakes118_a05cb17861be3132760f054dddcbd241.exe 85 PID 5636 wrote to memory of 5592 5636 JaffaCakes118_a05cb17861be3132760f054dddcbd241.exe 85 PID 5636 wrote to memory of 1896 5636 JaffaCakes118_a05cb17861be3132760f054dddcbd241.exe 87 PID 5636 wrote to memory of 1896 5636 JaffaCakes118_a05cb17861be3132760f054dddcbd241.exe 87 PID 5636 wrote to memory of 1896 5636 JaffaCakes118_a05cb17861be3132760f054dddcbd241.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a05cb17861be3132760f054dddcbd241.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a05cb17861be3132760f054dddcbd241.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5636 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- System Location Discovery: System Language Discovery
PID:5592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5592 -s 4843⤵
- Program crash
PID:1544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5592 -s 4923⤵
- Program crash
PID:980
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵PID:1896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 5592 -ip 55921⤵PID:1184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 5592 -ip 55921⤵PID:2484