Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 00:47
Static task
static1
Behavioral task
behavioral1
Sample
bdae873ae2208b7a2c4c14701bf611de_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bdae873ae2208b7a2c4c14701bf611de_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bdae873ae2208b7a2c4c14701bf611de_JaffaCakes118.exe
-
Size
78KB
-
MD5
bdae873ae2208b7a2c4c14701bf611de
-
SHA1
8dbb4b16367abcb161a59522ef6ab089c1547514
-
SHA256
d02377625a34a213c0d6db66457bedd56be7ed927510cb6a47afd8cf28b01624
-
SHA512
4e882f104b63a59718bda06f48c5c274807210fa354680a1e8fe4d59e41b61f1090888542b2dd55d129bd6c36f95686d58656a382cfc43a0d83f84ca560850ca
-
SSDEEP
1536:oHHM3xXT0XRhyRjVf3znOJTv3lcUK/+dWzCP7oYTcSQti9/R1tf:oHs3xSyRxvY3md+dWWZyi9/F
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Executes dropped EXE 1 IoCs
pid Process 2756 tmpE408.tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 2520 bdae873ae2208b7a2c4c14701bf611de_JaffaCakes118.exe 2520 bdae873ae2208b7a2c4c14701bf611de_JaffaCakes118.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\ShFusRes = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\big5.exe\"" tmpE408.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpE408.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bdae873ae2208b7a2c4c14701bf611de_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2520 bdae873ae2208b7a2c4c14701bf611de_JaffaCakes118.exe Token: SeDebugPrivilege 2756 tmpE408.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2908 2520 bdae873ae2208b7a2c4c14701bf611de_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2908 2520 bdae873ae2208b7a2c4c14701bf611de_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2908 2520 bdae873ae2208b7a2c4c14701bf611de_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2908 2520 bdae873ae2208b7a2c4c14701bf611de_JaffaCakes118.exe 30 PID 2908 wrote to memory of 2728 2908 vbc.exe 32 PID 2908 wrote to memory of 2728 2908 vbc.exe 32 PID 2908 wrote to memory of 2728 2908 vbc.exe 32 PID 2908 wrote to memory of 2728 2908 vbc.exe 32 PID 2520 wrote to memory of 2756 2520 bdae873ae2208b7a2c4c14701bf611de_JaffaCakes118.exe 33 PID 2520 wrote to memory of 2756 2520 bdae873ae2208b7a2c4c14701bf611de_JaffaCakes118.exe 33 PID 2520 wrote to memory of 2756 2520 bdae873ae2208b7a2c4c14701bf611de_JaffaCakes118.exe 33 PID 2520 wrote to memory of 2756 2520 bdae873ae2208b7a2c4c14701bf611de_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\bdae873ae2208b7a2c4c14701bf611de_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bdae873ae2208b7a2c4c14701bf611de_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\nz4f3aah.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE8AB.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE8AA.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:2728
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmpE408.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpE408.tmp.exe" C:\Users\Admin\AppData\Local\Temp\bdae873ae2208b7a2c4c14701bf611de_JaffaCakes118.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59769830a3485feccf9d0c1beed9dc4f4
SHA12d87791586d6cdc781bc224d8fb6c4615631c1d4
SHA2564e97ee5e6263a44365ad8015a84cd1665535532940b94a28f0881a69e196cbd7
SHA512f68a1e8e3dbfb97fad0743f210363c3f7571719047b183cb38d5e87b6430ea003a386653fb5b6d1d6f61e8828c3d5c52fd451842202370c52150bb69765f4563
-
Filesize
15KB
MD5bf2ce98e423566f3c2c11a9a71fcf607
SHA1e6c61d8e4772b3d2442e706ce958e1d14d0b19bf
SHA2565540ea7ef116332e9de85c39d000c7a264d7f1a04dea52aa5acc721238378d79
SHA5120cd941785a9d4cee26275c8bf20b7be030172609a0f1a0fbd9555fa1d0ff5cc4b5e80f222990caf525c003efee1a5d93a7dcfa52b954a83b1a77eaa384574be5
-
Filesize
266B
MD51215286aac8d18495e95b6851dec9d91
SHA1344883fc7517f44cf70c03d652b2e7d371ad3242
SHA25632e815dd25c90bd8c7ed246c76272cc7224859f60da40d2aae61615fc228cddf
SHA51208772043efbc51e52fb43661e18434d11c7fd516585bc0a039aa62d897a0268313eeef3aefdce7d267117e053da273db76384a800cefb67bcc6432d5fe76ef0b
-
Filesize
78KB
MD532f5fd6a8372a93f1179bfb58e3a682b
SHA1396b6ce5df1ddc2169953c570a69a480432d7aa9
SHA256d813b94d3d238ec9926c3f6554355b829270af2cdc345cde5f7c9df359d2562d
SHA5127a84d26ea17b8eae2a76500b833c3bb1eda4999a19a7b75977dd7de5e4e0069ae876c4132057fe7cf200542bbfe71e365ed6a53b6e2ab37b042e667647290e7e
-
Filesize
660B
MD5c28464dd6f10cefd11826cdbeb44118c
SHA191472191212aca327c153510a8a19ebcb0736162
SHA2561a0133edaa2e15beafb51543484b10930d6d2d9106a4cfb40d626a553a9e54ca
SHA512d145441674a3e7defe03c624d7920060c2b0e79cdece4a33465614db76be77f96685ce1707eea22c0e027619c97ddc8206e83a489947ac9dc104abbf608f00d5
-
Filesize
62KB
MD54f0e8cf79edb6cd381474b21cabfdf4a
SHA17018c96b4c5dab7957d4bcdc82c1e7bb3a4f80c4
SHA256e54a257fa391065c120f55841de8c11116ea0e601d90fe1a35dcd340c5dd9cd5
SHA5122451a59d09464e30d0df822d9322dbecb83faa92c5a5b71b7b9db62330c40cc7570d66235f137290074a3c4a9f3d8b3447067ed135f1bb60ea9e18d0df39a107