Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-10-2024 17:45

General

  • Target

    0febdae255942f5744e63c2ca74120b3_JaffaCakes118.exe

  • Size

    78KB

  • MD5

    0febdae255942f5744e63c2ca74120b3

  • SHA1

    105d02bfa7a013e8746d317918b10687c8c76257

  • SHA256

    e5442e1795996d39199644a07d68d545463be73529980a09d54846d55165436f

  • SHA512

    378dea18817d44bf4c4a2510f77c9478504168fe9448f879aac76d36ddf247705994503aef9507259261d9d7fdc4325b0ff6fd3badb8ab389c249c5418d1ce99

  • SSDEEP

    1536:iPWtHF3M3xXT0XRhyRjVf3znOJTv3lcUK/+dWzCP7oYTcSQtA9/sC1Dg:iPWtHF83xSyRxvY3md+dWWZyA9/q

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0febdae255942f5744e63c2ca74120b3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0febdae255942f5744e63c2ca74120b3_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\4hekwzuh.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2520
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9D2A.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc9D29.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2544
    • C:\Users\Admin\AppData\Local\Temp\tmp9C7E.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp9C7E.tmp.exe" C:\Users\Admin\AppData\Local\Temp\0febdae255942f5744e63c2ca74120b3_JaffaCakes118.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2344

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\4hekwzuh.0.vb

    Filesize

    15KB

    MD5

    b52b228d0ef2a4dfbf01edade00d12ec

    SHA1

    fb5d2a36366f6b7729f1f09b7af25703ea3b018a

    SHA256

    cbb889142c4f4fbef616cb5a9ceee767334c3bbc17cd097612c38961131684b0

    SHA512

    5b2f79a3f9cf31e61712f4317e38acf623aa6af3127275c7bb2c34dc22ec5154d125a1f0ec9ef596cda0a1f84a7cc2e5198da894f17b48bf64ec48582b890c62

  • C:\Users\Admin\AppData\Local\Temp\4hekwzuh.cmdline

    Filesize

    266B

    MD5

    ec795b5a2cd3885dbc61224be8a29142

    SHA1

    bfa96359df381b1f7a8738e8ecf9c967718f3abf

    SHA256

    d28fb0bfecfa491aade2f9ba0eb34f3359a9c56261245facd3a8a6ba265dd7d9

    SHA512

    a85c92e602fd009e52d137a0f32ed0179842da2eb17b05a43b8ac9bb200fea2933b200d1eb0f1fc8292752521b3ba08a1b512589e5086006408b7c2e66b2f30f

  • C:\Users\Admin\AppData\Local\Temp\RES9D2A.tmp

    Filesize

    1KB

    MD5

    c83547ad047211dfb75afab0329c9642

    SHA1

    033a5fc84a1a6167215221a5526a944368d807d5

    SHA256

    9d3a002dcfc094b112b05a8640c0dc4c9049ef71c3a045ace2a3fe27d3801656

    SHA512

    e134721df59880fb9f1ac010df5d6ecf62fee82b6eb30cdc3e335c42e335553eee79f3c98473af828bedf496968c5daa7e7ed991f264ee9408513cb41d48b0f2

  • C:\Users\Admin\AppData\Local\Temp\tmp9C7E.tmp.exe

    Filesize

    78KB

    MD5

    e593a6a42cb20649aa465d5a7264f14f

    SHA1

    0d8a9839f93e0f6adf184a9b4e3aa160008a0c9b

    SHA256

    9fcd1e10339903082f79da3a5601709fa0a1e97470c2d32398c45e8e75b70165

    SHA512

    36ac6f000437484e5bc9dba471122038837bfa150ab4bb052b8c73c52af7f0aaa9bbdd23184b29957a512c896f7e5dee0895f29660fccf1f8a958f7b250be04a

  • C:\Users\Admin\AppData\Local\Temp\vbc9D29.tmp

    Filesize

    660B

    MD5

    d05a874bbfd734c904d06eeb017ae3e1

    SHA1

    587ed388a5ce2d5d3ebc879bf73f2841679828a0

    SHA256

    6321614718ae2e67d68ac2512d88b0cd0c63a400262e69c89e89b2918f0f7cf7

    SHA512

    7a969ba7d288fc8756cd43f18c9c62c5e7a79148e8710cb89cc574a67dbc053ce2fd8a40d71af3ea596868756116a93cce1de9bff57ceb859ae2a26c56b0b25a

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    4f0e8cf79edb6cd381474b21cabfdf4a

    SHA1

    7018c96b4c5dab7957d4bcdc82c1e7bb3a4f80c4

    SHA256

    e54a257fa391065c120f55841de8c11116ea0e601d90fe1a35dcd340c5dd9cd5

    SHA512

    2451a59d09464e30d0df822d9322dbecb83faa92c5a5b71b7b9db62330c40cc7570d66235f137290074a3c4a9f3d8b3447067ed135f1bb60ea9e18d0df39a107

  • memory/2520-8-0x0000000074860000-0x0000000074E0B000-memory.dmp

    Filesize

    5.7MB

  • memory/2520-18-0x0000000074860000-0x0000000074E0B000-memory.dmp

    Filesize

    5.7MB

  • memory/3048-0-0x0000000074861000-0x0000000074862000-memory.dmp

    Filesize

    4KB

  • memory/3048-1-0x0000000074860000-0x0000000074E0B000-memory.dmp

    Filesize

    5.7MB

  • memory/3048-2-0x0000000074860000-0x0000000074E0B000-memory.dmp

    Filesize

    5.7MB

  • memory/3048-24-0x0000000074860000-0x0000000074E0B000-memory.dmp

    Filesize

    5.7MB