Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 17:45
Static task
static1
Behavioral task
behavioral1
Sample
0febdae255942f5744e63c2ca74120b3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0febdae255942f5744e63c2ca74120b3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0febdae255942f5744e63c2ca74120b3_JaffaCakes118.exe
-
Size
78KB
-
MD5
0febdae255942f5744e63c2ca74120b3
-
SHA1
105d02bfa7a013e8746d317918b10687c8c76257
-
SHA256
e5442e1795996d39199644a07d68d545463be73529980a09d54846d55165436f
-
SHA512
378dea18817d44bf4c4a2510f77c9478504168fe9448f879aac76d36ddf247705994503aef9507259261d9d7fdc4325b0ff6fd3badb8ab389c249c5418d1ce99
-
SSDEEP
1536:iPWtHF3M3xXT0XRhyRjVf3znOJTv3lcUK/+dWzCP7oYTcSQtA9/sC1Dg:iPWtHF83xSyRxvY3md+dWWZyA9/q
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Executes dropped EXE 1 IoCs
pid Process 2344 tmp9C7E.tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 3048 0febdae255942f5744e63c2ca74120b3_JaffaCakes118.exe 3048 0febdae255942f5744e63c2ca74120b3_JaffaCakes118.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\ShFusRes = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\big5.exe\"" tmp9C7E.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp9C7E.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0febdae255942f5744e63c2ca74120b3_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3048 0febdae255942f5744e63c2ca74120b3_JaffaCakes118.exe Token: SeDebugPrivilege 2344 tmp9C7E.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2520 3048 0febdae255942f5744e63c2ca74120b3_JaffaCakes118.exe 30 PID 3048 wrote to memory of 2520 3048 0febdae255942f5744e63c2ca74120b3_JaffaCakes118.exe 30 PID 3048 wrote to memory of 2520 3048 0febdae255942f5744e63c2ca74120b3_JaffaCakes118.exe 30 PID 3048 wrote to memory of 2520 3048 0febdae255942f5744e63c2ca74120b3_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2544 2520 vbc.exe 32 PID 2520 wrote to memory of 2544 2520 vbc.exe 32 PID 2520 wrote to memory of 2544 2520 vbc.exe 32 PID 2520 wrote to memory of 2544 2520 vbc.exe 32 PID 3048 wrote to memory of 2344 3048 0febdae255942f5744e63c2ca74120b3_JaffaCakes118.exe 33 PID 3048 wrote to memory of 2344 3048 0febdae255942f5744e63c2ca74120b3_JaffaCakes118.exe 33 PID 3048 wrote to memory of 2344 3048 0febdae255942f5744e63c2ca74120b3_JaffaCakes118.exe 33 PID 3048 wrote to memory of 2344 3048 0febdae255942f5744e63c2ca74120b3_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\0febdae255942f5744e63c2ca74120b3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0febdae255942f5744e63c2ca74120b3_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\4hekwzuh.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9D2A.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc9D29.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:2544
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp9C7E.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9C7E.tmp.exe" C:\Users\Admin\AppData\Local\Temp\0febdae255942f5744e63c2ca74120b3_JaffaCakes118.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2344
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD5b52b228d0ef2a4dfbf01edade00d12ec
SHA1fb5d2a36366f6b7729f1f09b7af25703ea3b018a
SHA256cbb889142c4f4fbef616cb5a9ceee767334c3bbc17cd097612c38961131684b0
SHA5125b2f79a3f9cf31e61712f4317e38acf623aa6af3127275c7bb2c34dc22ec5154d125a1f0ec9ef596cda0a1f84a7cc2e5198da894f17b48bf64ec48582b890c62
-
Filesize
266B
MD5ec795b5a2cd3885dbc61224be8a29142
SHA1bfa96359df381b1f7a8738e8ecf9c967718f3abf
SHA256d28fb0bfecfa491aade2f9ba0eb34f3359a9c56261245facd3a8a6ba265dd7d9
SHA512a85c92e602fd009e52d137a0f32ed0179842da2eb17b05a43b8ac9bb200fea2933b200d1eb0f1fc8292752521b3ba08a1b512589e5086006408b7c2e66b2f30f
-
Filesize
1KB
MD5c83547ad047211dfb75afab0329c9642
SHA1033a5fc84a1a6167215221a5526a944368d807d5
SHA2569d3a002dcfc094b112b05a8640c0dc4c9049ef71c3a045ace2a3fe27d3801656
SHA512e134721df59880fb9f1ac010df5d6ecf62fee82b6eb30cdc3e335c42e335553eee79f3c98473af828bedf496968c5daa7e7ed991f264ee9408513cb41d48b0f2
-
Filesize
78KB
MD5e593a6a42cb20649aa465d5a7264f14f
SHA10d8a9839f93e0f6adf184a9b4e3aa160008a0c9b
SHA2569fcd1e10339903082f79da3a5601709fa0a1e97470c2d32398c45e8e75b70165
SHA51236ac6f000437484e5bc9dba471122038837bfa150ab4bb052b8c73c52af7f0aaa9bbdd23184b29957a512c896f7e5dee0895f29660fccf1f8a958f7b250be04a
-
Filesize
660B
MD5d05a874bbfd734c904d06eeb017ae3e1
SHA1587ed388a5ce2d5d3ebc879bf73f2841679828a0
SHA2566321614718ae2e67d68ac2512d88b0cd0c63a400262e69c89e89b2918f0f7cf7
SHA5127a969ba7d288fc8756cd43f18c9c62c5e7a79148e8710cb89cc574a67dbc053ce2fd8a40d71af3ea596868756116a93cce1de9bff57ceb859ae2a26c56b0b25a
-
Filesize
62KB
MD54f0e8cf79edb6cd381474b21cabfdf4a
SHA17018c96b4c5dab7957d4bcdc82c1e7bb3a4f80c4
SHA256e54a257fa391065c120f55841de8c11116ea0e601d90fe1a35dcd340c5dd9cd5
SHA5122451a59d09464e30d0df822d9322dbecb83faa92c5a5b71b7b9db62330c40cc7570d66235f137290074a3c4a9f3d8b3447067ed135f1bb60ea9e18d0df39a107