Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
15/10/2024, 20:17
Static task
static1
Behavioral task
behavioral1
Sample
49d03048e717add17d2229db85edfb00_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
49d03048e717add17d2229db85edfb00_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
49d03048e717add17d2229db85edfb00_JaffaCakes118.exe
-
Size
78KB
-
MD5
49d03048e717add17d2229db85edfb00
-
SHA1
5a21fbd0696daee13e740fcbce316e3eab251e27
-
SHA256
253b7724d4ffc202f44f17e9e5b0a6dc210ac5cf925e03a1aa0a0cefbe8e9b2d
-
SHA512
5eb33d968c505fc771080d2b2e921f2b753f245128b3d93e406310d1901a2765820475907a5d5296ba62acc187a7abb963aee797ffcb32e5052ffc1e58814b99
-
SSDEEP
1536:6sHY6M3xXT0XRhyRjVf3znOJTv3lcUK/+dWzCP7oYTcSQtw9/Jm1p7:6sHYn3xSyRxvY3md+dWWZyw9/w
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Executes dropped EXE 1 IoCs
pid Process 2712 tmpC284.tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 2500 49d03048e717add17d2229db85edfb00_JaffaCakes118.exe 2500 49d03048e717add17d2229db85edfb00_JaffaCakes118.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\ShFusRes = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\big5.exe\"" tmpC284.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 49d03048e717add17d2229db85edfb00_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpC284.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2500 49d03048e717add17d2229db85edfb00_JaffaCakes118.exe Token: SeDebugPrivilege 2712 tmpC284.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2500 wrote to memory of 2464 2500 49d03048e717add17d2229db85edfb00_JaffaCakes118.exe 30 PID 2500 wrote to memory of 2464 2500 49d03048e717add17d2229db85edfb00_JaffaCakes118.exe 30 PID 2500 wrote to memory of 2464 2500 49d03048e717add17d2229db85edfb00_JaffaCakes118.exe 30 PID 2500 wrote to memory of 2464 2500 49d03048e717add17d2229db85edfb00_JaffaCakes118.exe 30 PID 2464 wrote to memory of 2044 2464 vbc.exe 32 PID 2464 wrote to memory of 2044 2464 vbc.exe 32 PID 2464 wrote to memory of 2044 2464 vbc.exe 32 PID 2464 wrote to memory of 2044 2464 vbc.exe 32 PID 2500 wrote to memory of 2712 2500 49d03048e717add17d2229db85edfb00_JaffaCakes118.exe 33 PID 2500 wrote to memory of 2712 2500 49d03048e717add17d2229db85edfb00_JaffaCakes118.exe 33 PID 2500 wrote to memory of 2712 2500 49d03048e717add17d2229db85edfb00_JaffaCakes118.exe 33 PID 2500 wrote to memory of 2712 2500 49d03048e717add17d2229db85edfb00_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\49d03048e717add17d2229db85edfb00_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\49d03048e717add17d2229db85edfb00_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\e5osqiyg.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC321.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcC320.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:2044
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmpC284.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpC284.tmp.exe" C:\Users\Admin\AppData\Local\Temp\49d03048e717add17d2229db85edfb00_JaffaCakes118.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51be65a8ab45c98b319e689ce8c4c24fa
SHA1c1462cfa8a61a3e2855887b2109c0f7a5bc581ef
SHA2564b2a4b403a3108c9583dd1022e7526f4a1f15bc3a0461be70f60700ca8f6235a
SHA512c55acb988da23c51cda33ecdb2cdc0bf8d67df3bbb89f53828a1dbc233523067539888147670bb01b1cff8f8d76d3a3573e29866d63a61d046fdc3b7e14f2d16
-
Filesize
15KB
MD5bdaa90b1a7cf74d3b20db3f25cd3fcc6
SHA1eac88a14040081fd18a7684185ccd9f074ebe501
SHA2560c77375a1b5bf598328a62a587af26338431c021582f8b6761e918e838b274c2
SHA5126a9c73faafef11e9da29ea29d478e7aea35bb841c27ea4be39872a8303d3198419610153d8d0e9df237a01fe0a5b9cf9800f4881d53158b27bc57d5461b348ca
-
Filesize
266B
MD5cfb3bca61141582899cbed0914957904
SHA17c4e3e3a454239ea02da2d76fd54c31a39dc6665
SHA256b45a931c7b336167013da5fb564595345343216867dea79e079a9e09126ef00f
SHA5128b3aceabf587cfce9150fc6df26b7d82348917f6aed67538a54d31082d051e7b72d38b08ed52fab6144352fe30f4040b08743330447ec5e747f2a74d6568afd7
-
Filesize
78KB
MD512ce36a2cf44b23141ab37773ae0fbca
SHA1f61bc8bb85d737033f28eae2cea16003bb31afb3
SHA256ed211628d1a74b1d03df4dd5c956904c21773cf83eef72a969d12c504f66ad6f
SHA512c2cf627f43c60f1471df5f6f4b2c0758fa20e87f6ab1ebdbc37ce78e90dce088cc141f462558f72580103fd0bbadc9aa420819b6b43f95219ba85060c7b6b433
-
Filesize
660B
MD59c3ac29eae6af1a586731edd9baab894
SHA1398459ce53eef68a8b87c1ae3a7beb2688309951
SHA25682cb8d0855e20a21d5dbc6889908884f4529ddbb21e9b795687b728283692b9d
SHA51242cd2dcd5e1212d3db3c7e42bb13d550133a870530b98f7c7c5ad7be583bcf726b5b9e8b00ac758913e4978b374756862eea4bc26aa8bbeb1e57d24744e6a4e7
-
Filesize
62KB
MD54f0e8cf79edb6cd381474b21cabfdf4a
SHA17018c96b4c5dab7957d4bcdc82c1e7bb3a4f80c4
SHA256e54a257fa391065c120f55841de8c11116ea0e601d90fe1a35dcd340c5dd9cd5
SHA5122451a59d09464e30d0df822d9322dbecb83faa92c5a5b71b7b9db62330c40cc7570d66235f137290074a3c4a9f3d8b3447067ed135f1bb60ea9e18d0df39a107