Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-10-2024 11:16
Static task
static1
Behavioral task
behavioral1
Sample
6e9b6f144060ab2c990c7e690404af3c_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
6e9b6f144060ab2c990c7e690404af3c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
6e9b6f144060ab2c990c7e690404af3c_JaffaCakes118.exe
-
Size
78KB
-
MD5
6e9b6f144060ab2c990c7e690404af3c
-
SHA1
72bf0a100e8fe3a0456d451fe53b5a7da586d4fd
-
SHA256
d9d24f8c1c5ff2fe02354051deaafde48edafea35070ad35e2c637e43ba85df6
-
SHA512
24b57bc8285a7903a99793b9120e8a5ad29d8131e414f27fda56393c3e812e3b373e8bbfd67889cd2df4b75cf4c2db04e153ce5bc7addba0c234381fe4cb8110
-
SSDEEP
1536:6CHY6rdELT8hn2Ep7WzPdVj6Ju8B3AZ242UdIAkD4x3HT4hPVoYdVQtkH9/R10j:6CHY8dSE2EwR4uY41HyvYkH9/G
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 6e9b6f144060ab2c990c7e690404af3c_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4972 tmp9F3D.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mscorsvc = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\sortkey.exe\"" tmp9F3D.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp9F3D.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6e9b6f144060ab2c990c7e690404af3c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2796 6e9b6f144060ab2c990c7e690404af3c_JaffaCakes118.exe Token: SeDebugPrivilege 4972 tmp9F3D.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2796 wrote to memory of 4060 2796 6e9b6f144060ab2c990c7e690404af3c_JaffaCakes118.exe 84 PID 2796 wrote to memory of 4060 2796 6e9b6f144060ab2c990c7e690404af3c_JaffaCakes118.exe 84 PID 2796 wrote to memory of 4060 2796 6e9b6f144060ab2c990c7e690404af3c_JaffaCakes118.exe 84 PID 4060 wrote to memory of 800 4060 vbc.exe 88 PID 4060 wrote to memory of 800 4060 vbc.exe 88 PID 4060 wrote to memory of 800 4060 vbc.exe 88 PID 2796 wrote to memory of 4972 2796 6e9b6f144060ab2c990c7e690404af3c_JaffaCakes118.exe 89 PID 2796 wrote to memory of 4972 2796 6e9b6f144060ab2c990c7e690404af3c_JaffaCakes118.exe 89 PID 2796 wrote to memory of 4972 2796 6e9b6f144060ab2c990c7e690404af3c_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e9b6f144060ab2c990c7e690404af3c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6e9b6f144060ab2c990c7e690404af3c_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\uzxb0hcm.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA0C4.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE1724468E022437A8DC7241A6698384F.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:800
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp9F3D.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9F3D.tmp.exe" C:\Users\Admin\AppData\Local\Temp\6e9b6f144060ab2c990c7e690404af3c_JaffaCakes118.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a66e48ad397d39274d0a2f42aeaa9afd
SHA1bb82d1a696fa9a05e5a58dbdeccec3f94166358d
SHA256b49c4b7eb3cc2c0cc5a93ebbeec2f166cbcededc7116c07ad37ed7bdcde7ea85
SHA512b437fa3aa8071abcda1e7293dd1ed8b4b68cd0e4d62b7e04dcd7d8fe2a8172e443c5fed1324524dd424d820f64c0bd86f527039a7570263c6956f0f12eb349f6
-
Filesize
78KB
MD501a91faa804d6df6aa3429ffa156d565
SHA1db7136dad30700b49b7ba051f2bbaecb9f930b4d
SHA256d7f6182d352788fbb144a56407f9d943693220417d2b90b870928050d63b8148
SHA5124fe96436b17d661f829ff3ee56e3870092b036f432f8b5431b40765ccfaf519f9b4ac3c7d3c281033176e814d9ffe50281f32ee2486269945f54d0c99d0ea0f6
-
Filesize
15KB
MD585a4cc8daa63ac979bf2ac1301513d8c
SHA18fdb8670437d880e7929fb828e69b7534be814db
SHA2563568da1b69ef4a7053a20b877bf98561da3e9fb5a045833f55d717d28f4ee403
SHA5125e743b9545dcab536968c808cd64d8aa4d5f0e41f302bc65572ad30723593594874418e8cbc3b79be341ecf54d63d7780fa78a7befdbbb4a61f630bec518097c
-
Filesize
266B
MD55b68c42bb42d6fa55e3f1e62f8a52ea4
SHA17df3f4f28430a9b72bd89e86c1a02facd063f6d2
SHA256e9b7c5b53965ef0608e46a9afe06f1c0e18089a027b0da73e88cc93a4ffc33c5
SHA5127ae7fcfa0d391ef9cc64f1f636037797275ae6f2e3494b738e181734ba9c8eacb7a17e9444889618f3310df99bc8ce9ad9caf24381d573b8ea87c62020d277e3
-
Filesize
660B
MD5ce9932a088d65e4486f58d42603fc746
SHA14f0482132d8139312e6eca1373df5466c29a29fa
SHA2561b697fd00f6dbcf3588c3846d3666b74ca1b048c28cfaebd4623804bab9958d0
SHA5121da82e309d719ebef3eb4718475dd5c0d56a42ffd2e51355d7f2dd284c2ba7d706ec4d1937808abf7c1883dde5a1d7b8ab45f83dee115ce8a21ff7dd65c6b703
-
Filesize
62KB
MD56870a276e0bed6dd5394d178156ebad0
SHA19b6005e5771bb4afb93a8862b54fe77dc4d203ee
SHA25669db906941dec2a7f1748ea1d15a058751c77d851ce54ea9e2ebdf1d6c7ed4f4
SHA5123b6f412d4bdf0939677ab6890a6417da6f737376e13375d2a60871de195aa14344b8340d254b819c850d75a443629cbf26f35533e07aaba9532fdc5284132809