Analysis

  • max time kernel
    144s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-12-2024 05:58

General

  • Target

    b7265059e8284fc14c4dd91301129fb7_JaffaCakes118.exe

  • Size

    78KB

  • MD5

    b7265059e8284fc14c4dd91301129fb7

  • SHA1

    bf914ff8ab15bbed2cccfb5f1eb80581f2db7920

  • SHA256

    830853b1a26a4809184596ac501e7ce156172dc87ba0c1839f882fbaceacf6fd

  • SHA512

    f75a15151765e08a1e82f769708b84b77437e629da21e06aa1a96267bb64b76be1d217635b63e33fc092568b08a75860df84fbcfe8d5477a138b064022b1a154

  • SSDEEP

    1536:zcPWtHFo6uaJtZAlGmWw644txVILJtcfJuovFdPKmNqOqD70Gou2P2oYe9Qtv9/x:wPWtHFoI3ZAtWDDILJLovbicqOq3o+nL

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b7265059e8284fc14c4dd91301129fb7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b7265059e8284fc14c4dd91301129fb7_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2816
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\xvaac5xf.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1700
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB1BC.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc3F1AB1D960C4BE3AD9EA6A315104BC8.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2328
    • C:\Users\Admin\AppData\Local\Temp\tmpB045.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpB045.tmp.exe" C:\Users\Admin\AppData\Local\Temp\b7265059e8284fc14c4dd91301129fb7_JaffaCakes118.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:4284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESB1BC.tmp

    Filesize

    1KB

    MD5

    c2214ec478d1b32dcd9731afc95c1116

    SHA1

    22045923d96597f4b12e0dde0f8c0b0e1641edae

    SHA256

    ea39624f4163bd59f6d2878d3954be9b8ec4f7f78b944b27f759868f7006f0b6

    SHA512

    97e5eb0eadcde96caac7324524fa74a168f4ed0801366dc8c4770985ac8efaf3f3ec1cb182921863f3e0168358b27989985647f1a9a6ce204b11e854fcf5de74

  • C:\Users\Admin\AppData\Local\Temp\tmpB045.tmp.exe

    Filesize

    78KB

    MD5

    0753ed26ceecc730b75484e686264970

    SHA1

    51ae3efdaf156b34abc334ac96ad4427467758b8

    SHA256

    70f4808b605f0ada37bd188f2f0d166d0c880c1e2d1cbd5cc3877ec62f18efe9

    SHA512

    71254699ca61dc24a3890babdbd01d54226b3f79041bea2d46bf93be59f1438196214eceb8de68153b105ad8114d4efe9a6bd6ea77ad1c9714f4a71c0f167595

  • C:\Users\Admin\AppData\Local\Temp\vbc3F1AB1D960C4BE3AD9EA6A315104BC8.TMP

    Filesize

    660B

    MD5

    9d408ac582b9b8c1652963918d80a6fc

    SHA1

    b853d720301bc7435bef14126d3ee89bf1504712

    SHA256

    7431da1a1dedd5e103fb76be0036d81bca9d875d4d852fb4f624cc3cc70dc7a6

    SHA512

    5069a880ad401bd0b8a0cec3f3a75408b2cad727f6edbc6c3b6d8a345229e4fb0d763ac93330311c8df5c00f130eadc75638ed3bd216b55ba01bf4f75cf701d1

  • C:\Users\Admin\AppData\Local\Temp\xvaac5xf.0.vb

    Filesize

    15KB

    MD5

    54bb2c91fa656b5562e59b9f8d79433e

    SHA1

    a972b9683f1268c50ddd108a39c0b21298a10883

    SHA256

    16bafa5d4e9a0e5c6bb7805af3c6347f9882c895dfce3078974eb917a3bc0b28

    SHA512

    7578328096833a70fa68569aa84596f13e87f7e292b1f3c7bbac4d9949d2b6a103c1b8490740ccc66839b628b6038bfaf1bea793fa8c50eb78e57a7db2a5bf27

  • C:\Users\Admin\AppData\Local\Temp\xvaac5xf.cmdline

    Filesize

    266B

    MD5

    716f0f0b2de8c123f3aef51ccc46b2e6

    SHA1

    4c10b7da36ce32f206b6c0470b4e20ecb8931cf2

    SHA256

    8162b60507673c50327ab4bc0e569ff9cc3517ff7ee8454f19bced1ddc27a7cb

    SHA512

    6d836b3aae1607f56841b0619358887612cb681336e64668a3a9ed4d7663abcc1a982a35642305f8dc138a764a294ad6e7ecb5839849d02790c2bb8618b55f04

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    a26b0f78faa3881bb6307a944b096e91

    SHA1

    42b01830723bf07d14f3086fa83c4f74f5649368

    SHA256

    b43ecda931e7af03f0768c905ed9fa82c03e41e566b1dff9960afc6b91ae5ab5

    SHA512

    a0e9c2814fca6bcf87e779592c005d7a8eef058a61f5a5443f7cf8d97e2316d0cde91ed51270bbcc23ccf68c7fc4a321a5a95a4eed75cb8d8a45cb3aa725fb9c

  • memory/1700-18-0x0000000074A00000-0x0000000074FB1000-memory.dmp

    Filesize

    5.7MB

  • memory/1700-8-0x0000000074A00000-0x0000000074FB1000-memory.dmp

    Filesize

    5.7MB

  • memory/2816-1-0x0000000074A00000-0x0000000074FB1000-memory.dmp

    Filesize

    5.7MB

  • memory/2816-2-0x0000000074A00000-0x0000000074FB1000-memory.dmp

    Filesize

    5.7MB

  • memory/2816-0-0x0000000074A02000-0x0000000074A03000-memory.dmp

    Filesize

    4KB

  • memory/2816-22-0x0000000074A00000-0x0000000074FB1000-memory.dmp

    Filesize

    5.7MB

  • memory/4284-23-0x0000000074A00000-0x0000000074FB1000-memory.dmp

    Filesize

    5.7MB

  • memory/4284-24-0x0000000074A00000-0x0000000074FB1000-memory.dmp

    Filesize

    5.7MB

  • memory/4284-25-0x0000000074A00000-0x0000000074FB1000-memory.dmp

    Filesize

    5.7MB

  • memory/4284-26-0x0000000074A00000-0x0000000074FB1000-memory.dmp

    Filesize

    5.7MB

  • memory/4284-27-0x0000000074A00000-0x0000000074FB1000-memory.dmp

    Filesize

    5.7MB

  • memory/4284-28-0x0000000074A00000-0x0000000074FB1000-memory.dmp

    Filesize

    5.7MB