Analysis

  • max time kernel
    141s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    10-12-2024 23:49

General

  • Target

    df0605eba67a433c0c54dbc57bf4a1ae_JaffaCakes118.exe

  • Size

    78KB

  • MD5

    df0605eba67a433c0c54dbc57bf4a1ae

  • SHA1

    5fd04c5c193dff141f8226cfe394a6106f493786

  • SHA256

    787e232a020699637e461030d95bf6047c8e7fcad709fa5b05c4b8555c3a0d9e

  • SHA512

    75adb9572e1b62f8b6f989f9698e1324f5138a9dc77c2dbe33b2c16552a566c033fdef85668d63b56967936ba9b128243e279ced0342c6e46eb7e5b06cde3260

  • SSDEEP

    1536:84tHHM7t4XT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQt+9/n1wS:84tHshASyRxvhTzXPvCbW2U+9/p

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Metamorpherrat family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df0605eba67a433c0c54dbc57bf4a1ae_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\df0605eba67a433c0c54dbc57bf4a1ae_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2092
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\jkfmhehy.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2276
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCB8A.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcCB89.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1496
    • C:\Users\Admin\AppData\Local\Temp\tmpCA13.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpCA13.tmp.exe" C:\Users\Admin\AppData\Local\Temp\df0605eba67a433c0c54dbc57bf4a1ae_JaffaCakes118.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2304

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESCB8A.tmp

    Filesize

    1KB

    MD5

    799df80f423fdad5a1181bac97fb7ba1

    SHA1

    9ac3cdb0a576f799089029607abc0d99ded10059

    SHA256

    4236bf79283859698a95d5d77b255b2fd4f2d43862cfa13d944dee2f1fe4d891

    SHA512

    8e786ee3546f3568682856440d560c071abe98a8a6409788024f5b37afeb375e2c90cbca4da9654fc01ed2669c66ba29be26d4b8cf50a7e52acb498d7c7615c8

  • C:\Users\Admin\AppData\Local\Temp\jkfmhehy.0.vb

    Filesize

    15KB

    MD5

    4d62bb2795a19044a480da5d73f8bfa3

    SHA1

    448c0f8dcc02bb244001208494ba79fd87dd5770

    SHA256

    239449f588cfc245f43c58760a9ae84ea774fc67b345f09351a68c0b2d5ce837

    SHA512

    3aba6140698e59948c560e48f02e4af6b5598a181c8b769e81f7f5d22da6e42c2c93e8ba5f5cf8a05c63d60b573d1095ad0dd88199f2dd91e9aef04808e90e59

  • C:\Users\Admin\AppData\Local\Temp\jkfmhehy.cmdline

    Filesize

    266B

    MD5

    8fa77831cb08e2f8374c456be3d04622

    SHA1

    21e2411cd48939f03d537a7e393bf807ee1cedc9

    SHA256

    bda1229709804eb892a9c0e9541fba652d8917656148615d791557cc2d3e2795

    SHA512

    2e695e303401a4a366ae4433381a85bad1f704172089a9f489d68c8fcea9deb52d6f61a09cadc29df60b5a2ad471d4f4743f48960c58af773789ca90fb5736ae

  • C:\Users\Admin\AppData\Local\Temp\tmpCA13.tmp.exe

    Filesize

    78KB

    MD5

    5aec18ec55437bc6480d5601a127ed69

    SHA1

    6e6e8f1e5fc6422b633050efc2b88ec201c9e11b

    SHA256

    a6c64b783fe50a13b666499825a564678634b940312416fffcc06f91548b4210

    SHA512

    e36a2fdbe179fb66107142216db07d10e9d09a8b20f49cb2d436fbc259681389690550c915eb88c831b95448bec2b5e8f04007e209405cb270b345aaa5bfabb7

  • C:\Users\Admin\AppData\Local\Temp\vbcCB89.tmp

    Filesize

    660B

    MD5

    a982fd434ca08142b8f77d2744fb5db2

    SHA1

    aa105228d63d05a2875514aeb043f1ceb060dc2b

    SHA256

    f7ada03d702ee58678717616b7fa6c7dcff9d8e7cc3992da39e0ec067607072d

    SHA512

    0803e523a71c11ddc37cbe7a6a5a3b10998b48a045c455a1d6c043d1dd18f507c58370e0d4d17522dcfca80185eeb7330655633a04ef31e1d838be4f92b6a7b1

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    8fd8e054ba10661e530e54511658ac20

    SHA1

    72911622012ddf68f95c1e1424894ecb4442e6fd

    SHA256

    822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7

    SHA512

    c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c

  • memory/2092-0-0x0000000074E01000-0x0000000074E02000-memory.dmp

    Filesize

    4KB

  • memory/2092-1-0x0000000074E00000-0x00000000753AB000-memory.dmp

    Filesize

    5.7MB

  • memory/2092-2-0x0000000074E00000-0x00000000753AB000-memory.dmp

    Filesize

    5.7MB

  • memory/2092-24-0x0000000074E00000-0x00000000753AB000-memory.dmp

    Filesize

    5.7MB

  • memory/2276-8-0x0000000074E00000-0x00000000753AB000-memory.dmp

    Filesize

    5.7MB

  • memory/2276-18-0x0000000074E00000-0x00000000753AB000-memory.dmp

    Filesize

    5.7MB