Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
14-12-2024 12:23
Static task
static1
Behavioral task
behavioral1
Sample
eebe0a8ea893d6b546d8c4ee876e54ca_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
eebe0a8ea893d6b546d8c4ee876e54ca_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
eebe0a8ea893d6b546d8c4ee876e54ca_JaffaCakes118.exe
-
Size
78KB
-
MD5
eebe0a8ea893d6b546d8c4ee876e54ca
-
SHA1
784284c58b5c3ba6e3d36028aaa1f71b92c9af3d
-
SHA256
f187c2edd53b11f3b7e309267c3128866baa444d1c9d363c11fe725f19b47f5d
-
SHA512
6a1462e2c8c877186bd033b1f988796a689260bb7a51779da8cc54b0eac3cf96b52815d4b6de51ea549c59b72e6009c5e680916a70348b74997ef9e5711293f1
-
SSDEEP
1536:HSV5OXT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQtN6g9/N1i0:HSV5GSyRxvhTzXPvCbW2UP9/P
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Deletes itself 1 IoCs
pid Process 2248 tmpD0C7.tmp.exe -
Executes dropped EXE 1 IoCs
pid Process 2248 tmpD0C7.tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 2284 eebe0a8ea893d6b546d8c4ee876e54ca_JaffaCakes118.exe 2284 eebe0a8ea893d6b546d8c4ee876e54ca_JaffaCakes118.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\aspnet_state_perf = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\System.Web.exe\"" tmpD0C7.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eebe0a8ea893d6b546d8c4ee876e54ca_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpD0C7.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2284 eebe0a8ea893d6b546d8c4ee876e54ca_JaffaCakes118.exe Token: SeDebugPrivilege 2248 tmpD0C7.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2284 wrote to memory of 2384 2284 eebe0a8ea893d6b546d8c4ee876e54ca_JaffaCakes118.exe 30 PID 2284 wrote to memory of 2384 2284 eebe0a8ea893d6b546d8c4ee876e54ca_JaffaCakes118.exe 30 PID 2284 wrote to memory of 2384 2284 eebe0a8ea893d6b546d8c4ee876e54ca_JaffaCakes118.exe 30 PID 2284 wrote to memory of 2384 2284 eebe0a8ea893d6b546d8c4ee876e54ca_JaffaCakes118.exe 30 PID 2384 wrote to memory of 2192 2384 vbc.exe 32 PID 2384 wrote to memory of 2192 2384 vbc.exe 32 PID 2384 wrote to memory of 2192 2384 vbc.exe 32 PID 2384 wrote to memory of 2192 2384 vbc.exe 32 PID 2284 wrote to memory of 2248 2284 eebe0a8ea893d6b546d8c4ee876e54ca_JaffaCakes118.exe 33 PID 2284 wrote to memory of 2248 2284 eebe0a8ea893d6b546d8c4ee876e54ca_JaffaCakes118.exe 33 PID 2284 wrote to memory of 2248 2284 eebe0a8ea893d6b546d8c4ee876e54ca_JaffaCakes118.exe 33 PID 2284 wrote to memory of 2248 2284 eebe0a8ea893d6b546d8c4ee876e54ca_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\eebe0a8ea893d6b546d8c4ee876e54ca_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eebe0a8ea893d6b546d8c4ee876e54ca_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\awkfsfck.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD2BB.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD2BA.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:2192
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmpD0C7.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpD0C7.tmp.exe" C:\Users\Admin\AppData\Local\Temp\eebe0a8ea893d6b546d8c4ee876e54ca_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2248
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a2721cfad75f7515bebf99606b26c0d0
SHA18f99d26a8bb3acfdca37786178a437f53e938618
SHA2565832aec12b19b9e9aa8981049b34d79bfa0a71c45e77d5d82b347a778489a7fa
SHA512192702aa2f14735bcc851ee8d5a2d98523892a4daee2960c2af5ee1d91dd9f03702049967ce3d9babbeaf8b8843e0e713dd3ed0615472949a8962e0e3be9164c
-
Filesize
14KB
MD599fbc56dc458ec57d705222b7c45f62a
SHA1a9757746560236028f664a6d5e86291cd4122e8f
SHA2560def7b03213f51264b53e552859b7d7195c4ac5fdc452555c2b547fb2d820bf1
SHA512b779d24b20322c37a3a6e39fed8c1024f8d71a198eb3774790f31a6c9e34353421b2344f26c9307134938afcc77131a9bd5c92fd4eb69566642d55d321b0620f
-
Filesize
266B
MD5172cb472241ebd1b79a8172e18f02e69
SHA161173af47b0123b18956d70b0d8c547579463f8d
SHA256bf1ebe010920f2854cd638aba0bb9cc5f539c4396316a9b7149f740ab4ec2398
SHA5125fd27c132a37d96015f77650b09d482d2fe4a86e096f74219ccb24834fbd7d2ae4d6cb9240d870447c76cb5154544d865feee8cbbc72cbe06b0fdce23c9a8d15
-
Filesize
78KB
MD5b290b83d041849f2d2b8e7e89a9d1ec1
SHA1797fbfe25228b83f74b3fdd6af1b70c908c4dd09
SHA25650c27b8534af4151c248ce9377b65c4420f8db62f213ec06383ae76214ce3b6f
SHA512bcaba1d85ea6b78016c19136c7bbccd2c70a1a7a3013f8ba3c2c09737d9a3e814ad037910e1601150a36ebe5d62580853e7e420cc380e2d58171c24731ff3543
-
Filesize
660B
MD5c768d80eb032f51aeda21b0c60c27d70
SHA169fa897ea695f61ff1d846a18634cd8f72a92ece
SHA256049af5a5345386067f87231faa0c714e542d386d8ab440f4a46d670d11b02910
SHA512a67d4ea7b3124f355ff1483a6f95dd1c67c018c4de9e8d49def91d0cadd388d65dd9543d0b5bb8a354b1d854f6454598f6f54c0f99d5a8e9dd257373a247efec
-
Filesize
62KB
MD58fd8e054ba10661e530e54511658ac20
SHA172911622012ddf68f95c1e1424894ecb4442e6fd
SHA256822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7
SHA512c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c