Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2024 13:58
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe
-
Size
4.3MB
-
MD5
7c5832be543534584f00ae5fe0f77407
-
SHA1
72c6cab9a263486d68539657cb72a47b7bc25f25
-
SHA256
8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09
-
SHA512
400f49e46b6649875fb086f6379ba6f38b3a54d21e576ff141133402d5e06b87e605706bd0e1fed2b2e5d3fe724ed4347bc930bc49d482a7ceb6a5bab76b656a
-
SSDEEP
98304:6/627RFGKuqngjLO4GKXEoBjXY+AKnP7Mxye5:6/66TGKu5jLtX1vznP7o5
Malware Config
Extracted
metasploit
windows/single_exec
Signatures
-
Glupteba family
-
Glupteba payload 9 IoCs
resource yara_rule behavioral2/memory/4616-2-0x0000000002FA0000-0x00000000038BE000-memory.dmp family_glupteba behavioral2/memory/4616-3-0x0000000000400000-0x0000000000D39000-memory.dmp family_glupteba behavioral2/memory/4616-7-0x0000000002FA0000-0x00000000038BE000-memory.dmp family_glupteba behavioral2/memory/4616-5-0x0000000000400000-0x0000000002574000-memory.dmp family_glupteba behavioral2/memory/4616-6-0x0000000000400000-0x0000000000D39000-memory.dmp family_glupteba behavioral2/memory/3896-9-0x0000000000400000-0x0000000002574000-memory.dmp family_glupteba behavioral2/memory/3896-10-0x0000000000400000-0x0000000002574000-memory.dmp family_glupteba behavioral2/memory/3896-14-0x0000000000400000-0x0000000002574000-memory.dmp family_glupteba behavioral2/memory/4908-17-0x0000000000400000-0x0000000002574000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2852 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 4908 csrss.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ColdSun = "\"C:\\Windows\\rss\\csrss.exe\"" JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe File created C:\Windows\rss\csrss.exe JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Program crash 41 IoCs
pid pid_target Process procid_target 5116 4616 WerFault.exe 81 2700 4616 WerFault.exe 81 3360 4616 WerFault.exe 81 4940 4616 WerFault.exe 81 3684 4616 WerFault.exe 81 2440 4616 WerFault.exe 81 1284 4616 WerFault.exe 81 952 4616 WerFault.exe 81 3904 4616 WerFault.exe 81 2872 4616 WerFault.exe 81 1540 4616 WerFault.exe 81 3564 4616 WerFault.exe 81 3284 4616 WerFault.exe 81 3576 4616 WerFault.exe 81 1820 4616 WerFault.exe 81 4056 4616 WerFault.exe 81 2652 4616 WerFault.exe 81 4900 4616 WerFault.exe 81 1404 4616 WerFault.exe 81 4420 4616 WerFault.exe 81 1828 4616 WerFault.exe 81 4488 3896 WerFault.exe 128 440 3896 WerFault.exe 128 4480 3896 WerFault.exe 128 4000 3896 WerFault.exe 128 3192 3896 WerFault.exe 128 3972 3896 WerFault.exe 128 1436 3896 WerFault.exe 128 5096 3896 WerFault.exe 128 2468 3896 WerFault.exe 128 2188 3896 WerFault.exe 128 4352 3896 WerFault.exe 128 4636 3896 WerFault.exe 128 4416 3896 WerFault.exe 128 3188 3896 WerFault.exe 128 4760 3896 WerFault.exe 128 2992 3896 WerFault.exe 128 4212 3896 WerFault.exe 128 4712 3896 WerFault.exe 128 2080 3896 WerFault.exe 128 3360 4908 WerFault.exe 173 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrss.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 17 Go-http-client/1.1 -
Modifies data under HKEY_USERS 40 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4616 JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe 4616 JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe 3896 JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe 3896 JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe 3896 JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe 3896 JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe 3896 JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe 3896 JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe 3896 JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe 3896 JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe 3896 JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe 3896 JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4616 JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe Token: SeImpersonatePrivilege 4616 JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe Token: SeSystemEnvironmentPrivilege 3896 JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3896 wrote to memory of 2104 3896 JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe 170 PID 3896 wrote to memory of 2104 3896 JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe 170 PID 2104 wrote to memory of 2852 2104 cmd.exe 172 PID 2104 wrote to memory of 2852 2104 cmd.exe 172 PID 3896 wrote to memory of 4908 3896 JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe 173 PID 3896 wrote to memory of 4908 3896 JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe 173 PID 3896 wrote to memory of 4908 3896 JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe 173
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4616 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4616 -s 3282⤵
- Program crash
PID:5116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4616 -s 3522⤵
- Program crash
PID:2700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4616 -s 3442⤵
- Program crash
PID:3360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4616 -s 6042⤵
- Program crash
PID:4940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4616 -s 6882⤵
- Program crash
PID:3684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4616 -s 6882⤵
- Program crash
PID:2440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4616 -s 7322⤵
- Program crash
PID:1284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4616 -s 7402⤵
- Program crash
PID:952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4616 -s 7562⤵
- Program crash
PID:3904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4616 -s 6402⤵
- Program crash
PID:2872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4616 -s 8082⤵
- Program crash
PID:1540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4616 -s 8922⤵
- Program crash
PID:3564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4616 -s 9082⤵
- Program crash
PID:3284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4616 -s 6562⤵
- Program crash
PID:3576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4616 -s 8882⤵
- Program crash
PID:1820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4616 -s 7562⤵
- Program crash
PID:4056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4616 -s 7242⤵
- Program crash
PID:2652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4616 -s 6162⤵
- Program crash
PID:4900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4616 -s 9162⤵
- Program crash
PID:1404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4616 -s 7722⤵
- Program crash
PID:4420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4616 -s 9362⤵
- Program crash
PID:1828
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 2923⤵
- Program crash
PID:4488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 2963⤵
- Program crash
PID:440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 2963⤵
- Program crash
PID:4480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 6403⤵
- Program crash
PID:4000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 6403⤵
- Program crash
PID:3192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 6403⤵
- Program crash
PID:3972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 7003⤵
- Program crash
PID:1436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 7083⤵
- Program crash
PID:5096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 7283⤵
- Program crash
PID:2468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 6683⤵
- Program crash
PID:2188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 8483⤵
- Program crash
PID:4352
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 7683⤵
- Program crash
PID:4636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 8283⤵
- Program crash
PID:4416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 8243⤵
- Program crash
PID:3188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 9443⤵
- Program crash
PID:4760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 9483⤵
- Program crash
PID:2992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 13883⤵
- Program crash
PID:4212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 14483⤵
- Program crash
PID:4712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 14683⤵
- Program crash
PID:2080
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2852
-
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe /188-1883⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4908 -s 3284⤵
- Program crash
PID:3360
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4616 -ip 46161⤵PID:4888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4616 -ip 46161⤵PID:5088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4616 -ip 46161⤵PID:3036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4616 -ip 46161⤵PID:3380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4616 -ip 46161⤵PID:3728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4616 -ip 46161⤵PID:3140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4616 -ip 46161⤵PID:956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4616 -ip 46161⤵PID:4860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4616 -ip 46161⤵PID:5008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4616 -ip 46161⤵PID:4496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4616 -ip 46161⤵PID:3004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4616 -ip 46161⤵PID:1120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4616 -ip 46161⤵PID:4708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4616 -ip 46161⤵PID:5032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4616 -ip 46161⤵PID:1016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4616 -ip 46161⤵PID:2376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4616 -ip 46161⤵PID:1780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4616 -ip 46161⤵PID:1636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4616 -ip 46161⤵PID:960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4616 -ip 46161⤵PID:2472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4616 -ip 46161⤵PID:2732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3896 -ip 38961⤵PID:2844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3896 -ip 38961⤵PID:3636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 3896 -ip 38961⤵PID:3376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3896 -ip 38961⤵PID:3852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3896 -ip 38961⤵PID:2112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3896 -ip 38961⤵PID:2176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3896 -ip 38961⤵PID:752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3896 -ip 38961⤵PID:4012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3896 -ip 38961⤵PID:3320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3896 -ip 38961⤵PID:1696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 3896 -ip 38961⤵PID:4568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3896 -ip 38961⤵PID:4588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3896 -ip 38961⤵PID:3976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3896 -ip 38961⤵PID:852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3896 -ip 38961⤵PID:2740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 3896 -ip 38961⤵PID:1940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3896 -ip 38961⤵PID:4604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3896 -ip 38961⤵PID:592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3896 -ip 38961⤵PID:1596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4908 -ip 49081⤵PID:4572
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD57c5832be543534584f00ae5fe0f77407
SHA172c6cab9a263486d68539657cb72a47b7bc25f25
SHA2568f07a13fe71003959a4f4d5a9bf4efede5394d6265fa1f129c45c58a76771e09
SHA512400f49e46b6649875fb086f6379ba6f38b3a54d21e576ff141133402d5e06b87e605706bd0e1fed2b2e5d3fe724ed4347bc930bc49d482a7ceb6a5bab76b656a