Analysis
-
max time kernel
95s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 14:26
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe
-
Size
4.3MB
-
MD5
b34b1bf4f4afc8a22be19b7836e606f0
-
SHA1
e022ac0aed613ca33790e20b930077c1847dc4a9
-
SHA256
5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597
-
SHA512
2b412fe8b055e18edd62ef42bfa8ec681a48ac8b5632109282afb7c783250bcd31fec4b0706b214e77b2195910294135fc0ee612066e99cce8a1efa4d63210d6
-
SSDEEP
98304:75smRrI8l31tXy5Bl5tdmDp0DVsjKkOenvtvow:7Jasyp5OeD2jTDv6w
Malware Config
Extracted
metasploit
windows/single_exec
Signatures
-
Glupteba family
-
Glupteba payload 9 IoCs
resource yara_rule behavioral2/memory/1504-2-0x0000000002EA0000-0x00000000037BE000-memory.dmp family_glupteba behavioral2/memory/1504-3-0x0000000000400000-0x0000000000D39000-memory.dmp family_glupteba behavioral2/memory/1504-6-0x0000000000400000-0x0000000000D39000-memory.dmp family_glupteba behavioral2/memory/1504-7-0x0000000002EA0000-0x00000000037BE000-memory.dmp family_glupteba behavioral2/memory/1504-5-0x0000000000400000-0x0000000002574000-memory.dmp family_glupteba behavioral2/memory/1956-9-0x0000000000400000-0x0000000002574000-memory.dmp family_glupteba behavioral2/memory/1956-10-0x0000000000400000-0x0000000002574000-memory.dmp family_glupteba behavioral2/memory/1956-17-0x0000000000400000-0x0000000002574000-memory.dmp family_glupteba behavioral2/memory/4940-18-0x0000000000400000-0x0000000002574000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3628 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 4940 csrss.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MorningFeather = "\"C:\\Windows\\rss\\csrss.exe\"" JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe File created C:\Windows\rss\csrss.exe JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Program crash 41 IoCs
pid pid_target Process procid_target 4940 1504 WerFault.exe 82 3500 1504 WerFault.exe 82 64 1504 WerFault.exe 82 2168 1504 WerFault.exe 82 3528 1504 WerFault.exe 82 3264 1504 WerFault.exe 82 3368 1504 WerFault.exe 82 972 1504 WerFault.exe 82 396 1504 WerFault.exe 82 3204 1504 WerFault.exe 82 4460 1504 WerFault.exe 82 4472 1504 WerFault.exe 82 2200 1504 WerFault.exe 82 4820 1504 WerFault.exe 82 4660 1504 WerFault.exe 82 4636 1504 WerFault.exe 82 2568 1504 WerFault.exe 82 4432 1504 WerFault.exe 82 3756 1504 WerFault.exe 82 852 1504 WerFault.exe 82 5080 1504 WerFault.exe 82 4556 1956 WerFault.exe 130 3992 1956 WerFault.exe 130 2128 1956 WerFault.exe 130 4932 1956 WerFault.exe 130 2256 1956 WerFault.exe 130 4500 1956 WerFault.exe 130 1324 1956 WerFault.exe 130 1580 1956 WerFault.exe 130 4804 1956 WerFault.exe 130 3824 1956 WerFault.exe 130 4908 1956 WerFault.exe 130 3612 1956 WerFault.exe 130 404 1956 WerFault.exe 130 1492 1956 WerFault.exe 130 2280 1956 WerFault.exe 130 2324 1956 WerFault.exe 130 4184 1956 WerFault.exe 130 2896 1956 WerFault.exe 130 3216 1956 WerFault.exe 130 3988 4940 WerFault.exe 173 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 18 Go-http-client/1.1 -
Modifies data under HKEY_USERS 40 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1504 JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe 1504 JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe 1956 JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe 1956 JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe 1956 JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe 1956 JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe 1956 JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe 1956 JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe 1956 JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe 1956 JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe 1956 JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe 1956 JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1504 JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe Token: SeImpersonatePrivilege 1504 JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe Token: SeSystemEnvironmentPrivilege 1956 JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1956 wrote to memory of 3548 1956 JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe 170 PID 1956 wrote to memory of 3548 1956 JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe 170 PID 3548 wrote to memory of 3628 3548 cmd.exe 172 PID 3548 wrote to memory of 3628 3548 cmd.exe 172 PID 1956 wrote to memory of 4940 1956 JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe 173 PID 1956 wrote to memory of 4940 1956 JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe 173 PID 1956 wrote to memory of 4940 1956 JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe 173
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1504 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 3322⤵
- Program crash
PID:4940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 3362⤵
- Program crash
PID:3500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 3362⤵
- Program crash
PID:64
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 6042⤵
- Program crash
PID:2168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 6962⤵
- Program crash
PID:3528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 7122⤵
- Program crash
PID:3264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 7282⤵
- Program crash
PID:3368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 7522⤵
- Program crash
PID:972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 7762⤵
- Program crash
PID:396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 8682⤵
- Program crash
PID:3204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 8602⤵
- Program crash
PID:4460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 7482⤵
- Program crash
PID:4472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 6882⤵
- Program crash
PID:2200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 6202⤵
- Program crash
PID:4820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 6162⤵
- Program crash
PID:4660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 8202⤵
- Program crash
PID:4636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 7762⤵
- Program crash
PID:2568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 7762⤵
- Program crash
PID:4432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 8282⤵
- Program crash
PID:3756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 8522⤵
- Program crash
PID:852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 6722⤵
- Program crash
PID:5080
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1956 -s 2963⤵
- Program crash
PID:4556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1956 -s 3003⤵
- Program crash
PID:3992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1956 -s 3003⤵
- Program crash
PID:2128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1956 -s 6483⤵
- Program crash
PID:4932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1956 -s 6483⤵
- Program crash
PID:2256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1956 -s 6483⤵
- Program crash
PID:4500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1956 -s 6963⤵
- Program crash
PID:1324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1956 -s 7243⤵
- Program crash
PID:1580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1956 -s 7163⤵
- Program crash
PID:4804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1956 -s 5883⤵
- Program crash
PID:3824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1956 -s 8123⤵
- Program crash
PID:4908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1956 -s 7803⤵
- Program crash
PID:3612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1956 -s 8483⤵
- Program crash
PID:404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1956 -s 8123⤵
- Program crash
PID:1492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1956 -s 8403⤵
- Program crash
PID:2280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1956 -s 9283⤵
- Program crash
PID:2324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1956 -s 13883⤵
- Program crash
PID:4184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1956 -s 14643⤵
- Program crash
PID:2896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1956 -s 14763⤵
- Program crash
PID:3216
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:3628
-
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe /51-513⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4940 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4940 -s 3324⤵
- Program crash
PID:3988
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1504 -ip 15041⤵PID:3512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1504 -ip 15041⤵PID:552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1504 -ip 15041⤵PID:2052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1504 -ip 15041⤵PID:2892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1504 -ip 15041⤵PID:460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1504 -ip 15041⤵PID:3644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1504 -ip 15041⤵PID:1496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1504 -ip 15041⤵PID:1820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1504 -ip 15041⤵PID:2696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1504 -ip 15041⤵PID:3460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1504 -ip 15041⤵PID:944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1504 -ip 15041⤵PID:3160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1504 -ip 15041⤵PID:4744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1504 -ip 15041⤵PID:724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1504 -ip 15041⤵PID:3584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1504 -ip 15041⤵PID:2192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1504 -ip 15041⤵PID:2988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1504 -ip 15041⤵PID:1164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1504 -ip 15041⤵PID:4240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1504 -ip 15041⤵PID:4340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1504 -ip 15041⤵PID:4656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1956 -ip 19561⤵PID:4020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1956 -ip 19561⤵PID:2664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1956 -ip 19561⤵PID:2936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1956 -ip 19561⤵PID:3600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1956 -ip 19561⤵PID:2508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1956 -ip 19561⤵PID:3344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1956 -ip 19561⤵PID:216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1956 -ip 19561⤵PID:3640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1956 -ip 19561⤵PID:4784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1956 -ip 19561⤵PID:1800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1956 -ip 19561⤵PID:5068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1956 -ip 19561⤵PID:4696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1956 -ip 19561⤵PID:3960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1956 -ip 19561⤵PID:5064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1956 -ip 19561⤵PID:116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1956 -ip 19561⤵PID:1740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1956 -ip 19561⤵PID:1596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1956 -ip 19561⤵PID:3408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1956 -ip 19561⤵PID:4040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4940 -ip 49401⤵PID:4284
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD5b34b1bf4f4afc8a22be19b7836e606f0
SHA1e022ac0aed613ca33790e20b930077c1847dc4a9
SHA2565898a75f35e6936c59ad90125f0c8e640af74f808db426f5c13b0fb0f2850597
SHA5122b412fe8b055e18edd62ef42bfa8ec681a48ac8b5632109282afb7c783250bcd31fec4b0706b214e77b2195910294135fc0ee612066e99cce8a1efa4d63210d6