Analysis
-
max time kernel
95s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 20:34
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_a14be146e6c7b6d321a446054e19927ac64c72ef96d9db70041ddd0585db7728.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_a14be146e6c7b6d321a446054e19927ac64c72ef96d9db70041ddd0585db7728.exe
-
Size
4.4MB
-
MD5
6df2aee2b3c10a4d872443f8d30cf385
-
SHA1
a183e12ea602281cce49aa37d8efbb77fb50d390
-
SHA256
a14be146e6c7b6d321a446054e19927ac64c72ef96d9db70041ddd0585db7728
-
SHA512
9c5b64129498f249a0fe4847821cb53cd08200b8adfda2d16c06b49d211267dc9fa276df9fac7f4da13cbf7ef1fc3627eaee6b976a655c894eec4109e31699a4
-
SSDEEP
98304:xQmr8tKWpjh3Rgxccd6LlTPaisnI0OSXq04BdcC4ff9xjQelv4aHBe3y6G:xQuZWpjh3R4cG6JilIyXq0KJ4ff9xseD
Malware Config
Extracted
metasploit
windows/single_exec
Signatures
-
Glupteba family
-
Glupteba payload 6 IoCs
resource yara_rule behavioral2/memory/3412-2-0x0000000002D50000-0x0000000003677000-memory.dmp family_glupteba behavioral2/memory/3412-3-0x0000000000400000-0x0000000000D41000-memory.dmp family_glupteba behavioral2/memory/3412-6-0x0000000000400000-0x0000000000D41000-memory.dmp family_glupteba behavioral2/memory/3412-7-0x0000000002D50000-0x0000000003677000-memory.dmp family_glupteba behavioral2/memory/3412-5-0x0000000000400000-0x0000000002583000-memory.dmp family_glupteba behavioral2/memory/1208-9-0x0000000000400000-0x0000000002583000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Program crash 22 IoCs
pid pid_target Process procid_target 2692 3412 WerFault.exe 82 4276 3412 WerFault.exe 82 2164 3412 WerFault.exe 82 2688 3412 WerFault.exe 82 324 3412 WerFault.exe 82 1852 3412 WerFault.exe 82 2736 3412 WerFault.exe 82 3460 3412 WerFault.exe 82 1860 3412 WerFault.exe 82 2512 3412 WerFault.exe 82 3548 3412 WerFault.exe 82 1704 3412 WerFault.exe 82 2368 3412 WerFault.exe 82 5068 3412 WerFault.exe 82 2272 3412 WerFault.exe 82 1560 3412 WerFault.exe 82 2932 3412 WerFault.exe 82 4100 3412 WerFault.exe 82 2384 3412 WerFault.exe 82 2648 3412 WerFault.exe 82 1700 3412 WerFault.exe 82 1568 1208 WerFault.exe 130 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_a14be146e6c7b6d321a446054e19927ac64c72ef96d9db70041ddd0585db7728.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3412 JaffaCakes118_a14be146e6c7b6d321a446054e19927ac64c72ef96d9db70041ddd0585db7728.exe 3412 JaffaCakes118_a14be146e6c7b6d321a446054e19927ac64c72ef96d9db70041ddd0585db7728.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3412 JaffaCakes118_a14be146e6c7b6d321a446054e19927ac64c72ef96d9db70041ddd0585db7728.exe Token: SeImpersonatePrivilege 3412 JaffaCakes118_a14be146e6c7b6d321a446054e19927ac64c72ef96d9db70041ddd0585db7728.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a14be146e6c7b6d321a446054e19927ac64c72ef96d9db70041ddd0585db7728.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a14be146e6c7b6d321a446054e19927ac64c72ef96d9db70041ddd0585db7728.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3412 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3412 -s 3282⤵
- Program crash
PID:2692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3412 -s 3322⤵
- Program crash
PID:4276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3412 -s 3322⤵
- Program crash
PID:2164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3412 -s 6042⤵
- Program crash
PID:2688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3412 -s 6962⤵
- Program crash
PID:324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3412 -s 7122⤵
- Program crash
PID:1852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3412 -s 7282⤵
- Program crash
PID:2736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3412 -s 7362⤵
- Program crash
PID:3460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3412 -s 7482⤵
- Program crash
PID:1860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3412 -s 8002⤵
- Program crash
PID:2512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3412 -s 6242⤵
- Program crash
PID:3548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3412 -s 6802⤵
- Program crash
PID:1704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3412 -s 8202⤵
- Program crash
PID:2368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3412 -s 8402⤵
- Program crash
PID:5068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3412 -s 8482⤵
- Program crash
PID:2272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3412 -s 7682⤵
- Program crash
PID:1560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3412 -s 8002⤵
- Program crash
PID:2932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3412 -s 8762⤵
- Program crash
PID:4100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3412 -s 8882⤵
- Program crash
PID:2384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3412 -s 8162⤵
- Program crash
PID:2648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3412 -s 7442⤵
- Program crash
PID:1700
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a14be146e6c7b6d321a446054e19927ac64c72ef96d9db70041ddd0585db7728.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a14be146e6c7b6d321a446054e19927ac64c72ef96d9db70041ddd0585db7728.exe"2⤵PID:1208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1208 -s 2923⤵
- Program crash
PID:1568
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3412 -ip 34121⤵PID:916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3412 -ip 34121⤵PID:1600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3412 -ip 34121⤵PID:1144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3412 -ip 34121⤵PID:4284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3412 -ip 34121⤵PID:1104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3412 -ip 34121⤵PID:3476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3412 -ip 34121⤵PID:3836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3412 -ip 34121⤵PID:652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3412 -ip 34121⤵PID:2148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3412 -ip 34121⤵PID:2608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3412 -ip 34121⤵PID:3768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3412 -ip 34121⤵PID:3600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3412 -ip 34121⤵PID:4820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3412 -ip 34121⤵PID:2500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3412 -ip 34121⤵PID:2876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3412 -ip 34121⤵PID:3700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3412 -ip 34121⤵PID:4484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3412 -ip 34121⤵PID:2936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3412 -ip 34121⤵PID:4996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3412 -ip 34121⤵PID:4504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3412 -ip 34121⤵PID:3080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1208 -ip 12081⤵PID:3524