Analysis
-
max time kernel
95s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 13:02
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe
-
Size
4.3MB
-
MD5
6f6fa048ae77ffd1831c8921c7489cea
-
SHA1
c4978b61c6312a3550c55b12b636cd7a9f081b18
-
SHA256
de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff
-
SHA512
51e15aa618ec95986ef23612baced7ec455bfa2c788fcdeaf97db0ffeba42a0aed625e641c0954cdd0c829bfa5cb8c6cc24fa3fcf07e0a22796d5120faf77d54
-
SSDEEP
98304:6/627RFGKuqngjLO4GKXEoBjXY+AKnP7Mxye8:6/66TGKu5jLtX1vznP7o8
Malware Config
Extracted
metasploit
windows/single_exec
Signatures
-
Glupteba family
-
Glupteba payload 9 IoCs
resource yara_rule behavioral2/memory/4992-2-0x0000000002C20000-0x000000000353E000-memory.dmp family_glupteba behavioral2/memory/4992-3-0x0000000000400000-0x0000000000D39000-memory.dmp family_glupteba behavioral2/memory/4992-7-0x0000000002C20000-0x000000000353E000-memory.dmp family_glupteba behavioral2/memory/4992-6-0x0000000000400000-0x0000000000D39000-memory.dmp family_glupteba behavioral2/memory/4992-5-0x0000000000400000-0x0000000002574000-memory.dmp family_glupteba behavioral2/memory/3900-9-0x0000000000400000-0x0000000002574000-memory.dmp family_glupteba behavioral2/memory/3900-10-0x0000000000400000-0x0000000002574000-memory.dmp family_glupteba behavioral2/memory/3900-17-0x0000000000400000-0x0000000002574000-memory.dmp family_glupteba behavioral2/memory/2136-18-0x0000000000400000-0x0000000002574000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3704 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 2136 csrss.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WildWater = "\"C:\\Windows\\rss\\csrss.exe\"" JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe File created C:\Windows\rss\csrss.exe JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Program crash 42 IoCs
pid pid_target Process procid_target 2512 4992 WerFault.exe 81 3980 4992 WerFault.exe 81 3620 4992 WerFault.exe 81 1044 4992 WerFault.exe 81 1104 4992 WerFault.exe 81 3776 4992 WerFault.exe 81 2124 4992 WerFault.exe 81 4728 4992 WerFault.exe 81 2656 4992 WerFault.exe 81 1968 4992 WerFault.exe 81 1808 4992 WerFault.exe 81 2036 4992 WerFault.exe 81 220 4992 WerFault.exe 81 968 4992 WerFault.exe 81 4612 4992 WerFault.exe 81 5012 4992 WerFault.exe 81 1736 4992 WerFault.exe 81 1828 4992 WerFault.exe 81 2932 4992 WerFault.exe 81 1732 4992 WerFault.exe 81 1348 4992 WerFault.exe 81 2936 3900 WerFault.exe 128 2384 3900 WerFault.exe 128 2996 3900 WerFault.exe 128 808 3900 WerFault.exe 128 2284 3900 WerFault.exe 128 2648 3900 WerFault.exe 128 952 3900 WerFault.exe 128 4720 3900 WerFault.exe 128 4000 3900 WerFault.exe 128 2976 3900 WerFault.exe 128 4140 3900 WerFault.exe 128 3092 3900 WerFault.exe 128 4600 3900 WerFault.exe 128 4868 3900 WerFault.exe 128 4428 3900 WerFault.exe 128 2544 3900 WerFault.exe 128 3404 3900 WerFault.exe 128 3864 3900 WerFault.exe 128 4488 3900 WerFault.exe 128 3980 3900 WerFault.exe 128 2332 2136 WerFault.exe 175 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrss.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 18 Go-http-client/1.1 -
Modifies data under HKEY_USERS 40 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4992 JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe 4992 JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe 3900 JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe 3900 JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe 3900 JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe 3900 JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe 3900 JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe 3900 JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe 3900 JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe 3900 JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe 3900 JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe 3900 JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4992 JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe Token: SeImpersonatePrivilege 4992 JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe Token: SeSystemEnvironmentPrivilege 3900 JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3900 wrote to memory of 3744 3900 JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe 168 PID 3900 wrote to memory of 3744 3900 JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe 168 PID 3744 wrote to memory of 3704 3744 cmd.exe 172 PID 3744 wrote to memory of 3704 3744 cmd.exe 172 PID 3900 wrote to memory of 2136 3900 JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe 175 PID 3900 wrote to memory of 2136 3900 JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe 175 PID 3900 wrote to memory of 2136 3900 JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe 175
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4992 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 3282⤵
- Program crash
PID:2512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 3522⤵
- Program crash
PID:3980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 3362⤵
- Program crash
PID:3620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 6042⤵
- Program crash
PID:1044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 6962⤵
- Program crash
PID:1104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 6962⤵
- Program crash
PID:3776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 7242⤵
- Program crash
PID:2124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 7522⤵
- Program crash
PID:4728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 7722⤵
- Program crash
PID:2656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 6402⤵
- Program crash
PID:1968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 7642⤵
- Program crash
PID:1808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 7642⤵
- Program crash
PID:2036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 7602⤵
- Program crash
PID:220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 8642⤵
- Program crash
PID:968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 8482⤵
- Program crash
PID:4612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 8482⤵
- Program crash
PID:5012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 6962⤵
- Program crash
PID:1736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 7722⤵
- Program crash
PID:1828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 8802⤵
- Program crash
PID:2932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 7402⤵
- Program crash
PID:1732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 7482⤵
- Program crash
PID:1348
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3900 -s 2923⤵
- Program crash
PID:2936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3900 -s 2963⤵
- Program crash
PID:2384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3900 -s 3123⤵
- Program crash
PID:2996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3900 -s 6283⤵
- Program crash
PID:808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3900 -s 6283⤵
- Program crash
PID:2284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3900 -s 6923⤵
- Program crash
PID:2648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3900 -s 6923⤵
- Program crash
PID:952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3900 -s 6843⤵
- Program crash
PID:4720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3900 -s 7283⤵
- Program crash
PID:4000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3900 -s 5923⤵
- Program crash
PID:2976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3900 -s 7843⤵
- Program crash
PID:4140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3900 -s 5723⤵
- Program crash
PID:3092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3900 -s 8483⤵
- Program crash
PID:4600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3900 -s 7403⤵
- Program crash
PID:4868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3900 -s 7363⤵
- Program crash
PID:4428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3900 -s 9283⤵
- Program crash
PID:2544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3900 -s 14323⤵
- Program crash
PID:3404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3900 -s 14483⤵
- Program crash
PID:3864
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:3704
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3900 -s 14523⤵
- Program crash
PID:4488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3900 -s 14523⤵
- Program crash
PID:3980
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe /51-513⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2136 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2136 -s 3284⤵
- Program crash
PID:2332
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4992 -ip 49921⤵PID:4988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4992 -ip 49921⤵PID:4920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4992 -ip 49921⤵PID:2120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4992 -ip 49921⤵PID:4800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4992 -ip 49921⤵PID:2068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4992 -ip 49921⤵PID:1352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4992 -ip 49921⤵PID:2256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4992 -ip 49921⤵PID:4912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4992 -ip 49921⤵PID:3308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4992 -ip 49921⤵PID:212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4992 -ip 49921⤵PID:1452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4992 -ip 49921⤵PID:3044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4992 -ip 49921⤵PID:1656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4992 -ip 49921⤵PID:4944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4992 -ip 49921⤵PID:1320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4992 -ip 49921⤵PID:2064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4992 -ip 49921⤵PID:3460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4992 -ip 49921⤵PID:3728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4992 -ip 49921⤵PID:1316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4992 -ip 49921⤵PID:2764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4992 -ip 49921⤵PID:4392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3900 -ip 39001⤵PID:924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3900 -ip 39001⤵PID:2496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3900 -ip 39001⤵PID:4104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3900 -ip 39001⤵PID:5092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3900 -ip 39001⤵PID:4816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3900 -ip 39001⤵PID:4848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3900 -ip 39001⤵PID:3964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3900 -ip 39001⤵PID:1128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3900 -ip 39001⤵PID:1892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3900 -ip 39001⤵PID:8
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3900 -ip 39001⤵PID:1692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3900 -ip 39001⤵PID:2132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3900 -ip 39001⤵PID:5084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3900 -ip 39001⤵PID:4056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3900 -ip 39001⤵PID:4552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3900 -ip 39001⤵PID:3312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3900 -ip 39001⤵PID:1620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3900 -ip 39001⤵PID:4988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3900 -ip 39001⤵PID:3592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3900 -ip 39001⤵PID:3260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2136 -ip 21361⤵PID:2340
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD56f6fa048ae77ffd1831c8921c7489cea
SHA1c4978b61c6312a3550c55b12b636cd7a9f081b18
SHA256de05b59c949eac6a9d177af599348327537aa4ba1fe62477e22b9250dd8813ff
SHA51251e15aa618ec95986ef23612baced7ec455bfa2c788fcdeaf97db0ffeba42a0aed625e641c0954cdd0c829bfa5cb8c6cc24fa3fcf07e0a22796d5120faf77d54