Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
11-02-2025 08:24
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe
Resource
win10v2004-20250207-en
General
-
Target
JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe
-
Size
1.7MB
-
MD5
e46c55a543092797f9f3395240b0d722
-
SHA1
c42485b4bde8ddb0502f53ec0e95c9592ebc4db0
-
SHA256
98bbc616347efeefb3172d20cfcbcf542a1ada7f0665bc970196ae6607bcff23
-
SHA512
4b362599075dc40b212a4988628c62f2a82223ca16d0a6415340e304a2a380383669487f12a088e05a26ff79d8e8fc0f580c76c942cad7be6d4ea26f263551c9
-
SSDEEP
49152:n6VP9rFuM6zG89WDU49bNgl8unxDpYYp1HzCcpg:6DrVLF9ba/nxmIzC
Malware Config
Signatures
-
Brute Ratel C4
A customized command and control framework for red teaming and adversary simulation.
-
Bruteratel family
-
Detect BruteRatel badger 1 IoCs
resource yara_rule behavioral2/memory/3588-1-0x0000000001DD0000-0x0000000001DE2000-memory.dmp family_bruteratel -
Downloads MZ/PE file 1 IoCs
flow pid Process 39 2488 Process not Found -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3311063739-2594902809-44604183-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AV7.0 = "C:\\Program Files (x86)\\AV7.0\\antivirus7.exe" JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe File opened (read-only) \??\V: JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe File opened (read-only) \??\W: JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe File opened (read-only) \??\Y: JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe File opened (read-only) \??\G: JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe File opened (read-only) \??\I: JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe File opened (read-only) \??\J: JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe File opened (read-only) \??\K: JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe File opened (read-only) \??\T: JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe File opened (read-only) \??\X: JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe File opened (read-only) \??\Z: JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe File opened (read-only) \??\E: JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe File opened (read-only) \??\N: JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe File opened (read-only) \??\Q: JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe File opened (read-only) \??\R: JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe File opened (read-only) \??\L: JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe File opened (read-only) \??\M: JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe File opened (read-only) \??\U: JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe File opened (read-only) \??\H: JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe File opened (read-only) \??\O: JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe File opened (read-only) \??\P: JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 24 IoCs
pid pid_target Process procid_target 2012 3588 WerFault.exe 85 4448 3588 WerFault.exe 85 2488 3588 WerFault.exe 85 2252 3588 WerFault.exe 85 1608 3588 WerFault.exe 85 2388 3588 WerFault.exe 85 3752 3588 WerFault.exe 85 2608 3588 WerFault.exe 85 3676 3588 WerFault.exe 85 3448 3588 WerFault.exe 85 4936 3588 WerFault.exe 85 4728 3588 WerFault.exe 85 3800 3588 WerFault.exe 85 4360 3588 WerFault.exe 85 3608 3588 WerFault.exe 85 4332 3588 WerFault.exe 85 4028 3588 WerFault.exe 85 2080 3588 WerFault.exe 85 2012 3588 WerFault.exe 85 844 3588 WerFault.exe 85 5080 3588 WerFault.exe 85 116 3588 WerFault.exe 85 2984 3588 WerFault.exe 85 2020 3588 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1780 MicrosoftEdgeUpdate.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosDate JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe -
Modifies Control Panel 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3311063739-2594902809-44604183-1000\Control Panel\Desktop\ForegroundLockTimeout = "0" JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3588 JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe 3588 JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe 3588 JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe 3588 JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe 3588 JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe 3588 JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe 3588 JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe 3588 JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3588 JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe 3588 JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3588 JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe 3588 JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe"1⤵
- Checks BIOS information in registry
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3588 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 7202⤵
- Program crash
PID:2012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 7482⤵
- Program crash
PID:4448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 11722⤵
- Program crash
PID:2488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 12802⤵
- Program crash
PID:2252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 13002⤵
- Program crash
PID:1608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 13362⤵
- Program crash
PID:2388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 13442⤵
- Program crash
PID:3752
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 13962⤵
- Program crash
PID:2608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 13322⤵
- Program crash
PID:3676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 17442⤵
- Program crash
PID:3448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 18162⤵
- Program crash
PID:4936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 20122⤵
- Program crash
PID:4728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 20562⤵
- Program crash
PID:3800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 15362⤵
- Program crash
PID:4360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 21202⤵
- Program crash
PID:3608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 24762⤵
- Program crash
PID:4332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 24922⤵
- Program crash
PID:4028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 25042⤵
- Program crash
PID:2080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 25002⤵
- Program crash
PID:2012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 21682⤵
- Program crash
PID:844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 10922⤵
- Program crash
PID:5080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 24842⤵
- Program crash
PID:116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 20242⤵
- Program crash
PID:2984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 12762⤵
- Program crash
PID:2020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3588 -ip 35881⤵PID:2512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3588 -ip 35881⤵PID:432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3588 -ip 35881⤵PID:1468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3588 -ip 35881⤵PID:380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3588 -ip 35881⤵PID:2852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3588 -ip 35881⤵PID:4972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3588 -ip 35881⤵PID:4660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3588 -ip 35881⤵PID:1008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3588 -ip 35881⤵PID:1580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3588 -ip 35881⤵PID:5000
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIzIiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU5ODUiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODQ0NDQzNjAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI0ODUwNDQ1NTE1Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:1780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 3588 -ip 35881⤵PID:2140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3588 -ip 35881⤵PID:4004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3588 -ip 35881⤵PID:1112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3588 -ip 35881⤵PID:2872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3588 -ip 35881⤵PID:2588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3588 -ip 35881⤵PID:4344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 3588 -ip 35881⤵PID:944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3588 -ip 35881⤵PID:1732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3588 -ip 35881⤵PID:4708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3588 -ip 35881⤵PID:4448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3588 -ip 35881⤵PID:3344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3588 -ip 35881⤵PID:1112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3588 -ip 35881⤵PID:4228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3588 -ip 35881⤵PID:1588
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1