Analysis
-
max time kernel
146s -
max time network
52s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
27-04-2024 00:08
Behavioral task
behavioral1
Sample
01f855b14016b89981d88d0cd8fa0de1_JaffaCakes118.exe
Resource
win7-20240221-en
windows7-x64
8 signatures
150 seconds
General
-
Target
01f855b14016b89981d88d0cd8fa0de1_JaffaCakes118.exe
-
Size
10.1MB
-
MD5
01f855b14016b89981d88d0cd8fa0de1
-
SHA1
07b299b749127ea4ecfe32a519a8e84ab1e1a3f2
-
SHA256
a6d316d3b9d3726c70c3c9e7f23cadbdb93be7d61311bd979fdf1305da043d9a
-
SHA512
02764435e20634ec09eef1d0d99956b4503e9a0430de1212f1f3f01449162ababed49dd445f09df099e8a7cc47e6bbc275e286c2583ddbd626772a78aff72fd9
-
SSDEEP
196608:aCHS8+BoCljfxAU/WQd3b9qgsYHWaPrdGCv:aCy86AU/fJYgP2arlv
Malware Config
Signatures
-
XMRig Miner payload 5 IoCs
resource yara_rule behavioral2/memory/264-6-0x0000000000400000-0x00000000010B6000-memory.dmp xmrig behavioral2/memory/264-9-0x0000000000400000-0x00000000010B6000-memory.dmp xmrig behavioral2/memory/264-10-0x0000000000400000-0x00000000010B6000-memory.dmp xmrig behavioral2/memory/264-13-0x0000000000400000-0x00000000010B6000-memory.dmp xmrig behavioral2/memory/264-18-0x0000000000400000-0x00000000010B6000-memory.dmp xmrig -
resource yara_rule behavioral2/memory/264-0-0x0000000000400000-0x00000000010B6000-memory.dmp upx behavioral2/memory/264-6-0x0000000000400000-0x00000000010B6000-memory.dmp upx behavioral2/memory/264-9-0x0000000000400000-0x00000000010B6000-memory.dmp upx behavioral2/memory/264-10-0x0000000000400000-0x00000000010B6000-memory.dmp upx behavioral2/memory/264-13-0x0000000000400000-0x00000000010B6000-memory.dmp upx behavioral2/memory/264-18-0x0000000000400000-0x00000000010B6000-memory.dmp upx behavioral2/memory/264-20-0x0000000000400000-0x00000000010B6000-memory.dmp upx -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created D:\autorun.inf 01f855b14016b89981d88d0cd8fa0de1_JaffaCakes118.exe File created F:\autorun.inf 01f855b14016b89981d88d0cd8fa0de1_JaffaCakes118.exe File opened for modification F:\autorun.inf 01f855b14016b89981d88d0cd8fa0de1_JaffaCakes118.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\7-zip.chm 01f855b14016b89981d88d0cd8fa0de1_JaffaCakes118.exe File created C:\Program Files\7-Zip\7-zip.chm.exe 01f855b14016b89981d88d0cd8fa0de1_JaffaCakes118.exe File opened for modification C:\Program Files\7-Zip\7-zip.dll 01f855b14016b89981d88d0cd8fa0de1_JaffaCakes118.exe File created C:\Program Files\7-Zip\7-zip.dll.exe 01f855b14016b89981d88d0cd8fa0de1_JaffaCakes118.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "https://www.FCsaKykuFw.com" 01f855b14016b89981d88d0cd8fa0de1_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "https://www.DoOxcjyHRD.com" 01f855b14016b89981d88d0cd8fa0de1_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 264 01f855b14016b89981d88d0cd8fa0de1_JaffaCakes118.exe Token: SeLockMemoryPrivilege 264 01f855b14016b89981d88d0cd8fa0de1_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\01f855b14016b89981d88d0cd8fa0de1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\01f855b14016b89981d88d0cd8fa0de1_JaffaCakes118.exe"1⤵
- Drops autorun.inf file
- Drops file in Program Files directory
- Modifies Internet Explorer start page
- Suspicious use of AdjustPrivilegeToken
PID:264