General

  • Target

    07a562b703be3290371261ffddb63500_JaffaCakes118

  • Size

    2.2MB

  • Sample

    240429-pgr61aaf8y

  • MD5

    07a562b703be3290371261ffddb63500

  • SHA1

    49e8e142c7a5a6e176dac7fe67a8b62399acea21

  • SHA256

    08b1fb7571cabe7fed53d86bb881223bb6b6905e0b22ab0bd0c1d8251bc5daaa

  • SHA512

    dcd9412fc3c6e01568528c7ea953f4986f935415b9a0578f71078e19eb2f809c4b6b60a20de9f78eadaa02981eff13fc318b017c0211f674c0b482104a3f4544

  • SSDEEP

    49152:Lz071uv4BPMkibTIA5sf6r+WVc2HhG82g1VQx7Va4qrf6:NABb

Malware Config

Targets

    • Target

      07a562b703be3290371261ffddb63500_JaffaCakes118

    • Size

      2.2MB

    • MD5

      07a562b703be3290371261ffddb63500

    • SHA1

      49e8e142c7a5a6e176dac7fe67a8b62399acea21

    • SHA256

      08b1fb7571cabe7fed53d86bb881223bb6b6905e0b22ab0bd0c1d8251bc5daaa

    • SHA512

      dcd9412fc3c6e01568528c7ea953f4986f935415b9a0578f71078e19eb2f809c4b6b60a20de9f78eadaa02981eff13fc318b017c0211f674c0b482104a3f4544

    • SSDEEP

      49152:Lz071uv4BPMkibTIA5sf6r+WVc2HhG82g1VQx7Va4qrf6:NABb

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Modifies Installed Components in the registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks