Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-05-2024 18:45

General

  • Target

    609e5b6b5a19062f287c31e5618e592f_JaffaCakes118.exe

  • Size

    7.5MB

  • MD5

    609e5b6b5a19062f287c31e5618e592f

  • SHA1

    f3dbdbba57a23a17cc35a281c98502bdddaf66f9

  • SHA256

    67c14d481a2795e74d862fe02bce778dbca9fcfc0d60e1321599ada6ea385895

  • SHA512

    0a58d30b40206aeb0c8b8ab4e46fc00a192c91a7468f52a29d1db8c8fd7e01c2829edda1d3164fc5d041ec6d538069571837b73fe6177ba120558686cb56203a

  • SSDEEP

    98304:bGUjSb/X0Z3y/t2uDN8nsk/39999999999eEN3JjAUtw6MT4nR8CZqXebhnp3aJZ:bGUGb/X0Zi/t2uDN8qurYmd08uuI

Malware Config

Signatures

  • Cobalt Strike reflective loader 1 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 15 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Modifies Internet Explorer start page 1 TTPs 16 IoCs
  • Modifies system certificate store 2 TTPs 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\609e5b6b5a19062f287c31e5618e592f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\609e5b6b5a19062f287c31e5618e592f_JaffaCakes118.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops autorun.inf file
    • Modifies Internet Explorer start page
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:232

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • F:\Install.exe

    Filesize

    7.5MB

    MD5

    609e5b6b5a19062f287c31e5618e592f

    SHA1

    f3dbdbba57a23a17cc35a281c98502bdddaf66f9

    SHA256

    67c14d481a2795e74d862fe02bce778dbca9fcfc0d60e1321599ada6ea385895

    SHA512

    0a58d30b40206aeb0c8b8ab4e46fc00a192c91a7468f52a29d1db8c8fd7e01c2829edda1d3164fc5d041ec6d538069571837b73fe6177ba120558686cb56203a

  • memory/232-21-0x0000000000400000-0x0000000000DBD000-memory.dmp

    Filesize

    9.7MB

  • memory/232-24-0x0000000000400000-0x0000000000DBD000-memory.dmp

    Filesize

    9.7MB

  • memory/232-13-0x0000000000400000-0x0000000000DBD000-memory.dmp

    Filesize

    9.7MB

  • memory/232-14-0x0000000000400000-0x0000000000DBD000-memory.dmp

    Filesize

    9.7MB

  • memory/232-15-0x0000000000400000-0x0000000000DBD000-memory.dmp

    Filesize

    9.7MB

  • memory/232-16-0x0000000000400000-0x0000000000DBD000-memory.dmp

    Filesize

    9.7MB

  • memory/232-10-0x0000000000400000-0x0000000000DBD000-memory.dmp

    Filesize

    9.7MB

  • memory/232-0-0x00000000000E0000-0x00000000000F0000-memory.dmp

    Filesize

    64KB

  • memory/232-7-0x0000000000400000-0x0000000000DBD000-memory.dmp

    Filesize

    9.7MB

  • memory/232-29-0x0000000000400000-0x0000000000DBD000-memory.dmp

    Filesize

    9.7MB

  • memory/232-30-0x0000000000400000-0x0000000000DBD000-memory.dmp

    Filesize

    9.7MB

  • memory/232-31-0x0000000000400000-0x0000000000DBD000-memory.dmp

    Filesize

    9.7MB

  • memory/232-32-0x0000000000400000-0x0000000000DBD000-memory.dmp

    Filesize

    9.7MB

  • memory/232-37-0x0000000000400000-0x0000000000DBD000-memory.dmp

    Filesize

    9.7MB

  • memory/232-38-0x0000000000400000-0x0000000000DBD000-memory.dmp

    Filesize

    9.7MB