Analysis
-
max time kernel
147s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 19:21
Static task
static1
Behavioral task
behavioral1
Sample
2d871747617c5a94cb914b9b2f8fc06e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2d871747617c5a94cb914b9b2f8fc06e_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2d871747617c5a94cb914b9b2f8fc06e_JaffaCakes118.exe
-
Size
3.5MB
-
MD5
2d871747617c5a94cb914b9b2f8fc06e
-
SHA1
c031460d111b99fe71245f138ea7d7fe1ecfe325
-
SHA256
ea453bded22f1a2e5f7f218881641ea622880c79e32e6d182e14fb80139e6223
-
SHA512
2dfe0192afb95d6104ffb9268ca1b4e4b44b2f1ab04e56f682665844465e567b389b7efc21b26a51f8a5e42fb1aed5ff5a38bff2c5efcccea3fcb63dfd2efade
-
SSDEEP
49152:bw80cTsjkWaCM7tljPT5/S3MHdbF5BXGTH+bowcxSdAyAKjaWhIC/mcKqzKd9j1k:U8sjkpB3BUyFcM6ylThIC/5Kqz1Kkj
Malware Config
Signatures
-
XMRig Miner payload 26 IoCs
resource yara_rule behavioral1/memory/2916-19-0x0000000000250000-0x00000000004CC000-memory.dmp xmrig behavioral1/memory/2916-18-0x0000000000250000-0x00000000004CC000-memory.dmp xmrig behavioral1/memory/2916-24-0x0000000000250000-0x00000000004CC000-memory.dmp xmrig behavioral1/memory/2916-28-0x0000000000250000-0x00000000004CC000-memory.dmp xmrig behavioral1/memory/2916-27-0x0000000000250000-0x00000000004CC000-memory.dmp xmrig behavioral1/memory/2916-26-0x0000000000250000-0x00000000004CC000-memory.dmp xmrig behavioral1/memory/2916-23-0x0000000000250000-0x00000000004CC000-memory.dmp xmrig behavioral1/memory/2916-22-0x0000000000250000-0x00000000004CC000-memory.dmp xmrig behavioral1/memory/2916-21-0x0000000000250000-0x00000000004CC000-memory.dmp xmrig behavioral1/memory/2916-25-0x0000000000250000-0x00000000004CC000-memory.dmp xmrig behavioral1/memory/2764-33-0x0000000000230000-0x00000000004AC000-memory.dmp xmrig behavioral1/memory/2764-34-0x0000000000230000-0x00000000004AC000-memory.dmp xmrig behavioral1/memory/2764-41-0x0000000000230000-0x00000000004AC000-memory.dmp xmrig behavioral1/memory/2764-42-0x0000000000230000-0x00000000004AC000-memory.dmp xmrig behavioral1/memory/2764-40-0x0000000000230000-0x00000000004AC000-memory.dmp xmrig behavioral1/memory/2764-39-0x0000000000230000-0x00000000004AC000-memory.dmp xmrig behavioral1/memory/2764-38-0x0000000000230000-0x00000000004AC000-memory.dmp xmrig behavioral1/memory/2764-37-0x0000000000230000-0x00000000004AC000-memory.dmp xmrig behavioral1/memory/2764-36-0x0000000000230000-0x00000000004AC000-memory.dmp xmrig behavioral1/memory/2764-35-0x0000000000230000-0x00000000004AC000-memory.dmp xmrig behavioral1/memory/2916-43-0x0000000000250000-0x00000000004CC000-memory.dmp xmrig behavioral1/memory/2764-44-0x0000000000230000-0x00000000004AC000-memory.dmp xmrig behavioral1/memory/2912-49-0x0000000000170000-0x00000000003C5000-memory.dmp xmrig behavioral1/memory/2912-51-0x0000000000170000-0x00000000003C5000-memory.dmp xmrig behavioral1/memory/2912-52-0x0000000000170000-0x00000000003C5000-memory.dmp xmrig behavioral1/memory/2912-53-0x0000000000170000-0x00000000003C5000-memory.dmp xmrig -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0018000000018b03-2.dat acprotect -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Notepad.lnk 2d871747617c5a94cb914b9b2f8fc06e_JaffaCakes118.exe -
Loads dropped DLL 4 IoCs
pid Process 2540 2d871747617c5a94cb914b9b2f8fc06e_JaffaCakes118.exe 2540 2d871747617c5a94cb914b9b2f8fc06e_JaffaCakes118.exe 2540 2d871747617c5a94cb914b9b2f8fc06e_JaffaCakes118.exe 2540 2d871747617c5a94cb914b9b2f8fc06e_JaffaCakes118.exe -
resource yara_rule behavioral1/files/0x0018000000018b03-2.dat upx behavioral1/memory/2540-3-0x0000000010000000-0x0000000010010000-memory.dmp upx behavioral1/memory/2540-7-0x0000000010000000-0x0000000010010000-memory.dmp upx behavioral1/memory/2916-10-0x0000000000250000-0x00000000004CC000-memory.dmp upx behavioral1/memory/2540-15-0x0000000010000000-0x0000000010010000-memory.dmp upx behavioral1/memory/2916-16-0x0000000000250000-0x00000000004CC000-memory.dmp upx behavioral1/memory/2916-17-0x0000000000250000-0x00000000004CC000-memory.dmp upx behavioral1/memory/2916-19-0x0000000000250000-0x00000000004CC000-memory.dmp upx behavioral1/memory/2916-18-0x0000000000250000-0x00000000004CC000-memory.dmp upx behavioral1/memory/2916-24-0x0000000000250000-0x00000000004CC000-memory.dmp upx behavioral1/memory/2916-28-0x0000000000250000-0x00000000004CC000-memory.dmp upx behavioral1/memory/2916-27-0x0000000000250000-0x00000000004CC000-memory.dmp upx behavioral1/memory/2916-26-0x0000000000250000-0x00000000004CC000-memory.dmp upx behavioral1/memory/2916-23-0x0000000000250000-0x00000000004CC000-memory.dmp upx behavioral1/memory/2764-30-0x0000000000230000-0x00000000004AC000-memory.dmp upx behavioral1/memory/2916-22-0x0000000000250000-0x00000000004CC000-memory.dmp upx behavioral1/memory/2916-21-0x0000000000250000-0x00000000004CC000-memory.dmp upx behavioral1/memory/2916-25-0x0000000000250000-0x00000000004CC000-memory.dmp upx behavioral1/memory/2764-31-0x0000000000230000-0x00000000004AC000-memory.dmp upx behavioral1/memory/2764-32-0x0000000000230000-0x00000000004AC000-memory.dmp upx behavioral1/memory/2764-33-0x0000000000230000-0x00000000004AC000-memory.dmp upx behavioral1/memory/2764-34-0x0000000000230000-0x00000000004AC000-memory.dmp upx behavioral1/memory/2764-41-0x0000000000230000-0x00000000004AC000-memory.dmp upx behavioral1/memory/2764-42-0x0000000000230000-0x00000000004AC000-memory.dmp upx behavioral1/memory/2764-40-0x0000000000230000-0x00000000004AC000-memory.dmp upx behavioral1/memory/2764-39-0x0000000000230000-0x00000000004AC000-memory.dmp upx behavioral1/memory/2764-38-0x0000000000230000-0x00000000004AC000-memory.dmp upx behavioral1/memory/2764-37-0x0000000000230000-0x00000000004AC000-memory.dmp upx behavioral1/memory/2764-36-0x0000000000230000-0x00000000004AC000-memory.dmp upx behavioral1/memory/2764-35-0x0000000000230000-0x00000000004AC000-memory.dmp upx behavioral1/memory/2916-43-0x0000000000250000-0x00000000004CC000-memory.dmp upx behavioral1/memory/2764-44-0x0000000000230000-0x00000000004AC000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2d871747617c5a94cb914b9b2f8fc06e_JaffaCakes118.exe" 2d871747617c5a94cb914b9b2f8fc06e_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2540 set thread context of 2916 2540 2d871747617c5a94cb914b9b2f8fc06e_JaffaCakes118.exe 29 PID 2540 set thread context of 2764 2540 2d871747617c5a94cb914b9b2f8fc06e_JaffaCakes118.exe 31 PID 2540 set thread context of 2912 2540 2d871747617c5a94cb914b9b2f8fc06e_JaffaCakes118.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeLockMemoryPrivilege 2916 calc.exe Token: SeLockMemoryPrivilege 2916 calc.exe Token: SeLockMemoryPrivilege 2764 Calc.exe Token: SeLockMemoryPrivilege 2764 Calc.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2916 2540 2d871747617c5a94cb914b9b2f8fc06e_JaffaCakes118.exe 29 PID 2540 wrote to memory of 2916 2540 2d871747617c5a94cb914b9b2f8fc06e_JaffaCakes118.exe 29 PID 2540 wrote to memory of 2916 2540 2d871747617c5a94cb914b9b2f8fc06e_JaffaCakes118.exe 29 PID 2540 wrote to memory of 2916 2540 2d871747617c5a94cb914b9b2f8fc06e_JaffaCakes118.exe 29 PID 2540 wrote to memory of 2916 2540 2d871747617c5a94cb914b9b2f8fc06e_JaffaCakes118.exe 29 PID 2540 wrote to memory of 2916 2540 2d871747617c5a94cb914b9b2f8fc06e_JaffaCakes118.exe 29 PID 2540 wrote to memory of 2764 2540 2d871747617c5a94cb914b9b2f8fc06e_JaffaCakes118.exe 31 PID 2540 wrote to memory of 2764 2540 2d871747617c5a94cb914b9b2f8fc06e_JaffaCakes118.exe 31 PID 2540 wrote to memory of 2764 2540 2d871747617c5a94cb914b9b2f8fc06e_JaffaCakes118.exe 31 PID 2540 wrote to memory of 2764 2540 2d871747617c5a94cb914b9b2f8fc06e_JaffaCakes118.exe 31 PID 2540 wrote to memory of 2764 2540 2d871747617c5a94cb914b9b2f8fc06e_JaffaCakes118.exe 31 PID 2540 wrote to memory of 2764 2540 2d871747617c5a94cb914b9b2f8fc06e_JaffaCakes118.exe 31 PID 2540 wrote to memory of 2912 2540 2d871747617c5a94cb914b9b2f8fc06e_JaffaCakes118.exe 33 PID 2540 wrote to memory of 2912 2540 2d871747617c5a94cb914b9b2f8fc06e_JaffaCakes118.exe 33 PID 2540 wrote to memory of 2912 2540 2d871747617c5a94cb914b9b2f8fc06e_JaffaCakes118.exe 33 PID 2540 wrote to memory of 2912 2540 2d871747617c5a94cb914b9b2f8fc06e_JaffaCakes118.exe 33 PID 2540 wrote to memory of 2912 2540 2d871747617c5a94cb914b9b2f8fc06e_JaffaCakes118.exe 33 PID 2540 wrote to memory of 2912 2540 2d871747617c5a94cb914b9b2f8fc06e_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d871747617c5a94cb914b9b2f8fc06e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2d871747617c5a94cb914b9b2f8fc06e_JaffaCakes118.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\calc.exe-o xmrpool.xmrminingpool.net:3333 -u GuyFawkesMiner-Admin -p xxxx -k --max-cpu-usage=502⤵
- Suspicious use of AdjustPrivilegeToken
PID:2916
-
-
C:\Windows\SysWOW64\Calc.exe-o xmrpool.xmrminingpool.net:3333 -u GuyFawkesMiner-Admin -p Rig -k --max-cpu-usage=502⤵
- Suspicious use of AdjustPrivilegeToken
PID:2764
-
-
C:\Windows\SysWOW64\notepad.exe-o xmrpool.xmrminingpool.net:3333 -u GuyFawkesMiner-Admin -p Rig -k2⤵PID:2912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD5ccf916511374fa95c4c685ee0854fe9e
SHA127d7458ecafb17c202d262c990bd06f4d47098bd
SHA2562a6b997d31834bd186e6ed19651b33bda29260ba09a17a78c6e81dfbc6b299de
SHA512db90ddfb847192fd4736278d48ef31629e8e01e03f92e5c3c262963a2207b7f750d9200fa5f7904d659d3ebb3dd45cebd5a54779395da24a56ea8a3bc1923cad