Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 20:54
Behavioral task
behavioral1
Sample
75af1d34a6d9c61c0f9745409e08b9c2_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
75af1d34a6d9c61c0f9745409e08b9c2_JaffaCakes118.exe
-
Size
784KB
-
MD5
75af1d34a6d9c61c0f9745409e08b9c2
-
SHA1
dd5e51a67476f8fad647f66ea3d3d3dfcf6bd086
-
SHA256
c9e22981f6dd8f068f824d76ce83d5036f340390b6b22d50f5061c279acc6f2b
-
SHA512
7a7eedb770cc9db93de054d4e33b25fd0021c3fa1b6065463e1dd92a231122fe5c8346f62c871c402464da0e09971f7654c01f8b4a5747df9506d3ea9e3b1550
-
SSDEEP
24576:XadM4O48DnovKlxL+I9WAwVp4V9FK4OBx9Au:AfqovKj+IPPK2
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral1/memory/1628-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/1628-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2796-18-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2796-23-0x0000000003150000-0x00000000032E3000-memory.dmp xmrig behavioral1/memory/2796-24-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2796-33-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2796 75af1d34a6d9c61c0f9745409e08b9c2_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2796 75af1d34a6d9c61c0f9745409e08b9c2_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 1628 75af1d34a6d9c61c0f9745409e08b9c2_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1628-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x0009000000016c1f-15.dat upx behavioral1/memory/2796-16-0x0000000000400000-0x0000000000712000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 75af1d34a6d9c61c0f9745409e08b9c2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 75af1d34a6d9c61c0f9745409e08b9c2_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1628 75af1d34a6d9c61c0f9745409e08b9c2_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1628 75af1d34a6d9c61c0f9745409e08b9c2_JaffaCakes118.exe 2796 75af1d34a6d9c61c0f9745409e08b9c2_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2796 1628 75af1d34a6d9c61c0f9745409e08b9c2_JaffaCakes118.exe 31 PID 1628 wrote to memory of 2796 1628 75af1d34a6d9c61c0f9745409e08b9c2_JaffaCakes118.exe 31 PID 1628 wrote to memory of 2796 1628 75af1d34a6d9c61c0f9745409e08b9c2_JaffaCakes118.exe 31 PID 1628 wrote to memory of 2796 1628 75af1d34a6d9c61c0f9745409e08b9c2_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\75af1d34a6d9c61c0f9745409e08b9c2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\75af1d34a6d9c61c0f9745409e08b9c2_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\75af1d34a6d9c61c0f9745409e08b9c2_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\75af1d34a6d9c61c0f9745409e08b9c2_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD51fff5136f3b6c68038fa011b9d0c70e2
SHA1cf5f17b11c167c66aca2daf0bef1ce1894cf024a
SHA25600896cb3c2419034b1363d2dac1f11b294e88e3b6df9d157d2ccaed05bbedda1
SHA5120e657d5300b04dbcf1d95e1be7c5d753270e910ed985ded0e8df1037b7a2145adff1ea3e8c0c19a10921ed86261a97ddc7868c15115169a9c0bb467262ed654d