Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 17:39
Behavioral task
behavioral1
Sample
78fdfb3df4012974d9836a703486ad41_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
78fdfb3df4012974d9836a703486ad41_JaffaCakes118.exe
-
Size
784KB
-
MD5
78fdfb3df4012974d9836a703486ad41
-
SHA1
2ff5f1da1af09d04cf7211ddd9dbf6d2d58d5386
-
SHA256
b11c7c588c0da3bafc0f93f7186a7e6a618a3d19173498114362ca4355dca557
-
SHA512
b41777f8a689d21ba64b2beb494cb5a77f38abbbcd3cde93fcf6e4b193c6b5c793c85a3640a9cfb9dc1909fd63b0b6f6e3834142666a97af4d8d9633f673fa87
-
SSDEEP
12288:SHiidPF4aoKPdr0i1tM8oE9/N/ufjaPZpyhn7EUwPUb9NhTltxqmQvP1aSvop:SbdOaPtdToE9mQZpI7Dw8BNpghvP1az
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/1544-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1544-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1604-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1604-20-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/1604-29-0x00000000053C0000-0x0000000005553000-memory.dmp xmrig behavioral2/memory/1604-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 1604 78fdfb3df4012974d9836a703486ad41_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1604 78fdfb3df4012974d9836a703486ad41_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/1544-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x0008000000023444-11.dat upx behavioral2/memory/1604-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 78fdfb3df4012974d9836a703486ad41_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 78fdfb3df4012974d9836a703486ad41_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1544 78fdfb3df4012974d9836a703486ad41_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1544 78fdfb3df4012974d9836a703486ad41_JaffaCakes118.exe 1604 78fdfb3df4012974d9836a703486ad41_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1544 wrote to memory of 1604 1544 78fdfb3df4012974d9836a703486ad41_JaffaCakes118.exe 87 PID 1544 wrote to memory of 1604 1544 78fdfb3df4012974d9836a703486ad41_JaffaCakes118.exe 87 PID 1544 wrote to memory of 1604 1544 78fdfb3df4012974d9836a703486ad41_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\78fdfb3df4012974d9836a703486ad41_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\78fdfb3df4012974d9836a703486ad41_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\78fdfb3df4012974d9836a703486ad41_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\78fdfb3df4012974d9836a703486ad41_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:1604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5f0039287940b7751df17d577a8ab5b4e
SHA1b2b5e600c57cdf1e0f11e5cd41e8df23c358f8dd
SHA256f5e1a94d9670dbc345ff7af065d0c5c95719290edfb4a326d6c3d8eb8a3463f0
SHA51292520fbe7eddfa074b0f5576e04e41bd9d4b74cb3b01871729308d480992904829aea4fa5c5fec00ec9e87b00b83c7662e55367a5a57b2d723c6349c07b0ae08