Analysis
-
max time kernel
140s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 04:01
Behavioral task
behavioral1
Sample
88eb014a4eb443b764285e9a22f129cc_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
88eb014a4eb443b764285e9a22f129cc_JaffaCakes118.exe
-
Size
784KB
-
MD5
88eb014a4eb443b764285e9a22f129cc
-
SHA1
65dda6dd87f255468633d24441b2c4eec63c2961
-
SHA256
5365c8bc2726cb669f6c5827fa4b44fbc3f09a42d1f6ca3cefeeb9f715563900
-
SHA512
66eaa82c6a9437dd7b2fe8968ffa69a5d3f961448cb5acfdc1eb802ff7bcfe59733721d88c2687078d60ef36ba63af8c787b312f1a379d207e0aac3935f7d00f
-
SSDEEP
24576:MBLHB+hTb0wXQYoMIUtcnqIi5eSqsNPT0re:8LHI/G1Ut6F6isNbA
Malware Config
Signatures
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral2/memory/1580-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1580-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4776-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4776-20-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/4776-29-0x0000000005340000-0x00000000054D3000-memory.dmp xmrig behavioral2/memory/4776-30-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig behavioral2/memory/4776-31-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 4776 88eb014a4eb443b764285e9a22f129cc_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4776 88eb014a4eb443b764285e9a22f129cc_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/1580-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x00080000000234cc-11.dat upx behavioral2/memory/4776-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88eb014a4eb443b764285e9a22f129cc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88eb014a4eb443b764285e9a22f129cc_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1580 88eb014a4eb443b764285e9a22f129cc_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1580 88eb014a4eb443b764285e9a22f129cc_JaffaCakes118.exe 4776 88eb014a4eb443b764285e9a22f129cc_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1580 wrote to memory of 4776 1580 88eb014a4eb443b764285e9a22f129cc_JaffaCakes118.exe 85 PID 1580 wrote to memory of 4776 1580 88eb014a4eb443b764285e9a22f129cc_JaffaCakes118.exe 85 PID 1580 wrote to memory of 4776 1580 88eb014a4eb443b764285e9a22f129cc_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\88eb014a4eb443b764285e9a22f129cc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\88eb014a4eb443b764285e9a22f129cc_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\88eb014a4eb443b764285e9a22f129cc_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\88eb014a4eb443b764285e9a22f129cc_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:4776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5cb47f677f61c8218611e472ab8f6ed17
SHA1319d81da93025ffcba261837aace10a306a503b7
SHA256576c009ae0581174db9d859b130b916cbc96a14c4691922298d6ab84f9e0a301
SHA51295866b8a2adf7ab40184c8adc6a730e1d437677378e44b52a931231edd76d4ead06f51490b70c2f83418e3f05975df56ae93a0ad8a2958941a8a5fcdf36c13fe