Analysis

  • max time kernel
    31s
  • max time network
    41s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/08/2024, 07:16

Errors

Reason
Machine shutdown

General

  • Target

    aa150511b6a3d90dac30ed97085bd583_JaffaCakes118.exe

  • Size

    784KB

  • MD5

    aa150511b6a3d90dac30ed97085bd583

  • SHA1

    c0ed5dc851175e9306859bec6b9d8397c67f3de2

  • SHA256

    8271cb2e523c40a7f5b606bc4a07e17ebdc1c148ba9c42777ecf96b1335fbeb0

  • SHA512

    e2ea50543b67f8a22fbf735409eb19dd81fc832055c26a0e0f66b02f417a4250f2346e9e07b1df53f5c078e9f9b59954a946b39cf53de12af420880b0ecfc515

  • SSDEEP

    12288:at1JIYr8ygRKl0KDXI0tWkNygxUSV0xr024M21h3yTrcP+/rGjxZUOTUgQ67fp+y:atzR4JgDL/NQSVtHZraaMPO4isb3R

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 6 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aa150511b6a3d90dac30ed97085bd583_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\aa150511b6a3d90dac30ed97085bd583_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1480
    • C:\Users\Admin\AppData\Local\Temp\aa150511b6a3d90dac30ed97085bd583_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\aa150511b6a3d90dac30ed97085bd583_JaffaCakes118.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of UnmapMainImage
      PID:1752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\aa150511b6a3d90dac30ed97085bd583_JaffaCakes118.exe

    Filesize

    784KB

    MD5

    be9da724fc20dc73a2142bace42a9698

    SHA1

    6d41e14b02d200774f94cd58855a6e2180a1ca1f

    SHA256

    369439bcc1b312b0070e448164f0f10606c3b70efaa50b36cf93b526793b4862

    SHA512

    221589acfe17490a10bd497a48f7f95c248392dd0029828504579c99fba62e945a3e0746b726f3b7745457741daf2f6269e5c2cce611c6f40277d516417df8cd

  • memory/1480-0-0x0000000000400000-0x0000000000712000-memory.dmp

    Filesize

    3.1MB

  • memory/1480-1-0x00000000019B0000-0x0000000001A74000-memory.dmp

    Filesize

    784KB

  • memory/1480-2-0x0000000000400000-0x0000000000593000-memory.dmp

    Filesize

    1.6MB

  • memory/1480-12-0x0000000000400000-0x0000000000593000-memory.dmp

    Filesize

    1.6MB

  • memory/1752-13-0x0000000000400000-0x0000000000712000-memory.dmp

    Filesize

    3.1MB

  • memory/1752-14-0x00000000018E0000-0x00000000019A4000-memory.dmp

    Filesize

    784KB

  • memory/1752-15-0x0000000000400000-0x0000000000593000-memory.dmp

    Filesize

    1.6MB

  • memory/1752-20-0x00000000053E0000-0x0000000005573000-memory.dmp

    Filesize

    1.6MB

  • memory/1752-22-0x0000000000400000-0x0000000000587000-memory.dmp

    Filesize

    1.5MB

  • memory/1752-30-0x0000000000400000-0x0000000000587000-memory.dmp

    Filesize

    1.5MB