Analysis

  • max time kernel
    16s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    24/08/2024, 11:40

General

  • Target

    be83ee9362b4fcdc6f98f6b050d317d4_JaffaCakes118.exe

  • Size

    784KB

  • MD5

    be83ee9362b4fcdc6f98f6b050d317d4

  • SHA1

    1f523feead8f09ccf06d756732a6e2fd35331dfc

  • SHA256

    700f3e17504af241da4ab4287dafd0d504ea0b8020d3e27e58a643c77721c5d6

  • SHA512

    61f2c82cdadb20e481f1879a3718fa2209d8d5e96f05ec4ecc32706c71930eb42d7f7d064dc29d122347dd1ff2cf2f4b61296ae914a1bd80fa5a7a0ff6a4724c

  • SSDEEP

    12288:q7bux6kmktQZgYFl/JhUAk2z07JtGgUr67Hk93ymwDXNbxsTIEyVXUDl:ibHkagYFqz2zuGnr6WLNdYUD

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 7 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\be83ee9362b4fcdc6f98f6b050d317d4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\be83ee9362b4fcdc6f98f6b050d317d4_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1744
    • C:\Users\Admin\AppData\Local\Temp\be83ee9362b4fcdc6f98f6b050d317d4_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\be83ee9362b4fcdc6f98f6b050d317d4_JaffaCakes118.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of UnmapMainImage
      PID:988

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\be83ee9362b4fcdc6f98f6b050d317d4_JaffaCakes118.exe

          Filesize

          784KB

          MD5

          8374654b6240cc02d9807854750c31f2

          SHA1

          0fea19c7cf850e04f12f41a246c77bdf907f743d

          SHA256

          08767ee67892d1a7830f480783b5c6e9433e4325e30b3b1ad342f2479cec8b4e

          SHA512

          8a17b2c7543bd98e0712c7bf5ed46b23c08407752135f576c9f871eb51b116448ac56371531baa86312187083115f5cece33c9f1ed791e450309e08f94443e84

        • memory/988-16-0x0000000000400000-0x0000000000712000-memory.dmp

          Filesize

          3.1MB

        • memory/988-17-0x00000000018B0000-0x0000000001974000-memory.dmp

          Filesize

          784KB

        • memory/988-18-0x0000000000400000-0x0000000000593000-memory.dmp

          Filesize

          1.6MB

        • memory/988-34-0x0000000000400000-0x0000000000587000-memory.dmp

          Filesize

          1.5MB

        • memory/988-33-0x00000000005A0000-0x000000000071F000-memory.dmp

          Filesize

          1.5MB

        • memory/988-25-0x00000000030A0000-0x0000000003233000-memory.dmp

          Filesize

          1.6MB

        • memory/988-23-0x0000000000400000-0x0000000000587000-memory.dmp

          Filesize

          1.5MB

        • memory/1744-0-0x0000000000400000-0x0000000000712000-memory.dmp

          Filesize

          3.1MB

        • memory/1744-9-0x00000000002A0000-0x0000000000364000-memory.dmp

          Filesize

          784KB

        • memory/1744-1-0x0000000000400000-0x0000000000593000-memory.dmp

          Filesize

          1.6MB

        • memory/1744-14-0x0000000000400000-0x0000000000593000-memory.dmp

          Filesize

          1.6MB