Analysis

  • max time kernel
    16s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    29/08/2024, 14:31

General

  • Target

    c90323c8a6c08069e28ee3d19e376742_JaffaCakes118.exe

  • Size

    784KB

  • MD5

    c90323c8a6c08069e28ee3d19e376742

  • SHA1

    612be2a3470aea3e97e37d968993009fad617e7f

  • SHA256

    f9098701784eb0d00afbc0d94767ba0c70fcf0bffa9fd6de779cce09509b41fa

  • SHA512

    0042045e5696c75cfe8e905e58339673a9545724caa62a1d4d97ca1cfa6f68569cc239d2aabac8ef667e33af3029c73e04ea1e94f5192f50dabb4cee4a69d129

  • SSDEEP

    12288:qByYEfxlwns6+BBv8EIHpQ1tBEDb3NezYZ5CirHzLcGShQ+p44DtBmkl:qBUfwnsXvQpQaDb30zYZ5CirTxShntB

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 7 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c90323c8a6c08069e28ee3d19e376742_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c90323c8a6c08069e28ee3d19e376742_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2164
    • C:\Users\Admin\AppData\Local\Temp\c90323c8a6c08069e28ee3d19e376742_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\c90323c8a6c08069e28ee3d19e376742_JaffaCakes118.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of UnmapMainImage
      PID:2920

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\c90323c8a6c08069e28ee3d19e376742_JaffaCakes118.exe

    Filesize

    784KB

    MD5

    b09c2f2ece1a146e7c651ad1de247a44

    SHA1

    7ad0dd46a55a48662464cc6bd939ffc3b95975d3

    SHA256

    7c694287b21c1e671ed4d67e549648cf7b959abb61046044eb4f3ea2bd0a7fdb

    SHA512

    7bf618df457dcabe1d8560d59d9f5f9f68e8f7cdabb2d482305641941ff49847fd64f3c4758f56967c2c757868bd54e24b801f48ee0a608dd5f45d21c2c3b788

  • memory/2164-0-0x0000000000400000-0x0000000000712000-memory.dmp

    Filesize

    3.1MB

  • memory/2164-1-0x0000000000120000-0x00000000001E4000-memory.dmp

    Filesize

    784KB

  • memory/2164-2-0x0000000000400000-0x0000000000593000-memory.dmp

    Filesize

    1.6MB

  • memory/2164-16-0x0000000003230000-0x0000000003542000-memory.dmp

    Filesize

    3.1MB

  • memory/2164-14-0x0000000000400000-0x0000000000593000-memory.dmp

    Filesize

    1.6MB

  • memory/2164-34-0x0000000003230000-0x0000000003542000-memory.dmp

    Filesize

    3.1MB

  • memory/2920-17-0x00000000018B0000-0x0000000001974000-memory.dmp

    Filesize

    784KB

  • memory/2920-18-0x0000000000400000-0x0000000000593000-memory.dmp

    Filesize

    1.6MB

  • memory/2920-23-0x0000000000400000-0x0000000000587000-memory.dmp

    Filesize

    1.5MB

  • memory/2920-32-0x0000000003220000-0x00000000033B3000-memory.dmp

    Filesize

    1.6MB

  • memory/2920-33-0x0000000000400000-0x0000000000587000-memory.dmp

    Filesize

    1.5MB