Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 12:18
Behavioral task
behavioral1
Sample
d1eb618d8d388d17271458d2c3eaa3b9_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d1eb618d8d388d17271458d2c3eaa3b9_JaffaCakes118.exe
-
Size
784KB
-
MD5
d1eb618d8d388d17271458d2c3eaa3b9
-
SHA1
487910ab054cf2b0d2a8aad3eb51eb953e9df9db
-
SHA256
771f2ef424de4ced493916699da64fb39922d61f0e28993c42b11a9669425859
-
SHA512
967e5627adf4254c874b9bb99495a7e8c74f8487488fb702333e2ff0f7f0104fcae7d24fc96f5ad530b75c456be0f8f8786766d8406a933e9b3b91a9a16aea36
-
SSDEEP
24576:fodXMXQ5ybAIId+zaDyA35+S8d7K1f8kI:AdXM2ybAlHDZ5IdtR
Malware Config
Signatures
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral1/memory/1980-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/1980-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/3016-18-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/3016-23-0x0000000003060000-0x00000000031F3000-memory.dmp xmrig behavioral1/memory/3016-24-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/3016-33-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig behavioral1/memory/3016-34-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 3016 d1eb618d8d388d17271458d2c3eaa3b9_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3016 d1eb618d8d388d17271458d2c3eaa3b9_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 1980 d1eb618d8d388d17271458d2c3eaa3b9_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1980-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x000e00000001434d-10.dat upx behavioral1/memory/1980-15-0x00000000030D0000-0x00000000033E2000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d1eb618d8d388d17271458d2c3eaa3b9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d1eb618d8d388d17271458d2c3eaa3b9_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1980 d1eb618d8d388d17271458d2c3eaa3b9_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1980 d1eb618d8d388d17271458d2c3eaa3b9_JaffaCakes118.exe 3016 d1eb618d8d388d17271458d2c3eaa3b9_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1980 wrote to memory of 3016 1980 d1eb618d8d388d17271458d2c3eaa3b9_JaffaCakes118.exe 32 PID 1980 wrote to memory of 3016 1980 d1eb618d8d388d17271458d2c3eaa3b9_JaffaCakes118.exe 32 PID 1980 wrote to memory of 3016 1980 d1eb618d8d388d17271458d2c3eaa3b9_JaffaCakes118.exe 32 PID 1980 wrote to memory of 3016 1980 d1eb618d8d388d17271458d2c3eaa3b9_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1eb618d8d388d17271458d2c3eaa3b9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d1eb618d8d388d17271458d2c3eaa3b9_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\d1eb618d8d388d17271458d2c3eaa3b9_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d1eb618d8d388d17271458d2c3eaa3b9_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:3016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5e6dcdcbd009dc1c206b7c409ffea40b9
SHA17fa978202f03236f52571f9c2eb87b3e5364c0b3
SHA2564ef725bae03d59dab3a022361255d8da0f338909f2764ae50556da7903ca1f2b
SHA512d5b4ea6c30f68627fb2979bdb8ca3c4ede8b6e5b263f99bf61bbec213c2b113dd2cca466e8983eb43501aa304f2e05cce6fe5aad5d66b571b29e3f8e0df64260