Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 09:49
Behavioral task
behavioral1
Sample
e233f2b6f121e9c68ff478dd63786ab9_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e233f2b6f121e9c68ff478dd63786ab9_JaffaCakes118.exe
-
Size
2.3MB
-
MD5
e233f2b6f121e9c68ff478dd63786ab9
-
SHA1
ec0825f2a0f701ced314ef3cd027172bf978b814
-
SHA256
c897b6a2dea475b7a992a72d182f352c4eef60a86cc886fd1b53c6d94f3fe8d6
-
SHA512
0419c579819969d313d96a59530f00e4044f49e5b9ffbcc82610624d984f5f5a63248cc9eb3eabf7670a5c50d5a24abf9ca1fc648d9392ec74b8225b787009a7
-
SSDEEP
49152:+3HBbp9iRX7mAJdmf6ODFIR9KZ27pGQj6/K5lgpA3X3M1CBQE:KH/9iYAJFOxI/KGsS6mXcGQE
Malware Config
Signatures
-
XMRig Miner payload 8 IoCs
resource yara_rule behavioral1/memory/2084-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2084-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2668-18-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2668-23-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2668-24-0x00000000030A0000-0x0000000003233000-memory.dmp xmrig behavioral1/memory/2668-34-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2668-33-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig behavioral1/memory/2084-35-0x0000000003490000-0x00000000037A2000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2668 e233f2b6f121e9c68ff478dd63786ab9_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2668 e233f2b6f121e9c68ff478dd63786ab9_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2084 e233f2b6f121e9c68ff478dd63786ab9_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2084-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x000b000000012282-10.dat upx behavioral1/memory/2084-15-0x0000000003490000-0x00000000037A2000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e233f2b6f121e9c68ff478dd63786ab9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e233f2b6f121e9c68ff478dd63786ab9_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2084 e233f2b6f121e9c68ff478dd63786ab9_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2084 e233f2b6f121e9c68ff478dd63786ab9_JaffaCakes118.exe 2668 e233f2b6f121e9c68ff478dd63786ab9_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2668 2084 e233f2b6f121e9c68ff478dd63786ab9_JaffaCakes118.exe 32 PID 2084 wrote to memory of 2668 2084 e233f2b6f121e9c68ff478dd63786ab9_JaffaCakes118.exe 32 PID 2084 wrote to memory of 2668 2084 e233f2b6f121e9c68ff478dd63786ab9_JaffaCakes118.exe 32 PID 2084 wrote to memory of 2668 2084 e233f2b6f121e9c68ff478dd63786ab9_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\e233f2b6f121e9c68ff478dd63786ab9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e233f2b6f121e9c68ff478dd63786ab9_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\e233f2b6f121e9c68ff478dd63786ab9_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e233f2b6f121e9c68ff478dd63786ab9_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD51c13a63b177c27d5f4f0f61806413ceb
SHA12f0ddb9e2372dc4d16489a2675975444515546c5
SHA2567c498483e1ad97d8c2d7d989dbfec7cdd7bf80965a3c9125fa11c8c6d7bcf954
SHA512d5234935af97c479f8d99896a3792e270fd619b96957d8d429f63223344993a311d3d1309f208414dd946d66802c1d05a7a2277db732175a49205cbf150421f5