Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15/09/2024, 09:49
Behavioral task
behavioral1
Sample
e233f2b6f121e9c68ff478dd63786ab9_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e233f2b6f121e9c68ff478dd63786ab9_JaffaCakes118.exe
-
Size
2.3MB
-
MD5
e233f2b6f121e9c68ff478dd63786ab9
-
SHA1
ec0825f2a0f701ced314ef3cd027172bf978b814
-
SHA256
c897b6a2dea475b7a992a72d182f352c4eef60a86cc886fd1b53c6d94f3fe8d6
-
SHA512
0419c579819969d313d96a59530f00e4044f49e5b9ffbcc82610624d984f5f5a63248cc9eb3eabf7670a5c50d5a24abf9ca1fc648d9392ec74b8225b787009a7
-
SSDEEP
49152:+3HBbp9iRX7mAJdmf6ODFIR9KZ27pGQj6/K5lgpA3X3M1CBQE:KH/9iYAJFOxI/KGsS6mXcGQE
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/3492-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3492-13-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2408-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2408-20-0x00000000053A0000-0x0000000005533000-memory.dmp xmrig behavioral2/memory/2408-21-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/2408-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2408 e233f2b6f121e9c68ff478dd63786ab9_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2408 e233f2b6f121e9c68ff478dd63786ab9_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/3492-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/memory/2408-12-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x00080000000234da-11.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e233f2b6f121e9c68ff478dd63786ab9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e233f2b6f121e9c68ff478dd63786ab9_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3492 e233f2b6f121e9c68ff478dd63786ab9_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3492 e233f2b6f121e9c68ff478dd63786ab9_JaffaCakes118.exe 2408 e233f2b6f121e9c68ff478dd63786ab9_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3492 wrote to memory of 2408 3492 e233f2b6f121e9c68ff478dd63786ab9_JaffaCakes118.exe 85 PID 3492 wrote to memory of 2408 3492 e233f2b6f121e9c68ff478dd63786ab9_JaffaCakes118.exe 85 PID 3492 wrote to memory of 2408 3492 e233f2b6f121e9c68ff478dd63786ab9_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\e233f2b6f121e9c68ff478dd63786ab9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e233f2b6f121e9c68ff478dd63786ab9_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\e233f2b6f121e9c68ff478dd63786ab9_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e233f2b6f121e9c68ff478dd63786ab9_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5067813f595dc536ab534f7ff5d780581
SHA10ab0a0da27f479ea15c78f49d6c51e83efaf4e43
SHA2569e95812e04336ac8c0e570b00d4bc6bbbc47d03cd1177da09a2ce96836b60859
SHA512eda81d6e2da5585aefa703ffa2ffac2327a593915127d977b3fe5de0b6fd49e47ae1b88c860ac2897abe8dd7d5a3618737bc55fabd98b3227ee9cde3a000f874