Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:25
Behavioral task
behavioral1
Sample
eac1a3c72709a16a14d1b10a5bacc667_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
eac1a3c72709a16a14d1b10a5bacc667_JaffaCakes118.exe
-
Size
784KB
-
MD5
eac1a3c72709a16a14d1b10a5bacc667
-
SHA1
10ec0da28c0baa226ff4e0b5403bfe39a6537c5c
-
SHA256
06e2da0b1005e9887ea9824749699fdcc8e98206aad94a2e979c0e89d05acacd
-
SHA512
543166184a83bf9330c57214b3f9c644bdca847b3daf5836a721c0498691b63701a9c619117f354cf410759dbecc0b254da610fb4f00bb2fcd0d4ac5e9f7c671
-
SSDEEP
12288:vr68htPetcULtryvOZsi8WNd+pq+UcrHdh+hmcKstW6+d1Hl154IyZhc+CtDVPN3:G8h8tryKPC4+TPeWE+TiBhc+OVPNwQe
Malware Config
Signatures
-
XMRig Miner payload 8 IoCs
resource yara_rule behavioral1/memory/2104-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2104-15-0x00000000032C0000-0x00000000035D2000-memory.dmp xmrig behavioral1/memory/2104-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2368-26-0x0000000003110000-0x00000000032A3000-memory.dmp xmrig behavioral1/memory/2368-19-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2368-24-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2368-34-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig behavioral1/memory/2368-35-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2368 eac1a3c72709a16a14d1b10a5bacc667_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2368 eac1a3c72709a16a14d1b10a5bacc667_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2104 eac1a3c72709a16a14d1b10a5bacc667_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2104-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x000c00000001226d-10.dat upx behavioral1/memory/2368-17-0x0000000000400000-0x0000000000712000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eac1a3c72709a16a14d1b10a5bacc667_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eac1a3c72709a16a14d1b10a5bacc667_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2104 eac1a3c72709a16a14d1b10a5bacc667_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2104 eac1a3c72709a16a14d1b10a5bacc667_JaffaCakes118.exe 2368 eac1a3c72709a16a14d1b10a5bacc667_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2368 2104 eac1a3c72709a16a14d1b10a5bacc667_JaffaCakes118.exe 31 PID 2104 wrote to memory of 2368 2104 eac1a3c72709a16a14d1b10a5bacc667_JaffaCakes118.exe 31 PID 2104 wrote to memory of 2368 2104 eac1a3c72709a16a14d1b10a5bacc667_JaffaCakes118.exe 31 PID 2104 wrote to memory of 2368 2104 eac1a3c72709a16a14d1b10a5bacc667_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\eac1a3c72709a16a14d1b10a5bacc667_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eac1a3c72709a16a14d1b10a5bacc667_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\eac1a3c72709a16a14d1b10a5bacc667_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eac1a3c72709a16a14d1b10a5bacc667_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5f148bcc42686b143c5682a9bfdb19931
SHA122ce807c2dfa9360247e161e526dd26b3a4de0a1
SHA256ae13703809e94171688491a44ee148e71261ee710f6a7059c07359df77cefe9f
SHA5125596b7d45f8be48e42437ae4d278f2d915223a72fc63b5859c107ffae3cf2fc25e848d0a2fd217192a9ed3df31ad490e06ad0c29f6676d1413d045c6c16ef3c0