Analysis
-
max time kernel
93s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:25
Behavioral task
behavioral1
Sample
eac1a3c72709a16a14d1b10a5bacc667_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
eac1a3c72709a16a14d1b10a5bacc667_JaffaCakes118.exe
-
Size
784KB
-
MD5
eac1a3c72709a16a14d1b10a5bacc667
-
SHA1
10ec0da28c0baa226ff4e0b5403bfe39a6537c5c
-
SHA256
06e2da0b1005e9887ea9824749699fdcc8e98206aad94a2e979c0e89d05acacd
-
SHA512
543166184a83bf9330c57214b3f9c644bdca847b3daf5836a721c0498691b63701a9c619117f354cf410759dbecc0b254da610fb4f00bb2fcd0d4ac5e9f7c671
-
SSDEEP
12288:vr68htPetcULtryvOZsi8WNd+pq+UcrHdh+hmcKstW6+d1Hl154IyZhc+CtDVPN3:G8h8tryKPC4+TPeWE+TiBhc+OVPNwQe
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/1672-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1672-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3092-16-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3092-20-0x0000000005430000-0x00000000055C3000-memory.dmp xmrig behavioral2/memory/3092-21-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/3092-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 3092 eac1a3c72709a16a14d1b10a5bacc667_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3092 eac1a3c72709a16a14d1b10a5bacc667_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/1672-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x000800000002349a-11.dat upx behavioral2/memory/3092-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eac1a3c72709a16a14d1b10a5bacc667_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eac1a3c72709a16a14d1b10a5bacc667_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1672 eac1a3c72709a16a14d1b10a5bacc667_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1672 eac1a3c72709a16a14d1b10a5bacc667_JaffaCakes118.exe 3092 eac1a3c72709a16a14d1b10a5bacc667_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1672 wrote to memory of 3092 1672 eac1a3c72709a16a14d1b10a5bacc667_JaffaCakes118.exe 83 PID 1672 wrote to memory of 3092 1672 eac1a3c72709a16a14d1b10a5bacc667_JaffaCakes118.exe 83 PID 1672 wrote to memory of 3092 1672 eac1a3c72709a16a14d1b10a5bacc667_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\eac1a3c72709a16a14d1b10a5bacc667_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eac1a3c72709a16a14d1b10a5bacc667_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\eac1a3c72709a16a14d1b10a5bacc667_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eac1a3c72709a16a14d1b10a5bacc667_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:3092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5d6db1f64419c1c98955104c03989639e
SHA17de60eebc36fdd9224d5d2f36b0e052ab82f862a
SHA25614be73474d4fd96dcd73b3791d96ac9a7238a3b7062dd2a3d4b45841b0ed9759
SHA51279ad41b689024f00e5fc330c7e9f4ec2220c7d18bb1a9a872be9102c9b88b732001690b4936ed3e82787f7dc76595e706916c5989a0e74497fcdd9d1f6a2df2f