Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-10-2024 06:26
Behavioral task
behavioral1
Sample
16868ca40ddfc223b670a96c17465fb7_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
16868ca40ddfc223b670a96c17465fb7_JaffaCakes118.exe
-
Size
784KB
-
MD5
16868ca40ddfc223b670a96c17465fb7
-
SHA1
4f559c0b702d50f07c00113cf480215e87e0ef7e
-
SHA256
a484a97caef1ee5357f30309a51679f1d46eeb7c575c7bdf3be51674c7d63a55
-
SHA512
abbef323e206c07493190005ea18fae81af90e367c4cb6d9e243f7b86e0677e43cefbb57c1f476074af3382d944e3296f6fca68d54924c563a3cc89487ca70ae
-
SSDEEP
24576:lM4mtdIMh70XfLYM96J7UkVIpvGY1k4B:ld/Mh70x9MAOB4B
Malware Config
Signatures
-
XMRig Miner payload 8 IoCs
resource yara_rule behavioral1/memory/2228-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2228-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2824-17-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2824-34-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig behavioral1/memory/2824-35-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2824-32-0x0000000002FD0000-0x0000000003163000-memory.dmp xmrig behavioral1/memory/2824-23-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2228-36-0x00000000031F0000-0x0000000003502000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2824 16868ca40ddfc223b670a96c17465fb7_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2824 16868ca40ddfc223b670a96c17465fb7_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2228 16868ca40ddfc223b670a96c17465fb7_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2228-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/memory/2228-16-0x00000000031F0000-0x0000000003502000-memory.dmp upx behavioral1/files/0x0007000000012117-15.dat upx behavioral1/memory/2824-18-0x0000000000400000-0x0000000000712000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 16868ca40ddfc223b670a96c17465fb7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 16868ca40ddfc223b670a96c17465fb7_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2228 16868ca40ddfc223b670a96c17465fb7_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2228 16868ca40ddfc223b670a96c17465fb7_JaffaCakes118.exe 2824 16868ca40ddfc223b670a96c17465fb7_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2824 2228 16868ca40ddfc223b670a96c17465fb7_JaffaCakes118.exe 31 PID 2228 wrote to memory of 2824 2228 16868ca40ddfc223b670a96c17465fb7_JaffaCakes118.exe 31 PID 2228 wrote to memory of 2824 2228 16868ca40ddfc223b670a96c17465fb7_JaffaCakes118.exe 31 PID 2228 wrote to memory of 2824 2228 16868ca40ddfc223b670a96c17465fb7_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\16868ca40ddfc223b670a96c17465fb7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\16868ca40ddfc223b670a96c17465fb7_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\16868ca40ddfc223b670a96c17465fb7_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\16868ca40ddfc223b670a96c17465fb7_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD513441b90dd9bf958ba329b54dc62122b
SHA12d793d1d00670295bcfe9489ac8b65829d6da7c7
SHA2562293eefe8712e712875e42d52a3451498903f832365da7ca593a7c6e539c2fb7
SHA51239751217de7bdfcb5b33f4d91047080ad6e284960b06474fc57f01c744536ab00d4cd4c1af61f05d5029c5d55061c46d39b71fd39b86b1d8ce879f0d80cd8b25