Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/12/2024, 16:46
Behavioral task
behavioral1
Sample
fc57580b06834b70e6e9bbb25accce5a_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
fc57580b06834b70e6e9bbb25accce5a_JaffaCakes118.exe
-
Size
784KB
-
MD5
fc57580b06834b70e6e9bbb25accce5a
-
SHA1
b20decf33fc50a1d1267253ab2166fb06b467005
-
SHA256
ffa64a516193605b267e15ba135f854ff3cdbcd90ecdf9983784c40539bcd765
-
SHA512
9a90e0d7cd57cd6f0fb4ff83565d53b1f953ebfff03083a8b94165f6f4cc24fbbab86af5d58b9867159c2c265a687a246ec7b7c11592ad03e98c9ce7fab422ec
-
SSDEEP
12288:yf+iblHsaUhGsWfjSweVsWnXGvlfU4feFFsV8DR9sQtvcl1gE33aQb:yfhFagOptnilfXWbk8DR9fWl1l3pb
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/1632-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1632-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1740-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1740-20-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/1740-29-0x00000000053E0000-0x0000000005573000-memory.dmp xmrig behavioral2/memory/1740-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 1740 fc57580b06834b70e6e9bbb25accce5a_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1740 fc57580b06834b70e6e9bbb25accce5a_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/1632-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/memory/1740-13-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x0008000000023c92-11.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc57580b06834b70e6e9bbb25accce5a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc57580b06834b70e6e9bbb25accce5a_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1632 fc57580b06834b70e6e9bbb25accce5a_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1632 fc57580b06834b70e6e9bbb25accce5a_JaffaCakes118.exe 1740 fc57580b06834b70e6e9bbb25accce5a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1632 wrote to memory of 1740 1632 fc57580b06834b70e6e9bbb25accce5a_JaffaCakes118.exe 84 PID 1632 wrote to memory of 1740 1632 fc57580b06834b70e6e9bbb25accce5a_JaffaCakes118.exe 84 PID 1632 wrote to memory of 1740 1632 fc57580b06834b70e6e9bbb25accce5a_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc57580b06834b70e6e9bbb25accce5a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fc57580b06834b70e6e9bbb25accce5a_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\fc57580b06834b70e6e9bbb25accce5a_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\fc57580b06834b70e6e9bbb25accce5a_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:1740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD549b0c0963269273c8cc74c3b99b955b1
SHA179988b54ef0728b3d8f71bcec5bd0f361497573a
SHA25606603da584ad98cfe3488057e8a90e9527fedd1f41d86e7b4f078e891ab08c63
SHA5123ef66572c5372f18d1d7f89f630c940b0b5e578d85413b9cc3fbac2d57450bea5bb4c5faefa9eb7b002fa0caf356b59ec318e2679a56a496e955189ec7f82f23