Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28/03/2024, 21:11
Behavioral task
behavioral1
Sample
101bb47249a776965df008294b56e9df_JaffaCakes118.exe
Resource
win7-20231129-en
General
-
Target
101bb47249a776965df008294b56e9df_JaffaCakes118.exe
-
Size
784KB
-
MD5
101bb47249a776965df008294b56e9df
-
SHA1
a58fce8a4186a275ac46611507705562292c904c
-
SHA256
2680b0604c0acb55a235934f1cdc14e106fbac3b39ed7a7cbe7f12a24e593d71
-
SHA512
c76f1a66a46a463641a3c8e0b9b71228cbdc4fda5a168ade6766430ddf3cff7d9158928ae99b934a5e37d3690ca21b228c2febe1de25a4e4fa24a316afbe52be
-
SSDEEP
24576:ovqeUFIcYMOkp9vTy34lm9qLJXUS8Sxky:oqYMOkp9molmUJsSm
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral1/memory/1660-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/1660-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2932-19-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2932-24-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2932-27-0x00000000031B0000-0x0000000003343000-memory.dmp xmrig behavioral1/memory/2932-34-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2932 101bb47249a776965df008294b56e9df_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2932 101bb47249a776965df008294b56e9df_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 1660 101bb47249a776965df008294b56e9df_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1660-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x0009000000014b70-10.dat upx behavioral1/memory/1660-15-0x0000000003220000-0x0000000003532000-memory.dmp upx behavioral1/memory/2932-17-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1660 101bb47249a776965df008294b56e9df_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1660 101bb47249a776965df008294b56e9df_JaffaCakes118.exe 2932 101bb47249a776965df008294b56e9df_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1660 wrote to memory of 2932 1660 101bb47249a776965df008294b56e9df_JaffaCakes118.exe 29 PID 1660 wrote to memory of 2932 1660 101bb47249a776965df008294b56e9df_JaffaCakes118.exe 29 PID 1660 wrote to memory of 2932 1660 101bb47249a776965df008294b56e9df_JaffaCakes118.exe 29 PID 1660 wrote to memory of 2932 1660 101bb47249a776965df008294b56e9df_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\101bb47249a776965df008294b56e9df_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\101bb47249a776965df008294b56e9df_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\101bb47249a776965df008294b56e9df_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\101bb47249a776965df008294b56e9df_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2932
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5ab1a9b94ded8a5ff7724691ca64ba952
SHA1cc4a1ed6d854764ecb1f89d83c90c311b449cbde
SHA2564955a54b7c8638aa1ed1052f138814796d59ed3de6fae782776b05cdc770a8a7
SHA5125c9a003a597edea386f16d9347fc5e61bfc7c9f2ad94979ed328fbb6185570d0224996e0fcafab08e7dd9d336f50ca68f6aaaf373717e8bbf0140809e3a04050