Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
04/04/2024, 20:48
Behavioral task
behavioral1
Sample
c261149d4e7f6c19bdb188c7f37f7d8f_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
c261149d4e7f6c19bdb188c7f37f7d8f_JaffaCakes118.exe
-
Size
4.6MB
-
MD5
c261149d4e7f6c19bdb188c7f37f7d8f
-
SHA1
ae83e0ee118bc28cbb2fac3cb1c2e3346a8abaa5
-
SHA256
9c72dad5d73eefc96b1ff370e0e35b3744dea6134a7ddaef6bcd881521f6538d
-
SHA512
ad5c52ecfaca9deccc4a7f2c5591093d5266556029a34fcd944dab0daef1be2f9d754c69fc3207dd004e6e701ea23b893fd9bd801fea60d79c7d3b1162115418
-
SSDEEP
98304:kUCP180L5+irxQKnAjAtHZO4VZAlBOIbU+dZq5ojlbHl8dr47n:kRO0LZrxD5O4VZAZUq85SlbSBun
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/4892-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4892-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4328-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4328-21-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/4328-20-0x00000000054A0000-0x0000000005633000-memory.dmp xmrig behavioral2/memory/4328-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 4328 c261149d4e7f6c19bdb188c7f37f7d8f_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4328 c261149d4e7f6c19bdb188c7f37f7d8f_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/4892-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x000a0000000231e9-11.dat upx behavioral2/memory/4328-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4892 c261149d4e7f6c19bdb188c7f37f7d8f_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4892 c261149d4e7f6c19bdb188c7f37f7d8f_JaffaCakes118.exe 4328 c261149d4e7f6c19bdb188c7f37f7d8f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4892 wrote to memory of 4328 4892 c261149d4e7f6c19bdb188c7f37f7d8f_JaffaCakes118.exe 88 PID 4892 wrote to memory of 4328 4892 c261149d4e7f6c19bdb188c7f37f7d8f_JaffaCakes118.exe 88 PID 4892 wrote to memory of 4328 4892 c261149d4e7f6c19bdb188c7f37f7d8f_JaffaCakes118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\c261149d4e7f6c19bdb188c7f37f7d8f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c261149d4e7f6c19bdb188c7f37f7d8f_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\c261149d4e7f6c19bdb188c7f37f7d8f_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c261149d4e7f6c19bdb188c7f37f7d8f_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4328
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD57fbb59cf17339d6156c729ded65e6e7e
SHA163509438e8cfbd03eab2f3c766704ebfd3b365ef
SHA2561155f695e5df98387e202c5e126290bf4442a525d2dbf6d5b676ca595b2292de
SHA5128da7694867a01bad836339011cb4474503296eb0d35518cfb19247a58e67c1d8fd42dc5d9be980e725157543241d89d224ec0f1b9a6ee279225a08d71efc2c84