Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16-04-2024 19:09
Behavioral task
behavioral1
Sample
f423e51b9906661079136f57933e19b3_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
f423e51b9906661079136f57933e19b3_JaffaCakes118.exe
-
Size
784KB
-
MD5
f423e51b9906661079136f57933e19b3
-
SHA1
428f3afb989e473de337488566942c8492b1a924
-
SHA256
853df80b8ef50a606012df8713cb68a9aadfdf6c8d849f8181cae16efa6c6db0
-
SHA512
51deaf16b979c8be566bf112653e42f3d7ef80afb86094d69a7344376dc5a5e2eaa7d2b4b4e3a71e67b5a96c171ad30b44c72f8a26ebad40c48c45edb7bd29fa
-
SSDEEP
24576:+rYGSN33hDwW2wS7bWlvF6VKbq1Vly3ZV7ED:MYGSNHuW2wS7il968zrwD
Malware Config
Signatures
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral2/memory/2648-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2648-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3588-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3588-20-0x0000000005320000-0x00000000054B3000-memory.dmp xmrig behavioral2/memory/3588-21-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/3588-30-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig behavioral2/memory/3588-31-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 3588 f423e51b9906661079136f57933e19b3_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3588 f423e51b9906661079136f57933e19b3_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/2648-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x000900000001e6f5-11.dat upx behavioral2/memory/3588-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2648 f423e51b9906661079136f57933e19b3_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2648 f423e51b9906661079136f57933e19b3_JaffaCakes118.exe 3588 f423e51b9906661079136f57933e19b3_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2648 wrote to memory of 3588 2648 f423e51b9906661079136f57933e19b3_JaffaCakes118.exe 88 PID 2648 wrote to memory of 3588 2648 f423e51b9906661079136f57933e19b3_JaffaCakes118.exe 88 PID 2648 wrote to memory of 3588 2648 f423e51b9906661079136f57933e19b3_JaffaCakes118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\f423e51b9906661079136f57933e19b3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f423e51b9906661079136f57933e19b3_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\f423e51b9906661079136f57933e19b3_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f423e51b9906661079136f57933e19b3_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3588
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD53877fe708b0bdc43078deea0297ac008
SHA1000f5d6a2930e39873528f5930cb29f2dd2739cf
SHA256379e61955d28af18e1f2563ae82d88f53a38c07fecec4751c45f2abe7b69ec85
SHA512cd3b06945c63b5074c832d9566f76bbb25073a9fa0c56146ae9564561769005edc4c0b4ffbebad3e1b247a7914c11412001b22c41ad94eccde007634d3454a1f