Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 03:01
Behavioral task
behavioral1
Sample
f4e45ee72b538c6c5664a627ce1b9d08_JaffaCakes118.exe
Resource
win7-20240319-en
General
-
Target
f4e45ee72b538c6c5664a627ce1b9d08_JaffaCakes118.exe
-
Size
784KB
-
MD5
f4e45ee72b538c6c5664a627ce1b9d08
-
SHA1
8dee84a6b111525b96852154e826b2ac1cdb9f91
-
SHA256
152bf0274832a54f765079a0b32b242b6017338f7de8b64f9eff910703f0fe44
-
SHA512
338454b16500d5977572080c5f70b5f6628c04577f204243bb26ef55385c3ff8aaba2376207c9d0113a2be9cc2aeb02f9c42ca090980299ef39f8ed15cb2667e
-
SSDEEP
12288:SQKAMSy619LHr20WoSiGcZPXDORAB7QQQceuopbH1RYKu3Myzenf0Z:0AMT619LL2hMPTt7Qjo8MKnf
Malware Config
Signatures
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral1/memory/1932-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/1932-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2192-19-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2192-24-0x00000000030D0000-0x0000000003263000-memory.dmp xmrig behavioral1/memory/2192-25-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2192-34-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig behavioral1/memory/2192-35-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2192 f4e45ee72b538c6c5664a627ce1b9d08_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2192 f4e45ee72b538c6c5664a627ce1b9d08_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 1932 f4e45ee72b538c6c5664a627ce1b9d08_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1932-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x000b0000000121e6-10.dat upx behavioral1/memory/1932-15-0x0000000003250000-0x0000000003562000-memory.dmp upx behavioral1/memory/2192-17-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1932 f4e45ee72b538c6c5664a627ce1b9d08_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1932 f4e45ee72b538c6c5664a627ce1b9d08_JaffaCakes118.exe 2192 f4e45ee72b538c6c5664a627ce1b9d08_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1932 wrote to memory of 2192 1932 f4e45ee72b538c6c5664a627ce1b9d08_JaffaCakes118.exe 29 PID 1932 wrote to memory of 2192 1932 f4e45ee72b538c6c5664a627ce1b9d08_JaffaCakes118.exe 29 PID 1932 wrote to memory of 2192 1932 f4e45ee72b538c6c5664a627ce1b9d08_JaffaCakes118.exe 29 PID 1932 wrote to memory of 2192 1932 f4e45ee72b538c6c5664a627ce1b9d08_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4e45ee72b538c6c5664a627ce1b9d08_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f4e45ee72b538c6c5664a627ce1b9d08_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\f4e45ee72b538c6c5664a627ce1b9d08_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f4e45ee72b538c6c5664a627ce1b9d08_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2192
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD521d21ab478217c9d4da194ed94d78a29
SHA14f5274bf5fd3beb61ef942cc19643b52d5703cbb
SHA2566816ed6a84b75f9e8044900ee2986e5067bbafc83799ed161497c09bbf180677
SHA5120f2ea75bcdfaf35557cbbc8cc8f68ea41fe7c86d85fad35965f0cddbe1e77f979b1f8ce2775a96e210f2225c5be4b4f8a78f2036d20dc50092c7113ed79c7711