Analysis
-
max time kernel
62s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 05:06
Behavioral task
behavioral1
Sample
f518c8398b749ad1b4770f62a9e39d1e_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
f518c8398b749ad1b4770f62a9e39d1e_JaffaCakes118.exe
-
Size
784KB
-
MD5
f518c8398b749ad1b4770f62a9e39d1e
-
SHA1
192ecfcd6a1153d3980a4c91043a8b901cd99954
-
SHA256
fb4c44491bb4429a17178d7deff3a869cafb43e7ee84b05ca2398718754cbb33
-
SHA512
cf0abb4eba62535659c950796919bea82b62bab3d38f47d3a4f8b6b5afb6fc7e7baeb108d744065646aeb777393e5473a900d2d15c0a252cdb07404082fc8ee9
-
SSDEEP
12288:qgsyHoyauD1eMcX0bdpkosA9akoxKdUN/0ERVdxWeNZYOhVe5uyaLy2v9TlWvuMa:7Hh9cGWossa1KeN3RVdNZxa5uyEl+Zg
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/1700-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1700-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4740-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4740-20-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/4740-22-0x0000000005400000-0x0000000005593000-memory.dmp xmrig behavioral2/memory/4740-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 4740 f518c8398b749ad1b4770f62a9e39d1e_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4740 f518c8398b749ad1b4770f62a9e39d1e_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/1700-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x000a0000000233ea-11.dat upx behavioral2/memory/4740-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1700 f518c8398b749ad1b4770f62a9e39d1e_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1700 f518c8398b749ad1b4770f62a9e39d1e_JaffaCakes118.exe 4740 f518c8398b749ad1b4770f62a9e39d1e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1700 wrote to memory of 4740 1700 f518c8398b749ad1b4770f62a9e39d1e_JaffaCakes118.exe 88 PID 1700 wrote to memory of 4740 1700 f518c8398b749ad1b4770f62a9e39d1e_JaffaCakes118.exe 88 PID 1700 wrote to memory of 4740 1700 f518c8398b749ad1b4770f62a9e39d1e_JaffaCakes118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\f518c8398b749ad1b4770f62a9e39d1e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f518c8398b749ad1b4770f62a9e39d1e_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\f518c8398b749ad1b4770f62a9e39d1e_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f518c8398b749ad1b4770f62a9e39d1e_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4740
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD587c5b2579f0d23e1f13ab840a7d741e8
SHA171844ffb1da951a169a8d58655d6878cfdf20b01
SHA256078722c0951fb5a13f62bf1cf051cfaf1edc9eed6cdce7916dad50992d75a44e
SHA512116583746cd7b18810cddfa608666b533b13c4522427e9cc6a8520dee18f94a04091b5002b1408936f9501413f441f5b516a25ca538d0f12be1c3047d5ca9510