Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17-04-2024 10:23
Behavioral task
behavioral1
Sample
f58dbdbf39f28d4b430c2a70a3e908c1_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
f58dbdbf39f28d4b430c2a70a3e908c1_JaffaCakes118.exe
-
Size
784KB
-
MD5
f58dbdbf39f28d4b430c2a70a3e908c1
-
SHA1
4e580aba388116064d2f5fbb0cbb9164b5ea8e41
-
SHA256
8a69ed50dbe22d168c600048d6b03d8989d9481814e30f720e77d7b55297c3a2
-
SHA512
7059a4cf63274088193e03558ccecd36d3610c8ef26357ae4568b3841490eb26c4fa20fbd099fb8762e45fa36d59edd3690b5503debfc0da5f63c6d81e62be5f
-
SSDEEP
12288:mfdjCj6+hyLmFUJ8JvWk+L4XJsrd8ND+I9+8rNNKYt1UqUYg+wVzMqSYyK:mNChyLH8s3L4ZsU+8rNNKw1lHgPdMqN
Malware Config
Signatures
-
XMRig Miner payload 8 IoCs
resource yara_rule behavioral1/memory/2412-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2412-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2748-18-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2748-26-0x0000000003020000-0x00000000031B3000-memory.dmp xmrig behavioral1/memory/2748-24-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2748-34-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig behavioral1/memory/2748-35-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2412-36-0x00000000030F0000-0x0000000003402000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2748 f58dbdbf39f28d4b430c2a70a3e908c1_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2748 f58dbdbf39f28d4b430c2a70a3e908c1_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2412 f58dbdbf39f28d4b430c2a70a3e908c1_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2412-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x000e000000012248-10.dat upx behavioral1/memory/2412-15-0x00000000030F0000-0x0000000003402000-memory.dmp upx behavioral1/memory/2748-17-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2412 f58dbdbf39f28d4b430c2a70a3e908c1_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2412 f58dbdbf39f28d4b430c2a70a3e908c1_JaffaCakes118.exe 2748 f58dbdbf39f28d4b430c2a70a3e908c1_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2748 2412 f58dbdbf39f28d4b430c2a70a3e908c1_JaffaCakes118.exe 29 PID 2412 wrote to memory of 2748 2412 f58dbdbf39f28d4b430c2a70a3e908c1_JaffaCakes118.exe 29 PID 2412 wrote to memory of 2748 2412 f58dbdbf39f28d4b430c2a70a3e908c1_JaffaCakes118.exe 29 PID 2412 wrote to memory of 2748 2412 f58dbdbf39f28d4b430c2a70a3e908c1_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\f58dbdbf39f28d4b430c2a70a3e908c1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f58dbdbf39f28d4b430c2a70a3e908c1_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\f58dbdbf39f28d4b430c2a70a3e908c1_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f58dbdbf39f28d4b430c2a70a3e908c1_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2748
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD563eb01f2449d77f75319f44144e57aa6
SHA1fa447b86dfb671ed323f669bc3b747654f91ce61
SHA256952bbde7a2dfa051dd96b25eec7bfe7c66af5fa5a6a95fb2b563c1613975dddf
SHA5129b017ba2b4a386ccc8f7ac3b5e39b1bc99e3b053135aa301dee2106555fd8caba231292f817a0060ef849520db09d7e856fc44b520a32f7105af1f1609c98b7c