Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 22:46
Behavioral task
behavioral1
Sample
fb54e26638a056cb4065dc23cef3ba05_JaffaCakes118.exe
Resource
win7-20231129-en
General
-
Target
fb54e26638a056cb4065dc23cef3ba05_JaffaCakes118.exe
-
Size
784KB
-
MD5
fb54e26638a056cb4065dc23cef3ba05
-
SHA1
aa688fa17cbeea9a49cc8c49508c650a3319905f
-
SHA256
8630f6815673f0acf961658f781bc25ffc5c7848abc606bfd8ff20f5e64bcae5
-
SHA512
c7d015403b9f28b8f69613614e497a544b6fa1b67e067a8c6a5f53b1f680cf93e461a7a502cb757273a641a737fd59c082d1b078126b43fcb4a59de41177ccc3
-
SSDEEP
24576:AwwZUOO5dId8WC/NQZj+eaW92iZMTpMJEAju:7wc49e2lZvq
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/380-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/380-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3720-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3720-20-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/3720-21-0x0000000005550000-0x00000000056E3000-memory.dmp xmrig behavioral2/memory/3720-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 3720 fb54e26638a056cb4065dc23cef3ba05_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3720 fb54e26638a056cb4065dc23cef3ba05_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/380-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x0006000000022f29-11.dat upx behavioral2/memory/3720-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 380 fb54e26638a056cb4065dc23cef3ba05_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 380 fb54e26638a056cb4065dc23cef3ba05_JaffaCakes118.exe 3720 fb54e26638a056cb4065dc23cef3ba05_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 380 wrote to memory of 3720 380 fb54e26638a056cb4065dc23cef3ba05_JaffaCakes118.exe 87 PID 380 wrote to memory of 3720 380 fb54e26638a056cb4065dc23cef3ba05_JaffaCakes118.exe 87 PID 380 wrote to memory of 3720 380 fb54e26638a056cb4065dc23cef3ba05_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb54e26638a056cb4065dc23cef3ba05_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fb54e26638a056cb4065dc23cef3ba05_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Users\Admin\AppData\Local\Temp\fb54e26638a056cb4065dc23cef3ba05_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\fb54e26638a056cb4065dc23cef3ba05_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3720
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5c98703461521b50a74866d17ca0db019
SHA19798a3218b220e19065c5e948eb6cd2dc7331c6a
SHA256d041872cd53a5e36448a40a7227914e84be87b9e9edaadbf1ea969b1a0899cd8
SHA5127de6178d7c3ee8ae72adf1eb3a690de4847151f63135dc52d1813bd8c1208fb37f6a74593e6bb68657fa7e8059bcf74de0afac464af0177a58118307176b81b5