Analysis
-
max time kernel
89s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2024 05:37
Behavioral task
behavioral1
Sample
f99dbd5c46e242527dee3af118b62c45_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
f99dbd5c46e242527dee3af118b62c45_JaffaCakes118.exe
-
Size
784KB
-
MD5
f99dbd5c46e242527dee3af118b62c45
-
SHA1
7623580789b809497794ca9979a8b95f53e2f82a
-
SHA256
d5db6955d82803d53d04dec68661903586ba99a1bb7f8b04c086826058412187
-
SHA512
96a093d7510c995993ddbda66f93de199f3e851b26fe3ecf704b9dd24f93f2201be6441b443a2c8d2f5428b809a83455c2d9c4904278bc081ebec379eeefb2a9
-
SSDEEP
12288:CHO6t6Ii/AVl6hj/Pjvu7yyoGvfBR8rGfZZDESjeYFc8++60eG6yQKimdFFwkE:2iFzyoGvJRsGf7DDd+VrVADbwkE
Malware Config
Signatures
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral2/memory/3672-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3672-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3880-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3880-20-0x0000000005340000-0x00000000054D3000-memory.dmp xmrig behavioral2/memory/3880-21-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/3880-30-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig behavioral2/memory/3880-31-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 3880 f99dbd5c46e242527dee3af118b62c45_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3880 f99dbd5c46e242527dee3af118b62c45_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/3672-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x000d000000023383-11.dat upx behavioral2/memory/3880-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3672 f99dbd5c46e242527dee3af118b62c45_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3672 f99dbd5c46e242527dee3af118b62c45_JaffaCakes118.exe 3880 f99dbd5c46e242527dee3af118b62c45_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3672 wrote to memory of 3880 3672 f99dbd5c46e242527dee3af118b62c45_JaffaCakes118.exe 88 PID 3672 wrote to memory of 3880 3672 f99dbd5c46e242527dee3af118b62c45_JaffaCakes118.exe 88 PID 3672 wrote to memory of 3880 3672 f99dbd5c46e242527dee3af118b62c45_JaffaCakes118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\f99dbd5c46e242527dee3af118b62c45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f99dbd5c46e242527dee3af118b62c45_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\f99dbd5c46e242527dee3af118b62c45_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f99dbd5c46e242527dee3af118b62c45_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3880
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5eaef55840d380d6a97ff4defd478b337
SHA1798452d5613ecb419d56c7066e1929a81244cfb1
SHA256aea170d0e246e84049616f773da5ce16e08ea58acabd3e88ee611019f5aa1496
SHA51276daf2642148f865352631d431ffc72b677172f7f1a0992472ca4d00b5e00d523d7c327b830a896bafa43d67eff993db1e844664243aed36aeebe364b23a734e