Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
19/04/2024, 09:47
Behavioral task
behavioral1
Sample
fa0938c506ee54e5e6dad13ef6825e95_JaffaCakes118.exe
Resource
win7-20231129-en
General
-
Target
fa0938c506ee54e5e6dad13ef6825e95_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
fa0938c506ee54e5e6dad13ef6825e95
-
SHA1
7600bbac6d2bf2517df688cf24abd038ee9e4ebe
-
SHA256
d70312899595371a1318c2ba65d004ba3bdcb7f71fe8764da1fc3db4bb42f1f6
-
SHA512
4151428fd53f854e541b2ec24adcc986718962fd8b105a3bbdd1384598025be95c6f5549bff345c4db6f38d28b7dc9739f17e69d35f654dc03ceedf15a18763e
-
SSDEEP
49152:GF0TvYMgn+itVPP7gG1iLul9mALKRvThlZMt7:GFMvHQ+itVPP7X1iLiELfO7
Malware Config
Signatures
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral1/memory/3028-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/3016-18-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/3028-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/3016-24-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/3016-27-0x0000000002FD0000-0x0000000003163000-memory.dmp xmrig behavioral1/memory/3016-34-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig behavioral1/memory/3016-35-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 3016 fa0938c506ee54e5e6dad13ef6825e95_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3016 fa0938c506ee54e5e6dad13ef6825e95_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 3028 fa0938c506ee54e5e6dad13ef6825e95_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/3028-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x000a00000001220d-10.dat upx behavioral1/memory/3028-15-0x0000000003420000-0x0000000003732000-memory.dmp upx behavioral1/memory/3016-17-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3028 fa0938c506ee54e5e6dad13ef6825e95_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3028 fa0938c506ee54e5e6dad13ef6825e95_JaffaCakes118.exe 3016 fa0938c506ee54e5e6dad13ef6825e95_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 3016 3028 fa0938c506ee54e5e6dad13ef6825e95_JaffaCakes118.exe 29 PID 3028 wrote to memory of 3016 3028 fa0938c506ee54e5e6dad13ef6825e95_JaffaCakes118.exe 29 PID 3028 wrote to memory of 3016 3028 fa0938c506ee54e5e6dad13ef6825e95_JaffaCakes118.exe 29 PID 3028 wrote to memory of 3016 3028 fa0938c506ee54e5e6dad13ef6825e95_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa0938c506ee54e5e6dad13ef6825e95_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fa0938c506ee54e5e6dad13ef6825e95_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\fa0938c506ee54e5e6dad13ef6825e95_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\fa0938c506ee54e5e6dad13ef6825e95_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3016
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5ef62db4698ab3cf0f2501462ab23a7cd
SHA11d4bcb7a81610c4ad48649e4b80a6aa505b880a5
SHA256bd9d30733742bd6923eff2959e69b8931b2533006ea75d47595810482c7694a8
SHA512baf5b52005861c6320b8e28316dfb4eded73b60e7e3a5da3cf68eb504947db190fcb2e7e304ec7218b546508c96b88ff14670e04d3c8354f0dba096725642975