Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2024, 07:48
Behavioral task
behavioral1
Sample
fc46113cbb09a04d264156c4293495d2_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
fc46113cbb09a04d264156c4293495d2_JaffaCakes118.exe
-
Size
784KB
-
MD5
fc46113cbb09a04d264156c4293495d2
-
SHA1
52d07e459240161595c5ea66d6b55de6367c6b8c
-
SHA256
df2bd734751fd873e778b7c96ed759a7f7f40286c6aaa14cc19a16d329205de7
-
SHA512
29821baa43ec241a0611da546ea503df746f581fead2a93befab60d26cbbe838793fc390e1a10f1809282346f926ad9c0ab4accbb4dfbb86b0c2465a34c314c4
-
SSDEEP
12288:kHbhmhF/iLAvq0ra6/xIlUEMrtuFCFPcYw/Wm8EOj1jAyZV/d2R8M9hXQ6LJb:kdMwLAS9kSOEM1cgm8N1jAyZVrGhHL
Malware Config
Signatures
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral2/memory/60-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/60-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3004-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3004-21-0x0000000005300000-0x0000000005493000-memory.dmp xmrig behavioral2/memory/3004-20-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/3004-30-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig behavioral2/memory/3004-31-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 3004 fc46113cbb09a04d264156c4293495d2_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3004 fc46113cbb09a04d264156c4293495d2_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/60-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x0006000000023270-11.dat upx behavioral2/memory/3004-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 60 fc46113cbb09a04d264156c4293495d2_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 60 fc46113cbb09a04d264156c4293495d2_JaffaCakes118.exe 3004 fc46113cbb09a04d264156c4293495d2_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 60 wrote to memory of 3004 60 fc46113cbb09a04d264156c4293495d2_JaffaCakes118.exe 86 PID 60 wrote to memory of 3004 60 fc46113cbb09a04d264156c4293495d2_JaffaCakes118.exe 86 PID 60 wrote to memory of 3004 60 fc46113cbb09a04d264156c4293495d2_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc46113cbb09a04d264156c4293495d2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fc46113cbb09a04d264156c4293495d2_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Users\Admin\AppData\Local\Temp\fc46113cbb09a04d264156c4293495d2_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\fc46113cbb09a04d264156c4293495d2_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3004
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5bc71abf7f2266af277045ed500502f40
SHA188fa9ee4b1aafebff7510978f58d0f10bb732002
SHA2560c8496077d3d0fb6014101be4ef7282772a0fb4b65bb4bc4058f711398da64bc
SHA512b33976ff7029c1f1494376077f6859a4b238a1dc73bf74f90a313687b0c49fe83bbe1ffe275cd4b9cbb7b3fbd005e83861e3aa3120aeb6025e8c1ce085733998