Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
20/04/2024, 19:00
Behavioral task
behavioral1
Sample
fd6b76049b3ec5e778d5b7498d08b0d7_JaffaCakes118.exe
Resource
win7-20240215-en
General
-
Target
fd6b76049b3ec5e778d5b7498d08b0d7_JaffaCakes118.exe
-
Size
784KB
-
MD5
fd6b76049b3ec5e778d5b7498d08b0d7
-
SHA1
b2d168d6ed8ebe8030232492c2aecd041515f139
-
SHA256
8e11a6e67dd38676bfaac3381fb1059966a072ac3151484bbac6373eee4cc854
-
SHA512
d4df75620d61170b6492d6d1288aae216107b0be8a24c0d23993e36a6f77f8713be63204d4a96d0f4732301c4cf70d2c2905cff623395310d360835a66c60536
-
SSDEEP
24576:x1m0ecGKcx/zTGJuNUYxr2dpnoOHgeFu4TCC:uD1xzTvLEpnoOPFRTF
Malware Config
Signatures
-
XMRig Miner payload 8 IoCs
resource yara_rule behavioral1/memory/1664-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/1664-16-0x00000000031F0000-0x0000000003502000-memory.dmp xmrig behavioral1/memory/1664-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/3036-19-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/3036-24-0x0000000003060000-0x00000000031F3000-memory.dmp xmrig behavioral1/memory/3036-25-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/3036-35-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/3036-34-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 3036 fd6b76049b3ec5e778d5b7498d08b0d7_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3036 fd6b76049b3ec5e778d5b7498d08b0d7_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 1664 fd6b76049b3ec5e778d5b7498d08b0d7_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1664-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x00090000000122be-10.dat upx behavioral1/memory/3036-17-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1664 fd6b76049b3ec5e778d5b7498d08b0d7_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1664 fd6b76049b3ec5e778d5b7498d08b0d7_JaffaCakes118.exe 3036 fd6b76049b3ec5e778d5b7498d08b0d7_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1664 wrote to memory of 3036 1664 fd6b76049b3ec5e778d5b7498d08b0d7_JaffaCakes118.exe 29 PID 1664 wrote to memory of 3036 1664 fd6b76049b3ec5e778d5b7498d08b0d7_JaffaCakes118.exe 29 PID 1664 wrote to memory of 3036 1664 fd6b76049b3ec5e778d5b7498d08b0d7_JaffaCakes118.exe 29 PID 1664 wrote to memory of 3036 1664 fd6b76049b3ec5e778d5b7498d08b0d7_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd6b76049b3ec5e778d5b7498d08b0d7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fd6b76049b3ec5e778d5b7498d08b0d7_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\fd6b76049b3ec5e778d5b7498d08b0d7_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\fd6b76049b3ec5e778d5b7498d08b0d7_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3036
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD54c5acbc7ae16f307e5b10ceb14493f6e
SHA13f9abaa2194218170b25f9903ac1397d2c6b1e89
SHA2560f8d8b21ba37dfacd18efa484651a235b3a29bd88956c64343bf27c783c2c003
SHA5120e07977f88aed02ef3f6c3559b566a27eed498bb37b9b343f866e8e7d41aae9f68fd02ec6ba2afa385dcdf20ffe22aa90fb6548392afa1ad4c71bbabefbb6f70