Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    21/04/2024, 14:19

General

  • Target

    ff79008a2bf7f260f048e97d9bad9e96_JaffaCakes118.exe

  • Size

    784KB

  • MD5

    ff79008a2bf7f260f048e97d9bad9e96

  • SHA1

    4e55b73ccc67a5fdcd8ab2fdd90706c0ba2076df

  • SHA256

    3ae5855e9e89f220f9676331aff9ed7e6d51688de4bdba937d496e74e640f793

  • SHA512

    cfe7a9a7b181bb4d582e3d3660b29a4012fa6fc9cd883d91a2f5a4e6c7fa4e43f3dde35f74137910fd5df9820d98f272d66eaac47eb4b36b2a2ba095666e801c

  • SSDEEP

    12288:FB0HuAsZZZakNUyhS/+a5mI3SAuvi0cZfZ7oguOUDg1xU8FtZYgaj2RWlAKoc4U:FB0EjTUyhS/ZCm0c9Z7tZ8j2RWlAs4U

Score
10/10

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 8 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ff79008a2bf7f260f048e97d9bad9e96_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ff79008a2bf7f260f048e97d9bad9e96_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2352
    • C:\Users\Admin\AppData\Local\Temp\ff79008a2bf7f260f048e97d9bad9e96_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\ff79008a2bf7f260f048e97d9bad9e96_JaffaCakes118.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:3056

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\ff79008a2bf7f260f048e97d9bad9e96_JaffaCakes118.exe

    Filesize

    784KB

    MD5

    316a625abff26391ca54e10725a91bff

    SHA1

    e197684bf35e4c7d0b4000c4c0995f79c84118aa

    SHA256

    c78f8ffdc55d7749b3b30e828508277ef10dad630f64c6848cd6397ac311319b

    SHA512

    72d36387e262139cfa5c51362498fe1b86fb2abbc5d90c501056b525fc8b451d4d674f3f6baf4f44b0582e223e47d943e766d4b6afd5e8d91c58364df1fd1568

  • memory/2352-0-0x0000000000400000-0x0000000000712000-memory.dmp

    Filesize

    3.1MB

  • memory/2352-2-0x0000000001720000-0x00000000017E4000-memory.dmp

    Filesize

    784KB

  • memory/2352-1-0x0000000000400000-0x0000000000593000-memory.dmp

    Filesize

    1.6MB

  • memory/2352-16-0x00000000031C0000-0x00000000034D2000-memory.dmp

    Filesize

    3.1MB

  • memory/2352-15-0x0000000000400000-0x0000000000593000-memory.dmp

    Filesize

    1.6MB

  • memory/3056-17-0x0000000000400000-0x0000000000712000-memory.dmp

    Filesize

    3.1MB

  • memory/3056-20-0x0000000001720000-0x00000000017E4000-memory.dmp

    Filesize

    784KB

  • memory/3056-18-0x0000000000400000-0x0000000000593000-memory.dmp

    Filesize

    1.6MB

  • memory/3056-24-0x0000000000400000-0x0000000000587000-memory.dmp

    Filesize

    1.5MB

  • memory/3056-25-0x0000000003050000-0x00000000031E3000-memory.dmp

    Filesize

    1.6MB

  • memory/3056-34-0x00000000005A0000-0x000000000071F000-memory.dmp

    Filesize

    1.5MB

  • memory/3056-35-0x0000000000400000-0x0000000000587000-memory.dmp

    Filesize

    1.5MB