Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
21/04/2024, 14:19
Behavioral task
behavioral1
Sample
ff79008a2bf7f260f048e97d9bad9e96_JaffaCakes118.exe
Resource
win7-20231129-en
General
-
Target
ff79008a2bf7f260f048e97d9bad9e96_JaffaCakes118.exe
-
Size
784KB
-
MD5
ff79008a2bf7f260f048e97d9bad9e96
-
SHA1
4e55b73ccc67a5fdcd8ab2fdd90706c0ba2076df
-
SHA256
3ae5855e9e89f220f9676331aff9ed7e6d51688de4bdba937d496e74e640f793
-
SHA512
cfe7a9a7b181bb4d582e3d3660b29a4012fa6fc9cd883d91a2f5a4e6c7fa4e43f3dde35f74137910fd5df9820d98f272d66eaac47eb4b36b2a2ba095666e801c
-
SSDEEP
12288:FB0HuAsZZZakNUyhS/+a5mI3SAuvi0cZfZ7oguOUDg1xU8FtZYgaj2RWlAKoc4U:FB0EjTUyhS/ZCm0c9Z7tZ8j2RWlAs4U
Malware Config
Signatures
-
XMRig Miner payload 8 IoCs
resource yara_rule behavioral1/memory/2352-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2352-16-0x00000000031C0000-0x00000000034D2000-memory.dmp xmrig behavioral1/memory/2352-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/3056-18-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/3056-24-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/3056-25-0x0000000003050000-0x00000000031E3000-memory.dmp xmrig behavioral1/memory/3056-34-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig behavioral1/memory/3056-35-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 3056 ff79008a2bf7f260f048e97d9bad9e96_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3056 ff79008a2bf7f260f048e97d9bad9e96_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2352 ff79008a2bf7f260f048e97d9bad9e96_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2352-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x000900000001447e-10.dat upx behavioral1/memory/3056-17-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2352 ff79008a2bf7f260f048e97d9bad9e96_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2352 ff79008a2bf7f260f048e97d9bad9e96_JaffaCakes118.exe 3056 ff79008a2bf7f260f048e97d9bad9e96_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2352 wrote to memory of 3056 2352 ff79008a2bf7f260f048e97d9bad9e96_JaffaCakes118.exe 29 PID 2352 wrote to memory of 3056 2352 ff79008a2bf7f260f048e97d9bad9e96_JaffaCakes118.exe 29 PID 2352 wrote to memory of 3056 2352 ff79008a2bf7f260f048e97d9bad9e96_JaffaCakes118.exe 29 PID 2352 wrote to memory of 3056 2352 ff79008a2bf7f260f048e97d9bad9e96_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff79008a2bf7f260f048e97d9bad9e96_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ff79008a2bf7f260f048e97d9bad9e96_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\ff79008a2bf7f260f048e97d9bad9e96_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\ff79008a2bf7f260f048e97d9bad9e96_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3056
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5316a625abff26391ca54e10725a91bff
SHA1e197684bf35e4c7d0b4000c4c0995f79c84118aa
SHA256c78f8ffdc55d7749b3b30e828508277ef10dad630f64c6848cd6397ac311319b
SHA51272d36387e262139cfa5c51362498fe1b86fb2abbc5d90c501056b525fc8b451d4d674f3f6baf4f44b0582e223e47d943e766d4b6afd5e8d91c58364df1fd1568