Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 09:22
Behavioral task
behavioral1
Sample
07ad1ce524cc989c6c45fe398361ff07_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
07ad1ce524cc989c6c45fe398361ff07_JaffaCakes118.exe
-
Size
784KB
-
MD5
07ad1ce524cc989c6c45fe398361ff07
-
SHA1
455903413775b0af009a02f4cf3136f1681b16ba
-
SHA256
ae2a89c65b2c59beb5fba98448283780bbb60eaf3f9bd4ef47ad4597a9c027bc
-
SHA512
0043d1805e60b65e7cef1ca6a1ff0a6701d8e4eee4ed73436dc65e036b39cbcea4355fd6762698417b0252b58439f5022705dcec26ded0f3811a8f19871097d7
-
SSDEEP
12288:0J9rZkF31bQzP+nbIQighQgcjCWvSUXegAAdCQxCjxFwKzK7SC/LeoZUzJ/9oQ:SZkLGP+n1ix/hK2ecwQxCr+nLLZMKQ
Malware Config
Signatures
-
XMRig Miner payload 8 IoCs
resource yara_rule behavioral1/memory/2244-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2244-14-0x00000000031B0000-0x00000000034C2000-memory.dmp xmrig behavioral1/memory/2244-16-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2696-18-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2696-24-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2696-33-0x0000000003030000-0x00000000031C3000-memory.dmp xmrig behavioral1/memory/2696-34-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig behavioral1/memory/2696-35-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2696 07ad1ce524cc989c6c45fe398361ff07_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2696 07ad1ce524cc989c6c45fe398361ff07_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2244 07ad1ce524cc989c6c45fe398361ff07_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2244-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x000a000000012286-10.dat upx behavioral1/memory/2696-17-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2244 07ad1ce524cc989c6c45fe398361ff07_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2244 07ad1ce524cc989c6c45fe398361ff07_JaffaCakes118.exe 2696 07ad1ce524cc989c6c45fe398361ff07_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2696 2244 07ad1ce524cc989c6c45fe398361ff07_JaffaCakes118.exe 29 PID 2244 wrote to memory of 2696 2244 07ad1ce524cc989c6c45fe398361ff07_JaffaCakes118.exe 29 PID 2244 wrote to memory of 2696 2244 07ad1ce524cc989c6c45fe398361ff07_JaffaCakes118.exe 29 PID 2244 wrote to memory of 2696 2244 07ad1ce524cc989c6c45fe398361ff07_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\07ad1ce524cc989c6c45fe398361ff07_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\07ad1ce524cc989c6c45fe398361ff07_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\07ad1ce524cc989c6c45fe398361ff07_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\07ad1ce524cc989c6c45fe398361ff07_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2696
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD56b7ea5689986cec55c403d9a4c9ccbd9
SHA1bb65f7bc5757d86775e66e8ac7ba99c798411576
SHA25634adb95637b2a87453a1a108592ca5c002d26253995f61cef6f3da380b27c5f2
SHA51247cc07475c2a4e78678e3e1e3311616ea9ec5c39ad285670175d3393a9a9017f2d69d8020e9aa4663107b9e2bc65b9e10ff5c2ba6c0822fddc1f217e8bb2dcd0