Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 20:22
Behavioral task
behavioral1
Sample
0aabe861e52b213c8edf51c6955025b3_JaffaCakes118.exe
Resource
win7-20240611-en
General
-
Target
0aabe861e52b213c8edf51c6955025b3_JaffaCakes118.exe
-
Size
784KB
-
MD5
0aabe861e52b213c8edf51c6955025b3
-
SHA1
8b7b2a437e16cf0401a0984e2b9167e6c992d3eb
-
SHA256
61fecbddb046e566d5b0536be8a53bf35dc737330a1475093de8838e03144d08
-
SHA512
7ff6270858937df3c0d406d29137e9bb28f9aefa8325c611ad489734b2ca2bac2c463d4c17015d7b6917c39783979e20399d6d240c350a920b8aa3c5a9f0a00b
-
SSDEEP
12288:8/T6ZZlSX9d7PtbVAuOL56yJ4v9p6QCmextUc99OqcBsBzHclU4/0MuAiBbw:8/Wl6TVV0Lf436LJ199SBsCUq1Ib
Malware Config
Signatures
-
XMRig Miner payload 9 IoCs
resource yara_rule behavioral1/memory/1028-3-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/1028-15-0x0000000003230000-0x0000000003542000-memory.dmp xmrig behavioral1/memory/1028-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2196-24-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2196-33-0x0000000002FD0000-0x0000000003163000-memory.dmp xmrig behavioral1/memory/2196-19-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2196-34-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig behavioral1/memory/2196-35-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/1028-36-0x0000000003230000-0x0000000003542000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2196 0aabe861e52b213c8edf51c6955025b3_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2196 0aabe861e52b213c8edf51c6955025b3_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 1028 0aabe861e52b213c8edf51c6955025b3_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1028-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x000e000000013337-10.dat upx behavioral1/memory/2196-17-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1028 0aabe861e52b213c8edf51c6955025b3_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1028 0aabe861e52b213c8edf51c6955025b3_JaffaCakes118.exe 2196 0aabe861e52b213c8edf51c6955025b3_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1028 wrote to memory of 2196 1028 0aabe861e52b213c8edf51c6955025b3_JaffaCakes118.exe 29 PID 1028 wrote to memory of 2196 1028 0aabe861e52b213c8edf51c6955025b3_JaffaCakes118.exe 29 PID 1028 wrote to memory of 2196 1028 0aabe861e52b213c8edf51c6955025b3_JaffaCakes118.exe 29 PID 1028 wrote to memory of 2196 1028 0aabe861e52b213c8edf51c6955025b3_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0aabe861e52b213c8edf51c6955025b3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0aabe861e52b213c8edf51c6955025b3_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\0aabe861e52b213c8edf51c6955025b3_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\0aabe861e52b213c8edf51c6955025b3_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2196
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5ef55189bcc6ddfa0bc6427cc07178d5e
SHA18c371a1a6442513c493fe0dfee23010e959c7f4c
SHA256c9afc014cb73e15d0c4efd6742457b92664cd061ae6b21800e160daba8b0f247
SHA512594ec9b1af8a359b82f6539884563befc90334e85298963c8baefae2cbbb1f3e6c7c24e9d43fcef63da98888764cc4693e91edc9ad4fceebca5c111c0f72fbfe