Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 20:22
Behavioral task
behavioral1
Sample
0aabe861e52b213c8edf51c6955025b3_JaffaCakes118.exe
Resource
win7-20240611-en
General
-
Target
0aabe861e52b213c8edf51c6955025b3_JaffaCakes118.exe
-
Size
784KB
-
MD5
0aabe861e52b213c8edf51c6955025b3
-
SHA1
8b7b2a437e16cf0401a0984e2b9167e6c992d3eb
-
SHA256
61fecbddb046e566d5b0536be8a53bf35dc737330a1475093de8838e03144d08
-
SHA512
7ff6270858937df3c0d406d29137e9bb28f9aefa8325c611ad489734b2ca2bac2c463d4c17015d7b6917c39783979e20399d6d240c350a920b8aa3c5a9f0a00b
-
SSDEEP
12288:8/T6ZZlSX9d7PtbVAuOL56yJ4v9p6QCmextUc99OqcBsBzHclU4/0MuAiBbw:8/Wl6TVV0Lf436LJ199SBsCUq1Ib
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/1560-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1560-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2016-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2016-19-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/2016-29-0x00000000053D0000-0x0000000005563000-memory.dmp xmrig behavioral2/memory/2016-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2016 0aabe861e52b213c8edf51c6955025b3_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2016 0aabe861e52b213c8edf51c6955025b3_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/1560-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x00050000000232a4-11.dat upx behavioral2/memory/2016-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1560 0aabe861e52b213c8edf51c6955025b3_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1560 0aabe861e52b213c8edf51c6955025b3_JaffaCakes118.exe 2016 0aabe861e52b213c8edf51c6955025b3_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1560 wrote to memory of 2016 1560 0aabe861e52b213c8edf51c6955025b3_JaffaCakes118.exe 82 PID 1560 wrote to memory of 2016 1560 0aabe861e52b213c8edf51c6955025b3_JaffaCakes118.exe 82 PID 1560 wrote to memory of 2016 1560 0aabe861e52b213c8edf51c6955025b3_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\0aabe861e52b213c8edf51c6955025b3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0aabe861e52b213c8edf51c6955025b3_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\0aabe861e52b213c8edf51c6955025b3_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\0aabe861e52b213c8edf51c6955025b3_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2016
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5ddf94a3e4ceaeb4dd57fe4a0b4eb3f54
SHA1d1cb9bebcc787453d212abcc5d50803a0de6bb62
SHA25617e76a3865ca1085bd9480bd36f433b48f8d62e4ee0bd653c4d7fa5c2fc2e052
SHA5124a15a7b5dfcc6d10bf75bf78475d562b190bf68138f13ac9cbde4736f1cc834ea9d8523d5086dd925de82eda83a8820da36abc8b01ebe7d453505a55e82409db