Analysis
-
max time kernel
51s -
max time network
52s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-06-2024 06:06
Behavioral task
behavioral1
Sample
0cf301e08a46a20874dc09d4e02ef0dc_JaffaCakes118.exe
Resource
win7-20240611-en
General
-
Target
0cf301e08a46a20874dc09d4e02ef0dc_JaffaCakes118.exe
-
Size
784KB
-
MD5
0cf301e08a46a20874dc09d4e02ef0dc
-
SHA1
de8883d5c51ef7437dbb6721e0b82bc55ea86257
-
SHA256
30f55f9f823222f0b119a8249b452e2f22c8f3da96d8e0bd80af31e1eb25d828
-
SHA512
572e286cf49348fd4eaee6c25fc70c1c4ec575c2309792ddcb8859659a5dc59640a3392fc5961b035d882455450cfd6d8ec8a043f705593f2c16df26f6a12f1f
-
SSDEEP
12288:B7AWQCTJVy/ZnLzr8A778nsrzTu7FBNmsNj/G1fR5Hvea5Y6UsSRjAUQ2Bt:6WQuQZnLsAEnsrzTuL3je1fRBh+8M
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/988-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/988-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4524-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4524-20-0x0000000005520000-0x00000000056B3000-memory.dmp xmrig behavioral2/memory/4524-21-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/4524-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 4524 0cf301e08a46a20874dc09d4e02ef0dc_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4524 0cf301e08a46a20874dc09d4e02ef0dc_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/988-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x0008000000022f51-11.dat upx behavioral2/memory/4524-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 988 0cf301e08a46a20874dc09d4e02ef0dc_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 988 0cf301e08a46a20874dc09d4e02ef0dc_JaffaCakes118.exe 4524 0cf301e08a46a20874dc09d4e02ef0dc_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 988 wrote to memory of 4524 988 0cf301e08a46a20874dc09d4e02ef0dc_JaffaCakes118.exe 82 PID 988 wrote to memory of 4524 988 0cf301e08a46a20874dc09d4e02ef0dc_JaffaCakes118.exe 82 PID 988 wrote to memory of 4524 988 0cf301e08a46a20874dc09d4e02ef0dc_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\0cf301e08a46a20874dc09d4e02ef0dc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0cf301e08a46a20874dc09d4e02ef0dc_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Users\Admin\AppData\Local\Temp\0cf301e08a46a20874dc09d4e02ef0dc_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\0cf301e08a46a20874dc09d4e02ef0dc_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4524
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD553a8eaa4cfdcee5ddf09b1bcd04cd46c
SHA1ecf242b2aa347368abb9c56b2933d1f237e78b40
SHA2561ad1def1397a87ab6b2f0a93ed3282402f5ed9a7d452fc0005bf17bdad16a1c9
SHA51226009b312402eabfebbcfa9716a906113c0beba501335993be8e666d4a32f6344b089e2d1278ef8daa8c161b6b5940552604bd5004bb768516e5b327b5876fae