Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
25-06-2024 19:34
Behavioral task
behavioral1
Sample
0f4439e9ede283bb427f5af43057095d_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
0f4439e9ede283bb427f5af43057095d_JaffaCakes118.exe
-
Size
784KB
-
MD5
0f4439e9ede283bb427f5af43057095d
-
SHA1
58eebe1c398ddc49633e4272ee3a74fb59690b0d
-
SHA256
d1a353512a80577b9debbf2353947ef67a493b14c2ed817e785317b49cf408fa
-
SHA512
737f0329fa215e23e8745dbf98eb6e6320206d497b739ec407cdc7bc8edfeaa34b29bb2d83abcdf4ccdd29efa8b5008a10c264641680e0cc94b29be52bea546e
-
SSDEEP
12288:X0vowj/niVhZkkxgZS0ePsvwj+HHvO0Ms30znlRIJZLDI9zaEI:X0voW/yhZkegZS0UgwwHvOXQ0Pm6
Malware Config
Signatures
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral2/memory/4028-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4028-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3296-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3296-20-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/3296-29-0x0000000005310000-0x00000000054A3000-memory.dmp xmrig behavioral2/memory/3296-30-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig behavioral2/memory/3296-31-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 3296 0f4439e9ede283bb427f5af43057095d_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3296 0f4439e9ede283bb427f5af43057095d_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/4028-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x0009000000023454-11.dat upx behavioral2/memory/3296-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4028 0f4439e9ede283bb427f5af43057095d_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4028 0f4439e9ede283bb427f5af43057095d_JaffaCakes118.exe 3296 0f4439e9ede283bb427f5af43057095d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4028 wrote to memory of 3296 4028 0f4439e9ede283bb427f5af43057095d_JaffaCakes118.exe 85 PID 4028 wrote to memory of 3296 4028 0f4439e9ede283bb427f5af43057095d_JaffaCakes118.exe 85 PID 4028 wrote to memory of 3296 4028 0f4439e9ede283bb427f5af43057095d_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f4439e9ede283bb427f5af43057095d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0f4439e9ede283bb427f5af43057095d_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\0f4439e9ede283bb427f5af43057095d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\0f4439e9ede283bb427f5af43057095d_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3296
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD596ebc2e266da04b30e0fcb2f046c0d2e
SHA1fcdcf755df482581e12b9b12109f4d708d2a329c
SHA256ea1fb9a7c675a031a8ba72499c6ccdcd47b2af22fa4762e05aa49362f50436cb
SHA512982e363b9e328d0360baaa627844554dedb1e3f217e6e3c0c557739a52878d8162b9b17f374bb02ac87ae8cc58fab78978a4c935f7d95198e456ec9908cd10ac