Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
25-06-2024 21:18
Behavioral task
behavioral1
Sample
0f8f8fbb6f7d84a4b2cf8c0b73c5b088_JaffaCakes118.exe
Resource
win7-20240611-en
General
-
Target
0f8f8fbb6f7d84a4b2cf8c0b73c5b088_JaffaCakes118.exe
-
Size
784KB
-
MD5
0f8f8fbb6f7d84a4b2cf8c0b73c5b088
-
SHA1
784d8ffc786250ee1009f15f240c2ca7469df36d
-
SHA256
99203d478405cdc1e5fea5a9983badd57450bd77fd6ab2c379224beb708cafbe
-
SHA512
509517dd68e2d2778f4ad553122754c1c6cd26b9f7a6a4476dbded8c4c55da3cba56f728e2f6b583bc0a30b44b1e09150e02c6c07c4fb855672bef2f3817b7a2
-
SSDEEP
12288:CnPHtnN4QR+FTJ440cj7JpEjlDhvTiR9Qktmm7ooMmuPMGXp4i3lwGEqNx/:OPtnN4QR86PovEjlDxT2GWZmjZoGLT
Malware Config
Signatures
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral1/memory/2376-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2376-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2320-17-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2320-23-0x00000000031F0000-0x0000000003383000-memory.dmp xmrig behavioral1/memory/2320-24-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2320-33-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2376-34-0x0000000003240000-0x0000000003552000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2320 0f8f8fbb6f7d84a4b2cf8c0b73c5b088_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2320 0f8f8fbb6f7d84a4b2cf8c0b73c5b088_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2376 0f8f8fbb6f7d84a4b2cf8c0b73c5b088_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2376-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x000d000000012260-10.dat upx behavioral1/memory/2320-16-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2376 0f8f8fbb6f7d84a4b2cf8c0b73c5b088_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2376 0f8f8fbb6f7d84a4b2cf8c0b73c5b088_JaffaCakes118.exe 2320 0f8f8fbb6f7d84a4b2cf8c0b73c5b088_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2320 2376 0f8f8fbb6f7d84a4b2cf8c0b73c5b088_JaffaCakes118.exe 29 PID 2376 wrote to memory of 2320 2376 0f8f8fbb6f7d84a4b2cf8c0b73c5b088_JaffaCakes118.exe 29 PID 2376 wrote to memory of 2320 2376 0f8f8fbb6f7d84a4b2cf8c0b73c5b088_JaffaCakes118.exe 29 PID 2376 wrote to memory of 2320 2376 0f8f8fbb6f7d84a4b2cf8c0b73c5b088_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f8f8fbb6f7d84a4b2cf8c0b73c5b088_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0f8f8fbb6f7d84a4b2cf8c0b73c5b088_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\0f8f8fbb6f7d84a4b2cf8c0b73c5b088_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\0f8f8fbb6f7d84a4b2cf8c0b73c5b088_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2320
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5ef8e75a3ce71c8c287ee08db8e5de683
SHA1649364e9a4e26660c5330a7138854ac5ed69da8d
SHA2566fda2adae2f62fd5167ec06c559a9d266ef6b9a89d780b8b3ff1eff5e609220b
SHA51226245f4a49bc1db2409482bed78eec358b096c95dd1bf6b033d92a5c4a98dfabba328cc07e8198dd1ebcc740e4043057daa07f655d1568ebd16dac9e83325021