Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 18:25
Behavioral task
behavioral1
Sample
170b2496a400430d882e4dbfc84bcdd2_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
170b2496a400430d882e4dbfc84bcdd2_JaffaCakes118.exe
-
Size
784KB
-
MD5
170b2496a400430d882e4dbfc84bcdd2
-
SHA1
e45be9b2fa0e681378e6f7ccd39fbedaa0cd6c43
-
SHA256
d633dacd30f721012edb5637d2f38b74ebca0ddbe288361395c400082af11e86
-
SHA512
abcdae6f67c482a0ae306e04dac284aa74e9dd8fd70d4041b081e54b6bee2eda7a7d93b3c4d24c5798867556486dc81453c399f043ab570822fc4e1feff7745d
-
SSDEEP
12288:2x+m/qKpORvM9JKt10YcmHqyTkNyqia1YMDyrEnhDHa/FkpC6S7:s+QqWORvM9JKt+YTKNGMDyC5a/GW7
Malware Config
Signatures
-
XMRig Miner payload 9 IoCs
resource yara_rule behavioral1/memory/2068-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2068-16-0x0000000003230000-0x0000000003542000-memory.dmp xmrig behavioral1/memory/2068-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2552-19-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2552-34-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig behavioral1/memory/2552-35-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2552-33-0x0000000003040000-0x00000000031D3000-memory.dmp xmrig behavioral1/memory/2552-24-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2068-36-0x0000000003230000-0x0000000003542000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2552 170b2496a400430d882e4dbfc84bcdd2_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2552 170b2496a400430d882e4dbfc84bcdd2_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2068 170b2496a400430d882e4dbfc84bcdd2_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2068-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x000d00000001228a-10.dat upx behavioral1/memory/2552-17-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2068 170b2496a400430d882e4dbfc84bcdd2_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2068 170b2496a400430d882e4dbfc84bcdd2_JaffaCakes118.exe 2552 170b2496a400430d882e4dbfc84bcdd2_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2552 2068 170b2496a400430d882e4dbfc84bcdd2_JaffaCakes118.exe 29 PID 2068 wrote to memory of 2552 2068 170b2496a400430d882e4dbfc84bcdd2_JaffaCakes118.exe 29 PID 2068 wrote to memory of 2552 2068 170b2496a400430d882e4dbfc84bcdd2_JaffaCakes118.exe 29 PID 2068 wrote to memory of 2552 2068 170b2496a400430d882e4dbfc84bcdd2_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\170b2496a400430d882e4dbfc84bcdd2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\170b2496a400430d882e4dbfc84bcdd2_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\170b2496a400430d882e4dbfc84bcdd2_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\170b2496a400430d882e4dbfc84bcdd2_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2552
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD50c224bd1c27c503543099d57788074e7
SHA1c2aa4e33e66129f63198d06f486b6c1b9684f7bf
SHA2564b7a9f27d88d5ee040c80fe591f1f515068dfa0c012e3c953b2bba0bd95cd21e
SHA51254a845a23d34ea05babc66aa0591c294a8d780782e3d9a2c45ac1a14d00f1c019058fd2f193195ac943bf05ae389ccf9a23cdf120be23157007e267d685e70cb