Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03-07-2024 18:22
Behavioral task
behavioral1
Sample
23526a69b0617dd4d8d778ebd112cd3e_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
23526a69b0617dd4d8d778ebd112cd3e_JaffaCakes118.exe
-
Size
784KB
-
MD5
23526a69b0617dd4d8d778ebd112cd3e
-
SHA1
f4f47add507f48983d05d33f3638d85470f82321
-
SHA256
b5b7b98fdf9d61937f72ca0bc0be40a96a1bfad125498f6dc870c216c50834d9
-
SHA512
76ac5fbe6358f3fbda323b1e9d22c8535c62d2fbff8ab56f86358c3cc9478eebeb407555672df7f25027f1a7de994019078e5daf67899dce4479e60c75bf4216
-
SSDEEP
12288:J/WtA8XTFcti1DxFU26gzOyUD3/TwIb+ureCfUwwKxSzbwPoqh1lfOwk6DxN5Dl:FWu6itiZxWgyx/pRrhfmK6bw5ddfD
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral1/memory/2188-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2188-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2952-34-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2952-24-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2952-22-0x0000000003200000-0x0000000003393000-memory.dmp xmrig behavioral1/memory/2952-16-0x0000000000400000-0x0000000000593000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2952 23526a69b0617dd4d8d778ebd112cd3e_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2952 23526a69b0617dd4d8d778ebd112cd3e_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2188 23526a69b0617dd4d8d778ebd112cd3e_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2188-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x000c00000001340b-15.dat upx behavioral1/memory/2952-21-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2188 23526a69b0617dd4d8d778ebd112cd3e_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2188 23526a69b0617dd4d8d778ebd112cd3e_JaffaCakes118.exe 2952 23526a69b0617dd4d8d778ebd112cd3e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2952 2188 23526a69b0617dd4d8d778ebd112cd3e_JaffaCakes118.exe 29 PID 2188 wrote to memory of 2952 2188 23526a69b0617dd4d8d778ebd112cd3e_JaffaCakes118.exe 29 PID 2188 wrote to memory of 2952 2188 23526a69b0617dd4d8d778ebd112cd3e_JaffaCakes118.exe 29 PID 2188 wrote to memory of 2952 2188 23526a69b0617dd4d8d778ebd112cd3e_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\23526a69b0617dd4d8d778ebd112cd3e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\23526a69b0617dd4d8d778ebd112cd3e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\23526a69b0617dd4d8d778ebd112cd3e_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\23526a69b0617dd4d8d778ebd112cd3e_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2952
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5e9849ff85f382454dd709ce0c9fd0124
SHA106c7b658590cfbefcd597ed262754e943197a1c5
SHA2566d755bd20ad1be3c2ba6cae2bfca9bdac3d0aeb987c4c6b19c507a9e7a95c0be
SHA5124be5eaea5fb9520acb2d40559896e8348e05945141fdfd7e398d2a7e4061f63b2d4a6911c02007d505ecab0c039e22bc8e6878c6998d6f1e94f2548165bdc2df