Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
04/07/2024, 03:21
Behavioral task
behavioral1
Sample
24749496f7dd7673d3c0d7286937b127_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
24749496f7dd7673d3c0d7286937b127_JaffaCakes118.exe
-
Size
784KB
-
MD5
24749496f7dd7673d3c0d7286937b127
-
SHA1
7f1395a847bc24ad86f728337ac6ab2d4f364aa0
-
SHA256
425e0fae56fec16ad38bd59baccdb846b0e1fa97ed4cf91a3e70d761a253fdff
-
SHA512
0fd523b98a6ffc438da519bf08fb1057fbb88fea37ac8670b0f41756aaa83a3e04ac489c5eaffa760a90eb4d3c6b0b7c1a837f3087fd442e9f97027efeea1d54
-
SSDEEP
12288:4w9roMj2kwtMus9MjRC+h/6DpfWVqjs/ev2QDFk8V0dG6hwfXlAdGl2nuF56sPo7:4MjSJ9CcwvwTQDaZdG6gknuFlPo5ATq
Malware Config
Signatures
-
XMRig Miner payload 8 IoCs
resource yara_rule behavioral1/memory/3068-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/3068-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/1720-18-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/1720-32-0x00000000030C0000-0x0000000003253000-memory.dmp xmrig behavioral1/memory/1720-22-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/1720-33-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig behavioral1/memory/1720-34-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/3068-35-0x00000000031A0000-0x00000000034B2000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 1720 24749496f7dd7673d3c0d7286937b127_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1720 24749496f7dd7673d3c0d7286937b127_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 3068 24749496f7dd7673d3c0d7286937b127_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/3068-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x000c000000013f2c-10.dat upx behavioral1/memory/1720-16-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3068 24749496f7dd7673d3c0d7286937b127_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3068 24749496f7dd7673d3c0d7286937b127_JaffaCakes118.exe 1720 24749496f7dd7673d3c0d7286937b127_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3068 wrote to memory of 1720 3068 24749496f7dd7673d3c0d7286937b127_JaffaCakes118.exe 29 PID 3068 wrote to memory of 1720 3068 24749496f7dd7673d3c0d7286937b127_JaffaCakes118.exe 29 PID 3068 wrote to memory of 1720 3068 24749496f7dd7673d3c0d7286937b127_JaffaCakes118.exe 29 PID 3068 wrote to memory of 1720 3068 24749496f7dd7673d3c0d7286937b127_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\24749496f7dd7673d3c0d7286937b127_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\24749496f7dd7673d3c0d7286937b127_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\24749496f7dd7673d3c0d7286937b127_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\24749496f7dd7673d3c0d7286937b127_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1720
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD53d8e38cbb4aa0b08f187f62c57b6b6c5
SHA1186a8a9fa8af032045cd0395c839a231e8950ab8
SHA2564eb1ac9038e65e5535f1d5a63eef125c1f9a1f347bdf5dfc42fd26680442dd15
SHA512c59d36a7a7633cc5519a4a8dc9d5f3fcfc2f736ab252c6f6d35272807d0abb8680f8754dbb0131c9ec347793e9e1eb4fb2d8339bbada67a628b3a075601dd6bf