Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
06/07/2024, 09:01
Behavioral task
behavioral1
Sample
27fcd708df91cec4045e1e335a1138c1_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
27fcd708df91cec4045e1e335a1138c1_JaffaCakes118.exe
-
Size
784KB
-
MD5
27fcd708df91cec4045e1e335a1138c1
-
SHA1
1e379a496490d33a0b39d61e1b166045869d9f63
-
SHA256
0dbe8b83c8b87fec6ca792f1a7a1d9342e4c919d812d3cfdb6357271c8216a65
-
SHA512
b6bf76efd0ca4425f1ee931a85114c0f543fcd4cf1fcfcd979aa119e0e3cd3cc3e48a5ef49e96ddc60f47c4884eebacb2364b6a410ce165c49514adf39d389a2
-
SSDEEP
24576:IXbVSVRQ+4f+Eqb8Ie6vnH8f6bLPfYVai/xCfPc8rV:0ZSM+nde6v55ict
Malware Config
Signatures
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral1/memory/1688-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/1688-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2316-17-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2316-23-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2316-32-0x0000000003220000-0x00000000033B3000-memory.dmp xmrig behavioral1/memory/2316-33-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/1688-34-0x0000000003110000-0x0000000003422000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2316 27fcd708df91cec4045e1e335a1138c1_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2316 27fcd708df91cec4045e1e335a1138c1_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 1688 27fcd708df91cec4045e1e335a1138c1_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1688-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x00080000000120f8-10.dat upx behavioral1/memory/2316-16-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1688 27fcd708df91cec4045e1e335a1138c1_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1688 27fcd708df91cec4045e1e335a1138c1_JaffaCakes118.exe 2316 27fcd708df91cec4045e1e335a1138c1_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2316 1688 27fcd708df91cec4045e1e335a1138c1_JaffaCakes118.exe 31 PID 1688 wrote to memory of 2316 1688 27fcd708df91cec4045e1e335a1138c1_JaffaCakes118.exe 31 PID 1688 wrote to memory of 2316 1688 27fcd708df91cec4045e1e335a1138c1_JaffaCakes118.exe 31 PID 1688 wrote to memory of 2316 1688 27fcd708df91cec4045e1e335a1138c1_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\27fcd708df91cec4045e1e335a1138c1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\27fcd708df91cec4045e1e335a1138c1_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\27fcd708df91cec4045e1e335a1138c1_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\27fcd708df91cec4045e1e335a1138c1_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2316
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5c70df2c45fa8f6a041b70dfe770a4d04
SHA16678fa83e219dde0dc3ee5d859157b71b0902d5c
SHA25642375e21262daa5e5c480483151ddd4d1e82b8e68c41f4ea077d6270a52cd711
SHA512c010cc12d9ffb4568a91968753f2bb7fa743851598e742716012672a2a02c8d1fbcfa16a220df0f20ef79711c446ad3c427d4f08f5c55bdfe8ef0f15d7735a42