Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2024, 09:01
Behavioral task
behavioral1
Sample
27fcd708df91cec4045e1e335a1138c1_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
27fcd708df91cec4045e1e335a1138c1_JaffaCakes118.exe
-
Size
784KB
-
MD5
27fcd708df91cec4045e1e335a1138c1
-
SHA1
1e379a496490d33a0b39d61e1b166045869d9f63
-
SHA256
0dbe8b83c8b87fec6ca792f1a7a1d9342e4c919d812d3cfdb6357271c8216a65
-
SHA512
b6bf76efd0ca4425f1ee931a85114c0f543fcd4cf1fcfcd979aa119e0e3cd3cc3e48a5ef49e96ddc60f47c4884eebacb2364b6a410ce165c49514adf39d389a2
-
SSDEEP
24576:IXbVSVRQ+4f+Eqb8Ie6vnH8f6bLPfYVai/xCfPc8rV:0ZSM+nde6v55ict
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/536-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/536-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3604-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3604-20-0x0000000005430000-0x00000000055C3000-memory.dmp xmrig behavioral2/memory/3604-21-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/3604-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 3604 27fcd708df91cec4045e1e335a1138c1_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3604 27fcd708df91cec4045e1e335a1138c1_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/536-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x0007000000023445-11.dat upx behavioral2/memory/3604-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 536 27fcd708df91cec4045e1e335a1138c1_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 536 27fcd708df91cec4045e1e335a1138c1_JaffaCakes118.exe 3604 27fcd708df91cec4045e1e335a1138c1_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 536 wrote to memory of 3604 536 27fcd708df91cec4045e1e335a1138c1_JaffaCakes118.exe 84 PID 536 wrote to memory of 3604 536 27fcd708df91cec4045e1e335a1138c1_JaffaCakes118.exe 84 PID 536 wrote to memory of 3604 536 27fcd708df91cec4045e1e335a1138c1_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\27fcd708df91cec4045e1e335a1138c1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\27fcd708df91cec4045e1e335a1138c1_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Local\Temp\27fcd708df91cec4045e1e335a1138c1_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\27fcd708df91cec4045e1e335a1138c1_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3604
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5a672f22254da598dc15a9ef361ca8e8f
SHA1504a3dd82e08e92f1fd8a9e0c4b148f7c6ccbe8c
SHA2568aa0579f67e327aa0f8ee0ab8a8091602025c666dc4286beafecf584e4f52f14
SHA5126085d65e4548eb6dc631c7b5db31ce6bf6b3ec014287efcb14621645554d0efbd48e0fb5e5df92edbf380198478f0e4b98781d2fb244df747816020690ed7d98