Analysis
-
max time kernel
93s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08-07-2024 01:15
Behavioral task
behavioral1
Sample
2a77b1845e01155e02d13721028f4f99_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
2a77b1845e01155e02d13721028f4f99_JaffaCakes118.exe
-
Size
784KB
-
MD5
2a77b1845e01155e02d13721028f4f99
-
SHA1
98ca23aab1b3bd2fc8c1489f8e9165c238cbf17e
-
SHA256
d685bc737ae59df2f3d0938fb44c5eb59dd37576e194f3a38df915d07e0b7fcc
-
SHA512
a24fcba664060a2161cb2f50f67cddfb3497b06fc0cd07cf0751f6e78733bd5c76cac05d9ef91111e09dd4649122202589fa3d0e432adadd5d27c38bdcad586b
-
SSDEEP
12288:YbYTfrge8kX8J41uSV5hF6P04WkvIByuM7pPFD1/IYT7Rp0Gz9/xnYeiG+:uYTTUkX8JATVB68CIiF5QYTNpTZYH
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/4376-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4376-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4920-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4920-20-0x0000000005410000-0x00000000055A3000-memory.dmp xmrig behavioral2/memory/4920-21-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/4920-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 4920 2a77b1845e01155e02d13721028f4f99_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4920 2a77b1845e01155e02d13721028f4f99_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/4376-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x00070000000232be-11.dat upx behavioral2/memory/4920-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4376 2a77b1845e01155e02d13721028f4f99_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4376 2a77b1845e01155e02d13721028f4f99_JaffaCakes118.exe 4920 2a77b1845e01155e02d13721028f4f99_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4376 wrote to memory of 4920 4376 2a77b1845e01155e02d13721028f4f99_JaffaCakes118.exe 85 PID 4376 wrote to memory of 4920 4376 2a77b1845e01155e02d13721028f4f99_JaffaCakes118.exe 85 PID 4376 wrote to memory of 4920 4376 2a77b1845e01155e02d13721028f4f99_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a77b1845e01155e02d13721028f4f99_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2a77b1845e01155e02d13721028f4f99_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\2a77b1845e01155e02d13721028f4f99_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\2a77b1845e01155e02d13721028f4f99_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4920
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5093f6185568d74687428940197ffdf7c
SHA1e404ccb6c7ea67d7b004d3511287affc52155070
SHA256df35f0c39fe0e74b4f1fcfb9af20a814dc5488abbab6de7cc13e9c91f68c3ce6
SHA5122819d4ccc8bf276938c95990bfcbcf16128d92d5e74b4e7ac45acfeadb908560c73e1209f59457d3d4051f16b8d084ead37ae91e89403840f6263522adfbea70