Analysis
-
max time kernel
96s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08-07-2024 08:16
Behavioral task
behavioral1
Sample
2b9cb7331fd9394330ca761a5bc23b68_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
2b9cb7331fd9394330ca761a5bc23b68_JaffaCakes118.exe
-
Size
784KB
-
MD5
2b9cb7331fd9394330ca761a5bc23b68
-
SHA1
00fb63983a07038a9a37cc968e33c2cbc884f672
-
SHA256
8e406199255b5948bc35553996f782bb4b216d7d014031a7f873403e9d51e2b0
-
SHA512
5e39cab2fde65fc38189ef002aea349ed1255cf5f28d175271ccec32ae209e6f5ebd6d279721d5ddc8ec93caf6baa5e8c365c290e5e9e45a249c6d6e96c1a958
-
SSDEEP
24576:dygF637fyeqGUxN+05w5MMFPX1QtGC+rPlkskeE3ypYo:a7qUUtOq9yWo
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/2592-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2592-13-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4944-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4944-21-0x0000000005400000-0x0000000005593000-memory.dmp xmrig behavioral2/memory/4944-22-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/4944-31-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 4944 2b9cb7331fd9394330ca761a5bc23b68_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4944 2b9cb7331fd9394330ca761a5bc23b68_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/2592-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x0007000000023248-12.dat upx behavioral2/memory/4944-14-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2592 2b9cb7331fd9394330ca761a5bc23b68_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2592 2b9cb7331fd9394330ca761a5bc23b68_JaffaCakes118.exe 4944 2b9cb7331fd9394330ca761a5bc23b68_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2592 wrote to memory of 4944 2592 2b9cb7331fd9394330ca761a5bc23b68_JaffaCakes118.exe 84 PID 2592 wrote to memory of 4944 2592 2b9cb7331fd9394330ca761a5bc23b68_JaffaCakes118.exe 84 PID 2592 wrote to memory of 4944 2592 2b9cb7331fd9394330ca761a5bc23b68_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b9cb7331fd9394330ca761a5bc23b68_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2b9cb7331fd9394330ca761a5bc23b68_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\2b9cb7331fd9394330ca761a5bc23b68_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\2b9cb7331fd9394330ca761a5bc23b68_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4944
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD538d09d5cb5cd5d53d35e33d998506b4f
SHA1646ca0da982aa7b2fa4fceb0cb0df213fea40bf6
SHA25673d7a2fd5778d65c8297b9cc9d7eb6aab688b8f2cfbee22ddc1d2ea7f714e4f6
SHA512ac1937ccb6256f9a7438403e488dac6bbb53857deb6e9b1ac2acc2735ad25c9cccfa79df2d86163f4c341769ba7f0e059977df08aaf9400d56493e1355e21128