Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08-07-2024 21:22
Behavioral task
behavioral1
Sample
2dd8fc72c704711acab23e10ceb77ae3_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
2dd8fc72c704711acab23e10ceb77ae3_JaffaCakes118.exe
-
Size
784KB
-
MD5
2dd8fc72c704711acab23e10ceb77ae3
-
SHA1
0f6fac36d4e3e378f9a595dcbf6147f6d0d3784c
-
SHA256
793aada1f27118979d7e54446b91ecf5af1d2f86b7c0fb256ffe4bd37965f644
-
SHA512
f21eb3da4b145f194cf3b04b80efcc448fc3d8e1f02c5eeb02202fe1422046fbfda0a6bb98e6e48d4f2e8b24805b5f797750ff7c0695501728d53066dec4df51
-
SSDEEP
24576:JYO6def7wkxS34msf2g6j5cMaBGwoKrIVPFtL:CO6deTv7jfEj5WBoKrKP
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/4064-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4064-13-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2540-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2540-21-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/2540-20-0x0000000005420000-0x00000000055B3000-memory.dmp xmrig behavioral2/memory/2540-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2540 2dd8fc72c704711acab23e10ceb77ae3_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2540 2dd8fc72c704711acab23e10ceb77ae3_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/4064-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x000700000002323a-11.dat upx behavioral2/memory/2540-12-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4064 2dd8fc72c704711acab23e10ceb77ae3_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4064 2dd8fc72c704711acab23e10ceb77ae3_JaffaCakes118.exe 2540 2dd8fc72c704711acab23e10ceb77ae3_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4064 wrote to memory of 2540 4064 2dd8fc72c704711acab23e10ceb77ae3_JaffaCakes118.exe 84 PID 4064 wrote to memory of 2540 4064 2dd8fc72c704711acab23e10ceb77ae3_JaffaCakes118.exe 84 PID 4064 wrote to memory of 2540 4064 2dd8fc72c704711acab23e10ceb77ae3_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2dd8fc72c704711acab23e10ceb77ae3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2dd8fc72c704711acab23e10ceb77ae3_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\2dd8fc72c704711acab23e10ceb77ae3_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\2dd8fc72c704711acab23e10ceb77ae3_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2540
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5ac04a2e7ccf8d50fb5048e4c05529ed5
SHA109f65bad4c2b1d367f1aa71c2bf50e84db1ecc97
SHA256c67e26478bf75ee6e777017f6f69f34f827dc038dc0a6a4f7102e40217be9aed
SHA5123ecc09b4ff669f0b0632f114bb9bd365edb52cca80d28e0a11f431bb8a9b698f95d3901b3876a6bbb13cbbf969c4cda3f31cb22d345a272d9d975492ac81198d