Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240708-en -
resource tags
arch:x64arch:x86image:win10v2004-20240708-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 08:24
Behavioral task
behavioral1
Sample
2fa3973fe7a7d94a5fe1688e5c0cefa9_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
2fa3973fe7a7d94a5fe1688e5c0cefa9_JaffaCakes118.exe
-
Size
784KB
-
MD5
2fa3973fe7a7d94a5fe1688e5c0cefa9
-
SHA1
66ee0a40c1dd42fd6570322fbfe24c0b5c21c39b
-
SHA256
4269b5f3bf385ef5092126129ae190998b69d9d5f6dba9a4574f81be8639f2b9
-
SHA512
4c245a0e08a4915cc615a9e2e42f4b726caf76dbc507b1155392bbc12e2dd8321c1c5f87519cc16caefe443351bbce2fd5b0a9a739e91a5516d5ee48eb48b4ba
-
SSDEEP
12288:hkk0Z5xKTWSHF5eL7geS6NG8cjKzqGrnlc+7VufscoHdg94mZnTnSHEz+S:AFSWY5eLzSAxb1JcivcoA4mZTnC
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/4508-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4508-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2208-16-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2208-29-0x00000000053F0000-0x0000000005583000-memory.dmp xmrig behavioral2/memory/2208-20-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/2208-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2208 2fa3973fe7a7d94a5fe1688e5c0cefa9_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2208 2fa3973fe7a7d94a5fe1688e5c0cefa9_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/4508-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x0008000000023384-11.dat upx behavioral2/memory/2208-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4508 2fa3973fe7a7d94a5fe1688e5c0cefa9_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4508 2fa3973fe7a7d94a5fe1688e5c0cefa9_JaffaCakes118.exe 2208 2fa3973fe7a7d94a5fe1688e5c0cefa9_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4508 wrote to memory of 2208 4508 2fa3973fe7a7d94a5fe1688e5c0cefa9_JaffaCakes118.exe 85 PID 4508 wrote to memory of 2208 4508 2fa3973fe7a7d94a5fe1688e5c0cefa9_JaffaCakes118.exe 85 PID 4508 wrote to memory of 2208 4508 2fa3973fe7a7d94a5fe1688e5c0cefa9_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fa3973fe7a7d94a5fe1688e5c0cefa9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2fa3973fe7a7d94a5fe1688e5c0cefa9_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\2fa3973fe7a7d94a5fe1688e5c0cefa9_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\2fa3973fe7a7d94a5fe1688e5c0cefa9_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2208
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5f9863ca4ef0079e651b26b6f454dade1
SHA13957181c68a0b521ccf934737f006f570ee5b8ed
SHA256c51677130a7db68978956dec4f340dde0b7e83d6fb40695d16611f86467e5a2e
SHA51263f2ad316641bb90d4d184290a5099e9a1c0e7fdade25cad4841d8f570a5a01b0d57a3aa9ad9e7af189e0f0d162ae33e002d97c437eb464d1797fbb0179a72a5