Analysis
-
max time kernel
94s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2024 10:54
Behavioral task
behavioral1
Sample
30165a13b576e340d233d110bab1016a_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
30165a13b576e340d233d110bab1016a_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
30165a13b576e340d233d110bab1016a
-
SHA1
f9c300f24e53c00ea24b7924802831632895938b
-
SHA256
6b65ac20205bfe6fea21ead6a933c08060906c3de7ecfadd2ba26bcf49a2a4af
-
SHA512
f0d91fc8db0f8b3dcb355dd0c45288c5ff80fc061b26cc817ae8730be025c484a52537a5a84094df965e1052bff38df91496f579be483f9ec9d0a35d429471fc
-
SSDEEP
49152:QQhODYN2bSRc0miWJnPNpDRFpR3+UDMO/:QQS+g5RDDRl3bDMC
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/4396-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4396-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3880-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3880-20-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/3880-29-0x00000000053B0000-0x0000000005543000-memory.dmp xmrig behavioral2/memory/3880-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 3880 30165a13b576e340d233d110bab1016a_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3880 30165a13b576e340d233d110bab1016a_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/4396-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x000600000002324e-11.dat upx behavioral2/memory/3880-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4396 30165a13b576e340d233d110bab1016a_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4396 30165a13b576e340d233d110bab1016a_JaffaCakes118.exe 3880 30165a13b576e340d233d110bab1016a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4396 wrote to memory of 3880 4396 30165a13b576e340d233d110bab1016a_JaffaCakes118.exe 84 PID 4396 wrote to memory of 3880 4396 30165a13b576e340d233d110bab1016a_JaffaCakes118.exe 84 PID 4396 wrote to memory of 3880 4396 30165a13b576e340d233d110bab1016a_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\30165a13b576e340d233d110bab1016a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\30165a13b576e340d233d110bab1016a_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\30165a13b576e340d233d110bab1016a_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30165a13b576e340d233d110bab1016a_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3880
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5a50392781d83e682df3b7a53cb034523
SHA13b646d459f05715ebba5e0d18d5d2eabc820ae52
SHA2565309fd52d4de8a61afc9f8e6fa88fdd4c2291de78030d7ad943d6bb91ec759b8
SHA51207672b1608d360b9f2b2de444e71fb0ddfd5f9aa9028378c9304cb22afeada85872e3b430a95006c3f073f9e21dc12a54ebeaab50522a2446162eb1691df5152