Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09-07-2024 14:40
Behavioral task
behavioral1
Sample
30c971ff073c90821797326db52f1733_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
30c971ff073c90821797326db52f1733_JaffaCakes118.exe
-
Size
784KB
-
MD5
30c971ff073c90821797326db52f1733
-
SHA1
f467fb0832dd5b07698b9032335fa654f547b573
-
SHA256
bc87dfe9a7df13fb9d78feef63a6d11b327dd57d3956426b96e4a89b00bfdbd5
-
SHA512
ef69b3118f75381d98b340924b6d73a92674ea8f270a5b8c923d022b302208580056daa8b5657c179462673a75fc2322e10b71cc9738c287964983a0915a930d
-
SSDEEP
12288:/stZGqSAhJaC19TxW2rtBUdSjlGdeDEjYaozwKf7KkYqoEGgTpbxaIenL/R0RzlJ:0n1AETWSpGdtj6zJ6qBGQb4IkR0RxJ
Malware Config
Signatures
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral1/memory/2340-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2340-15-0x00000000030E0000-0x00000000033F2000-memory.dmp xmrig behavioral1/memory/2340-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/1856-18-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/1856-24-0x0000000003150000-0x00000000032E3000-memory.dmp xmrig behavioral1/memory/1856-25-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/1856-34-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 1856 30c971ff073c90821797326db52f1733_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1856 30c971ff073c90821797326db52f1733_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2340 30c971ff073c90821797326db52f1733_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2340-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x000b000000012281-10.dat upx behavioral1/memory/1856-17-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2340 30c971ff073c90821797326db52f1733_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2340 30c971ff073c90821797326db52f1733_JaffaCakes118.exe 1856 30c971ff073c90821797326db52f1733_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2340 wrote to memory of 1856 2340 30c971ff073c90821797326db52f1733_JaffaCakes118.exe 32 PID 2340 wrote to memory of 1856 2340 30c971ff073c90821797326db52f1733_JaffaCakes118.exe 32 PID 2340 wrote to memory of 1856 2340 30c971ff073c90821797326db52f1733_JaffaCakes118.exe 32 PID 2340 wrote to memory of 1856 2340 30c971ff073c90821797326db52f1733_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\30c971ff073c90821797326db52f1733_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\30c971ff073c90821797326db52f1733_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\30c971ff073c90821797326db52f1733_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30c971ff073c90821797326db52f1733_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1856
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD59c932c53ca41a40e25eb067eb1346e2a
SHA1883bdb4562d910e2cbc0b58c5e9a3f403e4732c6
SHA2563bb9ad5a00e4855038b1980195cfcd17fb9e7ff6a00e9c3e5bdeb0f978d7250a
SHA51209fa08739ebb56a6bb487833e40196850e12e2a2cc1f70d8ede1fb2a40a08171ae5c1fd1b490afe95b7568e173624966972e03996ba4d27742aa64e7c4f3ae7d