Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 23:19
Behavioral task
behavioral1
Sample
36cd594b7dac73c6c0226e48730b0071_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
36cd594b7dac73c6c0226e48730b0071_JaffaCakes118.exe
-
Size
784KB
-
MD5
36cd594b7dac73c6c0226e48730b0071
-
SHA1
abee6bb07230c732028af227d554aac5a9558f65
-
SHA256
85a62c8f67d24489f5c7f5f37830aca5ef7ded4227fa52bf59723ca298ad3d84
-
SHA512
b181003814c3a11e0ffd72a5ea7a885756a1f4185f2e278becce2e2ea0d6e480681877d5d2ec19dd3360578ba91b2b4bc20c5c15490723fbb0a8581651adf10c
-
SSDEEP
12288:tt8NO7XUy+hz1JfVQNOpVGC6M8Nj5Lpw91EHzx2hYGR35iGtpkVONI1xGbjh:QYzU7hzNQkj6zNI91+qNRBLkkj
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral1/memory/1380-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/1380-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2520-18-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2520-33-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2520-32-0x0000000003280000-0x0000000003413000-memory.dmp xmrig behavioral1/memory/2520-23-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2520 36cd594b7dac73c6c0226e48730b0071_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2520 36cd594b7dac73c6c0226e48730b0071_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 1380 36cd594b7dac73c6c0226e48730b0071_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1380-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x000d000000014348-15.dat upx behavioral1/memory/2520-16-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1380 36cd594b7dac73c6c0226e48730b0071_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1380 36cd594b7dac73c6c0226e48730b0071_JaffaCakes118.exe 2520 36cd594b7dac73c6c0226e48730b0071_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1380 wrote to memory of 2520 1380 36cd594b7dac73c6c0226e48730b0071_JaffaCakes118.exe 31 PID 1380 wrote to memory of 2520 1380 36cd594b7dac73c6c0226e48730b0071_JaffaCakes118.exe 31 PID 1380 wrote to memory of 2520 1380 36cd594b7dac73c6c0226e48730b0071_JaffaCakes118.exe 31 PID 1380 wrote to memory of 2520 1380 36cd594b7dac73c6c0226e48730b0071_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\36cd594b7dac73c6c0226e48730b0071_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\36cd594b7dac73c6c0226e48730b0071_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\36cd594b7dac73c6c0226e48730b0071_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\36cd594b7dac73c6c0226e48730b0071_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2520
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5edfc03f46457cd5de1ca601e03ab9fdb
SHA164df41470d6fdd5b2d59834ed83d73fadd4a9558
SHA25644fb2fdda799f8ba6051aeb06a5f04d9fa7b533a2fafd129655216cce2976008
SHA51294911c7a73df7dbafb794c43ad985557c73c177ebf363f730aec6688e85fe118f9a6d44335c3de837b872391bb245e62dc879d79332fe6615b1602ff6e76973e