Analysis
-
max time kernel
93s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 13:08
Behavioral task
behavioral1
Sample
34d8534ffc25505e359c9b0b9a67f913_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
34d8534ffc25505e359c9b0b9a67f913_JaffaCakes118.exe
-
Size
784KB
-
MD5
34d8534ffc25505e359c9b0b9a67f913
-
SHA1
c6352ba0bf0a09467407eb96a5b83971e2aa54cb
-
SHA256
773ad11166f695c5eb2afaa7dbf055a98dc950526e1e8be7c2d31c841ecf4518
-
SHA512
05a6c13d0a53b5272eb764c7e2d21f85f20b75130d9886d3cf54b3a0f31cbb7d2278962add1d23763f5cdd07c25702200c216b11f49d790acfa1925a8d4442e7
-
SSDEEP
24576:sM/aJ1Bh5K+EaWPrC3pqeY9WUT21yI9Szs3jXtYAO3:sM/oksWWDYYUT21Ys3jtO
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/1280-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1280-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1844-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1844-20-0x00000000053B0000-0x0000000005543000-memory.dmp xmrig behavioral2/memory/1844-21-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/1844-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 1844 34d8534ffc25505e359c9b0b9a67f913_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1844 34d8534ffc25505e359c9b0b9a67f913_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/1280-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x00090000000233e5-11.dat upx behavioral2/memory/1844-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1280 34d8534ffc25505e359c9b0b9a67f913_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1280 34d8534ffc25505e359c9b0b9a67f913_JaffaCakes118.exe 1844 34d8534ffc25505e359c9b0b9a67f913_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1280 wrote to memory of 1844 1280 34d8534ffc25505e359c9b0b9a67f913_JaffaCakes118.exe 85 PID 1280 wrote to memory of 1844 1280 34d8534ffc25505e359c9b0b9a67f913_JaffaCakes118.exe 85 PID 1280 wrote to memory of 1844 1280 34d8534ffc25505e359c9b0b9a67f913_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\34d8534ffc25505e359c9b0b9a67f913_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\34d8534ffc25505e359c9b0b9a67f913_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\34d8534ffc25505e359c9b0b9a67f913_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\34d8534ffc25505e359c9b0b9a67f913_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1844
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD57beb1c1abd6fb173b40751e446653301
SHA14745652a9b55dc590556b297f3ddc1be6c674e18
SHA256c225fe96e5edf1669e08e9f396b8d10ac31d861426bb45ff5334b2706107b287
SHA5120f819ec87fd5f3b4b398982c21c0e144a8b78f6549b04a04bf1d40494980f56f51834999f158329948bbdd0965d0d66f3aa0763a2882501940ec8cf04818e9e2