Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 01:12
Behavioral task
behavioral1
Sample
3b72840976647baea132b88be11f8d5d_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
3b72840976647baea132b88be11f8d5d_JaffaCakes118.exe
-
Size
784KB
-
MD5
3b72840976647baea132b88be11f8d5d
-
SHA1
21c474fb0ccfab036915a77f3987dbc5826666b7
-
SHA256
854ced74815f6dd1b68d1a1a1e6aa0344661340ac67c84ff1eeaf42fedcbb469
-
SHA512
b40c260d261cf4210741a65cf308658a3b4c1547ab10ea12bca68008f824186410558f690cbfeadefb22e22dee3ec330d6bbc94667f3b6fb5e3001b12c65ed6e
-
SSDEEP
24576:NWynefbXylHEhQDcADiql4Pm56wsTSuO3qE/lFOh:wyeTXylk2cc3WPGieB3dE
Malware Config
Signatures
-
XMRig Miner payload 9 IoCs
resource yara_rule behavioral1/memory/2932-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2932-15-0x00000000030F0000-0x0000000003402000-memory.dmp xmrig behavioral1/memory/2932-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/1604-18-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/1604-33-0x0000000003100000-0x0000000003293000-memory.dmp xmrig behavioral1/memory/1604-23-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/1604-34-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig behavioral1/memory/1604-35-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2932-36-0x00000000030F0000-0x0000000003402000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 1604 3b72840976647baea132b88be11f8d5d_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1604 3b72840976647baea132b88be11f8d5d_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2932 3b72840976647baea132b88be11f8d5d_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2932-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x0008000000012119-10.dat upx behavioral1/memory/1604-17-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2932 3b72840976647baea132b88be11f8d5d_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2932 3b72840976647baea132b88be11f8d5d_JaffaCakes118.exe 1604 3b72840976647baea132b88be11f8d5d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2932 wrote to memory of 1604 2932 3b72840976647baea132b88be11f8d5d_JaffaCakes118.exe 29 PID 2932 wrote to memory of 1604 2932 3b72840976647baea132b88be11f8d5d_JaffaCakes118.exe 29 PID 2932 wrote to memory of 1604 2932 3b72840976647baea132b88be11f8d5d_JaffaCakes118.exe 29 PID 2932 wrote to memory of 1604 2932 3b72840976647baea132b88be11f8d5d_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b72840976647baea132b88be11f8d5d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3b72840976647baea132b88be11f8d5d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\3b72840976647baea132b88be11f8d5d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\3b72840976647baea132b88be11f8d5d_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1604
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5ac469df79250eca0adb5b4fea600513b
SHA16d763357ce670b84445ad292c1cea66514b3d136
SHA25692279a97ec94768d03e58648dedb0d959cf1083f8690c625f7dd33d17341346a
SHA5122690d38134925735715c8db01b9b69997d55df1f1e1db3ff504ec8df54f864c0d9d4ae511da5542b6ef989689c570655b4cfb19b39efc9707d031dd57853d01a