Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12-07-2024 05:22
Behavioral task
behavioral1
Sample
3c2116356cb9a8c143c007c2a82488ce_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
3c2116356cb9a8c143c007c2a82488ce_JaffaCakes118.exe
-
Size
784KB
-
MD5
3c2116356cb9a8c143c007c2a82488ce
-
SHA1
be9b6044679817ba64813f647bbe290047ca8689
-
SHA256
a8f2f670a567e4d06fd878356d72ec55873cdfb602afb1cee5c8217e62845ec1
-
SHA512
2f4cb34690f719fc1c97eedd88b350bcea7b5ceddabd7f7ae1788415ce5de579330eacb1cb16c17b81adda25d63d2419155aa2d421025642fcb6aecbe9979b94
-
SSDEEP
24576:+y2ouCchBAaBwV6jnHzWwGmccHUMY1TMk0h:+y9uZNs6zHyne0MY5Mk0
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/4340-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4340-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3328-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/3328-22-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/3328-20-0x0000000005580000-0x0000000005713000-memory.dmp xmrig behavioral2/memory/3328-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 3328 3c2116356cb9a8c143c007c2a82488ce_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3328 3c2116356cb9a8c143c007c2a82488ce_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/4340-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x0009000000023471-11.dat upx behavioral2/memory/3328-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4340 3c2116356cb9a8c143c007c2a82488ce_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4340 3c2116356cb9a8c143c007c2a82488ce_JaffaCakes118.exe 3328 3c2116356cb9a8c143c007c2a82488ce_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4340 wrote to memory of 3328 4340 3c2116356cb9a8c143c007c2a82488ce_JaffaCakes118.exe 85 PID 4340 wrote to memory of 3328 4340 3c2116356cb9a8c143c007c2a82488ce_JaffaCakes118.exe 85 PID 4340 wrote to memory of 3328 4340 3c2116356cb9a8c143c007c2a82488ce_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c2116356cb9a8c143c007c2a82488ce_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3c2116356cb9a8c143c007c2a82488ce_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\3c2116356cb9a8c143c007c2a82488ce_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\3c2116356cb9a8c143c007c2a82488ce_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3328
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5fe8c06ea3e4e253ad3f1c2fa709aba88
SHA10c9196a33aa6288aa658b9953017887b4d9235a4
SHA25606e4ce32f825846b25502f7edf991e04d50d9ddd6ed6772a0fbbe5d418760f6a
SHA512737a142194f990884c9f6406f0be4bd943c63f709d4d2da352f57fb2998f31aed37d9d5f088787756cb4e6c9bf192595039b2e382b439880c275263f79dfed8e