Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 20:47
Behavioral task
behavioral1
Sample
3ed354b9829f7f880ab79638da8e8980_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
3ed354b9829f7f880ab79638da8e8980_JaffaCakes118.exe
-
Size
784KB
-
MD5
3ed354b9829f7f880ab79638da8e8980
-
SHA1
4134bbde9d98ec221e67204bb071c3cb2b7e4d15
-
SHA256
21f330f1908e39a2d24f9743af291f392c8214b3b1937d67d1dfb61bb02dc47d
-
SHA512
9860d22e0c86729440366e9cd3d0c0eee482cbda965420690f2b3838044d3560142937313f79b553a7202aa75190300f6e4dfecd8c50edef1e0e822b2f562694
-
SSDEEP
12288:D2pi2+I2zscqb3z/cOQQtTxSnjmXoCa3sAQAtSBs1VSj/PKCGyjL:q02N2zw3z/c5aTx0jm4CIskH1Y3l
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/536-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/536-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2280-16-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2280-20-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/2280-29-0x0000000005400000-0x0000000005593000-memory.dmp xmrig behavioral2/memory/2280-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2280 3ed354b9829f7f880ab79638da8e8980_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2280 3ed354b9829f7f880ab79638da8e8980_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/536-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x000800000002340f-11.dat upx behavioral2/memory/2280-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 536 3ed354b9829f7f880ab79638da8e8980_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 536 3ed354b9829f7f880ab79638da8e8980_JaffaCakes118.exe 2280 3ed354b9829f7f880ab79638da8e8980_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 536 wrote to memory of 2280 536 3ed354b9829f7f880ab79638da8e8980_JaffaCakes118.exe 86 PID 536 wrote to memory of 2280 536 3ed354b9829f7f880ab79638da8e8980_JaffaCakes118.exe 86 PID 536 wrote to memory of 2280 536 3ed354b9829f7f880ab79638da8e8980_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ed354b9829f7f880ab79638da8e8980_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3ed354b9829f7f880ab79638da8e8980_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Local\Temp\3ed354b9829f7f880ab79638da8e8980_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\3ed354b9829f7f880ab79638da8e8980_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2280
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD56dde80c2331b1ec1f5bcad44095d63a3
SHA1d8bae4a95dc9068335ba6a39e1d2068ac29caabb
SHA2567b9a164d047b001c860f8a47e8782a49545356964cf917305dda60e528a770ac
SHA512dc5cbe7babfadf113c26d16fcf66401dc005daa7bf834e0edbb2e30085dbb659c3750f5f45d637f3ab3ede6f079b6d940cbcc54b27c59efb941298c7a622b025