Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 21:06
Behavioral task
behavioral1
Sample
3ee1b13f794e22c4e0a3963fc5c6c5c8_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
3ee1b13f794e22c4e0a3963fc5c6c5c8_JaffaCakes118.exe
-
Size
784KB
-
MD5
3ee1b13f794e22c4e0a3963fc5c6c5c8
-
SHA1
1a5fb79620cdfc1fe892dac9cf8f1703b16583ab
-
SHA256
7de41bda9d10f249f74b7068e0a58c2c7753fcf8f4b878e7ab018444b18bbe7d
-
SHA512
678529521e8b53fb7fe2faa9ce82b899006bdd357448575befc55d03817a8c3764973bb0f241a1f68ec9889055d9d8bad53fc76150a74a14b1c92e2937f782e4
-
SSDEEP
24576:3Mc66uYjBf57jAymRW17Vcp7A+X3H6klR3:3Mv6uYVRQl6kl
Malware Config
Signatures
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral1/memory/2072-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2072-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2960-17-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2960-32-0x0000000003250000-0x00000000033E3000-memory.dmp xmrig behavioral1/memory/2960-23-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2960-33-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2072-34-0x0000000003220000-0x0000000003532000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2960 3ee1b13f794e22c4e0a3963fc5c6c5c8_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2960 3ee1b13f794e22c4e0a3963fc5c6c5c8_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2072 3ee1b13f794e22c4e0a3963fc5c6c5c8_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2072-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x0004000000011ba2-10.dat upx behavioral1/memory/2960-16-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2072 3ee1b13f794e22c4e0a3963fc5c6c5c8_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2072 3ee1b13f794e22c4e0a3963fc5c6c5c8_JaffaCakes118.exe 2960 3ee1b13f794e22c4e0a3963fc5c6c5c8_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2960 2072 3ee1b13f794e22c4e0a3963fc5c6c5c8_JaffaCakes118.exe 31 PID 2072 wrote to memory of 2960 2072 3ee1b13f794e22c4e0a3963fc5c6c5c8_JaffaCakes118.exe 31 PID 2072 wrote to memory of 2960 2072 3ee1b13f794e22c4e0a3963fc5c6c5c8_JaffaCakes118.exe 31 PID 2072 wrote to memory of 2960 2072 3ee1b13f794e22c4e0a3963fc5c6c5c8_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ee1b13f794e22c4e0a3963fc5c6c5c8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3ee1b13f794e22c4e0a3963fc5c6c5c8_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\3ee1b13f794e22c4e0a3963fc5c6c5c8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\3ee1b13f794e22c4e0a3963fc5c6c5c8_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2960
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5a7c0d695f33bab6407d39b76fb301472
SHA19083168cd253f81f5711261ab34e697f712aef2b
SHA256030d10b10738576c9f3c083882bcccf7dc0e2c6cb5daef571628c65c59401717
SHA512be84f4932708b512697cad4a31b04cd825556c9ff9e2439350c3ee41ef74f4c36f5014193fb9305f6546a42db16642ae8784870552c6d26e45135b1256fb6390