Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12-07-2024 21:06
Behavioral task
behavioral1
Sample
3ee1b13f794e22c4e0a3963fc5c6c5c8_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
3ee1b13f794e22c4e0a3963fc5c6c5c8_JaffaCakes118.exe
-
Size
784KB
-
MD5
3ee1b13f794e22c4e0a3963fc5c6c5c8
-
SHA1
1a5fb79620cdfc1fe892dac9cf8f1703b16583ab
-
SHA256
7de41bda9d10f249f74b7068e0a58c2c7753fcf8f4b878e7ab018444b18bbe7d
-
SHA512
678529521e8b53fb7fe2faa9ce82b899006bdd357448575befc55d03817a8c3764973bb0f241a1f68ec9889055d9d8bad53fc76150a74a14b1c92e2937f782e4
-
SSDEEP
24576:3Mc66uYjBf57jAymRW17Vcp7A+X3H6klR3:3Mv6uYVRQl6kl
Malware Config
Signatures
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral2/memory/540-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/540-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4236-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4236-20-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/4236-29-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig behavioral2/memory/4236-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/4236-31-0x0000000005340000-0x00000000054D3000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 4236 3ee1b13f794e22c4e0a3963fc5c6c5c8_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4236 3ee1b13f794e22c4e0a3963fc5c6c5c8_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/540-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x000900000002340d-11.dat upx behavioral2/memory/4236-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 540 3ee1b13f794e22c4e0a3963fc5c6c5c8_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 540 3ee1b13f794e22c4e0a3963fc5c6c5c8_JaffaCakes118.exe 4236 3ee1b13f794e22c4e0a3963fc5c6c5c8_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 540 wrote to memory of 4236 540 3ee1b13f794e22c4e0a3963fc5c6c5c8_JaffaCakes118.exe 84 PID 540 wrote to memory of 4236 540 3ee1b13f794e22c4e0a3963fc5c6c5c8_JaffaCakes118.exe 84 PID 540 wrote to memory of 4236 540 3ee1b13f794e22c4e0a3963fc5c6c5c8_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ee1b13f794e22c4e0a3963fc5c6c5c8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3ee1b13f794e22c4e0a3963fc5c6c5c8_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Local\Temp\3ee1b13f794e22c4e0a3963fc5c6c5c8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\3ee1b13f794e22c4e0a3963fc5c6c5c8_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4236
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD577b512b31549f36b13bef3bb0a0e43cb
SHA1634280e41900561ce274254d0b213a53ddfcb440
SHA256b4e84b81637258e7f1d7f444abb7a36a935c52013203af31325a31205df5a7d7
SHA5120424d08fb4c88675cd29f04a71f1976bdc57c0b5dbbdbbafb110e7ed5b4dc3e525b78e7fb89edc14deb49a402eee5e61d46f8f6de75ab031c40ca6e17c42d6a1