Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15-07-2024 23:58
Behavioral task
behavioral1
Sample
4bf85ddc218413357000f04a84d882b0_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
4bf85ddc218413357000f04a84d882b0_JaffaCakes118.exe
-
Size
784KB
-
MD5
4bf85ddc218413357000f04a84d882b0
-
SHA1
3106959a593f530479da62bf65ecdb3caf7dd960
-
SHA256
cc065adfae34441423af425f0d941f1dbdf128b19e1bbca9e5298b0596daf3d4
-
SHA512
e02f518023fe139f2f378d602bcd473e8c266fe435ddc2fce0c240080b4c40ec7e352899bf2c4b4c5de384d71ed4c7a572bdc0a361c093e51a89516d08df421f
-
SSDEEP
24576:6BtCENu9IPIshs1uE8WQmuh1rJ1dBTXS:6BtCENui3s1uDLmuhvdXS
Malware Config
Signatures
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral1/memory/2708-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2708-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2704-23-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2704-17-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2704-32-0x00000000030F0000-0x0000000003283000-memory.dmp xmrig behavioral1/memory/2704-33-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig behavioral1/memory/2704-34-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2704 4bf85ddc218413357000f04a84d882b0_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2704 4bf85ddc218413357000f04a84d882b0_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2708 4bf85ddc218413357000f04a84d882b0_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2708-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x000700000001211b-10.dat upx behavioral1/memory/2704-16-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2708 4bf85ddc218413357000f04a84d882b0_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2708 4bf85ddc218413357000f04a84d882b0_JaffaCakes118.exe 2704 4bf85ddc218413357000f04a84d882b0_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2704 2708 4bf85ddc218413357000f04a84d882b0_JaffaCakes118.exe 31 PID 2708 wrote to memory of 2704 2708 4bf85ddc218413357000f04a84d882b0_JaffaCakes118.exe 31 PID 2708 wrote to memory of 2704 2708 4bf85ddc218413357000f04a84d882b0_JaffaCakes118.exe 31 PID 2708 wrote to memory of 2704 2708 4bf85ddc218413357000f04a84d882b0_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\4bf85ddc218413357000f04a84d882b0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4bf85ddc218413357000f04a84d882b0_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\4bf85ddc218413357000f04a84d882b0_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\4bf85ddc218413357000f04a84d882b0_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2704
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD52c717a83f3baac2e09c94fdbb06467c7
SHA18c67e9e5aa447ae080368a4d2ab31d7acb81800b
SHA256c6d3a7cf3088d9cf3fbbc1713ec3190e053f8a811ad6b46f9d5069906cb8753e
SHA512ff8ec5f45bd796689ebca5a404e8aca6c65fed66b49bcfd560497e811a04daf92e2f8f92b6f777422ba1ee087b9b0020d0f53c411f38ae2c5eeacabf0ce364ff