Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 09:58
Behavioral task
behavioral1
Sample
494ccf5b4e6efd209339c559d527e425_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
494ccf5b4e6efd209339c559d527e425_JaffaCakes118.exe
-
Size
784KB
-
MD5
494ccf5b4e6efd209339c559d527e425
-
SHA1
f4c0770cb229755489471c990a35b3ab6eb33e0d
-
SHA256
6a4a9aa1f366270625029a4a928960fc74527c8e63ad2fd1b496e4871f27bbb6
-
SHA512
0ff6467cc27929252cf3415e556983fd772e285894f838ee1cafe688a8b2e1d65f3d4389fd25e3935231debee36290137d9943d3d26599b255d0ce4315d53157
-
SSDEEP
12288:wlh9Cu/eDFBs7pxtiwg+O3K2VZ7R84XmS8KUli4XBA3eGa9ZGa:wJHin8xE6IPXfSlLC498a
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/4752-3-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4752-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4996-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4996-21-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/4996-20-0x0000000005520000-0x00000000056B3000-memory.dmp xmrig behavioral2/memory/4996-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 4996 494ccf5b4e6efd209339c559d527e425_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4996 494ccf5b4e6efd209339c559d527e425_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/4752-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x000900000002347a-11.dat upx behavioral2/memory/4996-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4752 494ccf5b4e6efd209339c559d527e425_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4752 494ccf5b4e6efd209339c559d527e425_JaffaCakes118.exe 4996 494ccf5b4e6efd209339c559d527e425_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4752 wrote to memory of 4996 4752 494ccf5b4e6efd209339c559d527e425_JaffaCakes118.exe 86 PID 4752 wrote to memory of 4996 4752 494ccf5b4e6efd209339c559d527e425_JaffaCakes118.exe 86 PID 4752 wrote to memory of 4996 4752 494ccf5b4e6efd209339c559d527e425_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\494ccf5b4e6efd209339c559d527e425_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\494ccf5b4e6efd209339c559d527e425_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\494ccf5b4e6efd209339c559d527e425_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\494ccf5b4e6efd209339c559d527e425_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4996
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5abebb432ef1b6ed4f7c2002fb6192dec
SHA1cb09010a6a9a5b463ec8b0713ac7d75347209347
SHA25602809b8a825854b66d789daba21959d6fdffabf1257bcf3eca5b1dabe47ff0aa
SHA51205e3de33547351fdba07ac2e47a820a8415c9a9e46272e68ffb71c6aaf9a0b2027e3dc2d2c37a2a9021ec44d2f54e71a6305c54f27e240407e52f5cb5594f035