Analysis
-
max time kernel
93s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 20:13
Behavioral task
behavioral1
Sample
4b39cf43c6e7d928cf59f4e43456afe1_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
4b39cf43c6e7d928cf59f4e43456afe1_JaffaCakes118.exe
-
Size
784KB
-
MD5
4b39cf43c6e7d928cf59f4e43456afe1
-
SHA1
62c672114d8f123b37eb60a4d4205b4feaffcd44
-
SHA256
c8d7a1ca1238eabb1fbffb52db02a97399749c8a73686b50247c93fb21373187
-
SHA512
2953ea6193cf191e9eb511020e7847671da7917f0feac64bc50ba9b43cad3df61a595b8a602f98c921503fc708ced04d27f8565e4a1397da5609c669c8ee872b
-
SSDEEP
12288:71+Zxg/frjEOo8gNNsU5Q5leBzv01QOotsqou1qhDivf9RUsAfF8VBufYyBGC1e:B+Zx6toJNfe5yiotJVGf2fEe
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/924-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/924-13-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2576-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2576-21-0x0000000005470000-0x0000000005603000-memory.dmp xmrig behavioral2/memory/2576-22-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/2576-31-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2576 4b39cf43c6e7d928cf59f4e43456afe1_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2576 4b39cf43c6e7d928cf59f4e43456afe1_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/924-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x0009000000023459-12.dat upx behavioral2/memory/2576-14-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 924 4b39cf43c6e7d928cf59f4e43456afe1_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 924 4b39cf43c6e7d928cf59f4e43456afe1_JaffaCakes118.exe 2576 4b39cf43c6e7d928cf59f4e43456afe1_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 924 wrote to memory of 2576 924 4b39cf43c6e7d928cf59f4e43456afe1_JaffaCakes118.exe 86 PID 924 wrote to memory of 2576 924 4b39cf43c6e7d928cf59f4e43456afe1_JaffaCakes118.exe 86 PID 924 wrote to memory of 2576 924 4b39cf43c6e7d928cf59f4e43456afe1_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b39cf43c6e7d928cf59f4e43456afe1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4b39cf43c6e7d928cf59f4e43456afe1_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Users\Admin\AppData\Local\Temp\4b39cf43c6e7d928cf59f4e43456afe1_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\4b39cf43c6e7d928cf59f4e43456afe1_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2576
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD504a56fa6dd8b119ad4dbf85d0dd11ceb
SHA113ca5a059632e251aba6c9b9b93bfa11881e33e2
SHA256b0ff8dcbf93eb0025f33f9e0063056a606e6dd71516af132ca77761ea945a32a
SHA5127da09d214ca643e90f7b73ac9ae1bfc6b7d8b040631d3c26899a711eb9357214f5a025269f669e1289d6f3dba69e0bbfa7d830177d0abf4fb2de5ebc4d6d1f00