Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19-07-2024 00:07
Behavioral task
behavioral1
Sample
59aa4aaabb0e633682389b1445150023_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
59aa4aaabb0e633682389b1445150023_JaffaCakes118.exe
-
Size
784KB
-
MD5
59aa4aaabb0e633682389b1445150023
-
SHA1
05976aac945833bfe94bcb4b6a9c72ff15c35a02
-
SHA256
01a3218e6948a3137f10dc0f9dd6c1d6dc6c7fa34c5769079530a0b4c8cf4222
-
SHA512
386e0ef04703b2747399dded3077718c3e4e6ff4677f75cd607678abdfccc882b7d2235d65c0a54ec9365a9eb9fbd29905a048812ce7d92f51c7c52e0f35b7af
-
SSDEEP
24576:PAlU7j8ZWZzU0xl67Y47o72+/plQO1Xjna0:PAZWZG17o7/p+cXjn
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral1/memory/2560-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2560-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2376-18-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2376-32-0x0000000003220000-0x00000000033B3000-memory.dmp xmrig behavioral1/memory/2376-23-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2376-33-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2376 59aa4aaabb0e633682389b1445150023_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2376 59aa4aaabb0e633682389b1445150023_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2560 59aa4aaabb0e633682389b1445150023_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2560-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x00090000000120f9-10.dat upx behavioral1/memory/2376-16-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2560 59aa4aaabb0e633682389b1445150023_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2560 59aa4aaabb0e633682389b1445150023_JaffaCakes118.exe 2376 59aa4aaabb0e633682389b1445150023_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2560 wrote to memory of 2376 2560 59aa4aaabb0e633682389b1445150023_JaffaCakes118.exe 31 PID 2560 wrote to memory of 2376 2560 59aa4aaabb0e633682389b1445150023_JaffaCakes118.exe 31 PID 2560 wrote to memory of 2376 2560 59aa4aaabb0e633682389b1445150023_JaffaCakes118.exe 31 PID 2560 wrote to memory of 2376 2560 59aa4aaabb0e633682389b1445150023_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\59aa4aaabb0e633682389b1445150023_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\59aa4aaabb0e633682389b1445150023_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\59aa4aaabb0e633682389b1445150023_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\59aa4aaabb0e633682389b1445150023_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2376
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5d0639acd0d401c381301c92e0f09d058
SHA1590fb89c022a6be6cf30603e6fdb2fcf7919b605
SHA25614c864493225c0ab43bdb4946c8f19b15bbd250228345d819e6f785814c5e084
SHA512c92af86574b6716fbdd364022dc4a72832d43d4aa313e2ebedf0935b60d759358cbe350fbd59b8d1f78899949fefa4e79802dc46d68f829805fd8e88700410d1