Analysis
-
max time kernel
95s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 17:06
Behavioral task
behavioral1
Sample
5cdcc6877e42cb3f711b12418ed8e0be_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
5cdcc6877e42cb3f711b12418ed8e0be_JaffaCakes118.exe
-
Size
784KB
-
MD5
5cdcc6877e42cb3f711b12418ed8e0be
-
SHA1
8aa2a6e1c7b9d9786d0d18a2cd232ee338c63936
-
SHA256
164ec89784be630e03e1063b820e5c58533dc2dee0b3f64e03aa126dc8720ced
-
SHA512
616cfe53728d5ce96033ea296c3d16ffed858f4b968db02fec076daafcad06db3fa391318596548c4f271929d6aa2940dc16aaf58309bb23bbc5962bdca93617
-
SSDEEP
12288:styhcpf8IZc7Fs3c/L9mTBS25LILqbrq3bGab+cwTI/v6Lwpp8Ze4nGv0Ymg/:sqA3c/2yubI+E/HYe4GvAg/
Malware Config
Signatures
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral2/memory/436-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/436-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1112-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1112-27-0x0000000005310000-0x00000000054A3000-memory.dmp xmrig behavioral2/memory/1112-20-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/1112-30-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig behavioral2/memory/1112-31-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 1112 5cdcc6877e42cb3f711b12418ed8e0be_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1112 5cdcc6877e42cb3f711b12418ed8e0be_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/436-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x00080000000234e1-11.dat upx behavioral2/memory/1112-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 436 5cdcc6877e42cb3f711b12418ed8e0be_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 436 5cdcc6877e42cb3f711b12418ed8e0be_JaffaCakes118.exe 1112 5cdcc6877e42cb3f711b12418ed8e0be_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 436 wrote to memory of 1112 436 5cdcc6877e42cb3f711b12418ed8e0be_JaffaCakes118.exe 85 PID 436 wrote to memory of 1112 436 5cdcc6877e42cb3f711b12418ed8e0be_JaffaCakes118.exe 85 PID 436 wrote to memory of 1112 436 5cdcc6877e42cb3f711b12418ed8e0be_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\5cdcc6877e42cb3f711b12418ed8e0be_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5cdcc6877e42cb3f711b12418ed8e0be_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Users\Admin\AppData\Local\Temp\5cdcc6877e42cb3f711b12418ed8e0be_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\5cdcc6877e42cb3f711b12418ed8e0be_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1112
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5d2451a5d8776a522e8a9b39ccf0c1703
SHA11523aa7a936969195a086a470073ff9e45bd5b29
SHA256e19d7db7dbe1bfc84ebd164482d4c9b523b57ba251985d797e5ce6752cc3d802
SHA512a7a81eb81aa4612a580d7a75cd0ae3672239ba87b547d0ebcb90420d48e82a6658c6bf7711d9ba910bf74e4f736d51b3b007185c757066bbf022b0d8aaa60152