Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20/07/2024, 00:38
Behavioral task
behavioral1
Sample
5e5b74d594b4630b38724863be1c5de5_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
5e5b74d594b4630b38724863be1c5de5_JaffaCakes118.exe
-
Size
784KB
-
MD5
5e5b74d594b4630b38724863be1c5de5
-
SHA1
71965b449a01fee3a9022609faac949951a47887
-
SHA256
2fa81fbb91120d2a018d59562b6bd57948681993434bfbf9cf8ab5e82e82a183
-
SHA512
98fb3959c6dc81b870174fef60aad0ef2d76ff01aee5f9facde28080d2c5ac980f5e4e531b722a9f7e478f0f91a4d69c72015eff5651f5df075973778f7722ae
-
SSDEEP
24576:jSWz0P5VHcCP6VAU5i31PFqNAdYuPPvIWHB:jSWzeXjE55G9IC7oWh
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral1/memory/3032-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/3032-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2544-18-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2544-33-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2544-32-0x0000000003150000-0x00000000032E3000-memory.dmp xmrig behavioral1/memory/2544-23-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2544 5e5b74d594b4630b38724863be1c5de5_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2544 5e5b74d594b4630b38724863be1c5de5_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 3032 5e5b74d594b4630b38724863be1c5de5_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/3032-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x0009000000012029-15.dat upx behavioral1/memory/2544-16-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3032 5e5b74d594b4630b38724863be1c5de5_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3032 5e5b74d594b4630b38724863be1c5de5_JaffaCakes118.exe 2544 5e5b74d594b4630b38724863be1c5de5_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2544 3032 5e5b74d594b4630b38724863be1c5de5_JaffaCakes118.exe 31 PID 3032 wrote to memory of 2544 3032 5e5b74d594b4630b38724863be1c5de5_JaffaCakes118.exe 31 PID 3032 wrote to memory of 2544 3032 5e5b74d594b4630b38724863be1c5de5_JaffaCakes118.exe 31 PID 3032 wrote to memory of 2544 3032 5e5b74d594b4630b38724863be1c5de5_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e5b74d594b4630b38724863be1c5de5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5e5b74d594b4630b38724863be1c5de5_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\5e5b74d594b4630b38724863be1c5de5_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\5e5b74d594b4630b38724863be1c5de5_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2544
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5da7624dea2bbe6768964010949d40443
SHA19d2b31dc5de446bc8007248bcdf126f0989608b4
SHA25697186491594426659f7ce218dc3e499d48d9cca372b20c24cf1a55e1356a5403
SHA5125f8bd2faabca200c67e90fcc914007102451d70718deaa6366b8b6dd0f787b9d2fbcf10e6309f3b02f4c1b195b1bea21d414b7b0d6b7193cd6aaa0ad54030af8