Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20/07/2024, 07:35
Behavioral task
behavioral1
Sample
5f973d41f98dea83ded508a5377fcbc8_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
5f973d41f98dea83ded508a5377fcbc8_JaffaCakes118.exe
-
Size
784KB
-
MD5
5f973d41f98dea83ded508a5377fcbc8
-
SHA1
d436b87273b5831b0d6e8c964f170e7f77912a51
-
SHA256
4130e77de0548e206244ac4fbeb9d876a5a068997c1b6ec7a355f57bdca0125e
-
SHA512
720b435e4f1dee218551a92e937b8f1769403838bc3ab183ce28126331ee4183fb25a77fa2b93462d8287064dc9a098cbdd6e5a7360be7dc7aefedffc3350ee4
-
SSDEEP
12288:9Ec0pla1ldABkrjGii13M3Ah2JYqsymZHREJZM2qm1dFYVpisoTqPkPD:Cc0plC6Bk/iq3Ah2eby3qEv73PD
Malware Config
Signatures
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral1/memory/2112-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2112-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2296-24-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2296-19-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2296-34-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2296-33-0x0000000003150000-0x00000000032E3000-memory.dmp xmrig behavioral1/memory/2112-35-0x0000000003170000-0x0000000003482000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2296 5f973d41f98dea83ded508a5377fcbc8_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2296 5f973d41f98dea83ded508a5377fcbc8_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2112 5f973d41f98dea83ded508a5377fcbc8_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2112-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x000e000000012262-10.dat upx behavioral1/memory/2112-15-0x0000000003170000-0x0000000003482000-memory.dmp upx behavioral1/memory/2296-17-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2112 5f973d41f98dea83ded508a5377fcbc8_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2112 5f973d41f98dea83ded508a5377fcbc8_JaffaCakes118.exe 2296 5f973d41f98dea83ded508a5377fcbc8_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2296 2112 5f973d41f98dea83ded508a5377fcbc8_JaffaCakes118.exe 31 PID 2112 wrote to memory of 2296 2112 5f973d41f98dea83ded508a5377fcbc8_JaffaCakes118.exe 31 PID 2112 wrote to memory of 2296 2112 5f973d41f98dea83ded508a5377fcbc8_JaffaCakes118.exe 31 PID 2112 wrote to memory of 2296 2112 5f973d41f98dea83ded508a5377fcbc8_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f973d41f98dea83ded508a5377fcbc8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5f973d41f98dea83ded508a5377fcbc8_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\5f973d41f98dea83ded508a5377fcbc8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\5f973d41f98dea83ded508a5377fcbc8_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2296
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD57c2430769f489d5502b53d734c9bd7ac
SHA19eda2ddb02f9731abd7876ccd0fab6e2fc57fd8c
SHA256a8fe1eb5696416c4af2c05093da09abf5982cd5554fa5d69b48aa65af23c8e11
SHA512898ef59522ef07f243fff59e45c08e8015dbe6125e343cba2662ae2ca0baedd31470a2d34853c77e3189ff2cfa60d0faa173a029eab5d9d94e6e4fbf49211be4