Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    07-07-2024 02:24

General

  • Target

    29ac2cd74fbbd572b94da49997af3787_JaffaCakes118.exe

  • Size

    209KB

  • MD5

    29ac2cd74fbbd572b94da49997af3787

  • SHA1

    420a96b677a89e1edf7e3e33fa0c2207a100574a

  • SHA256

    43db2cbad1c51b724d4ef063820b10ef0375eab0835041511422e79287ccc5fa

  • SHA512

    c0388195ba7502bb43aac5d7a206763d41f1e9cb4b781a433f326d26c295875e787f6dc52e4a070644b4756d47d3f9f20b6f3e4750e89b6d9bec5e14cfb2445a

  • SSDEEP

    6144:ltpKihsAj3FinywCMqi2JPUsnIlCuXhHdgZw20F:FK/Aj1ieMqi2JPUkIlNXhHP9

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Windows directory 2 IoCs
  • Program crash 1 IoCs
  • Runs net.exe
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\29ac2cd74fbbd572b94da49997af3787_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\29ac2cd74fbbd572b94da49997af3787_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Windows\SysWOW64\net.exe
      net stop SharedAccess
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1224
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop SharedAccess
        3⤵
          PID:2984
      • C:\windows\xpos.exe
        C:\windows\xpos.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2788
        • C:\Windows\SysWOW64\net.exe
          net stop SharedAccess
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2648
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop SharedAccess
            4⤵
              PID:2612
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2788 -s 408
            3⤵
            • Program crash
            PID:2712

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\xpos.exe

        Filesize

        209KB

        MD5

        29ac2cd74fbbd572b94da49997af3787

        SHA1

        420a96b677a89e1edf7e3e33fa0c2207a100574a

        SHA256

        43db2cbad1c51b724d4ef063820b10ef0375eab0835041511422e79287ccc5fa

        SHA512

        c0388195ba7502bb43aac5d7a206763d41f1e9cb4b781a433f326d26c295875e787f6dc52e4a070644b4756d47d3f9f20b6f3e4750e89b6d9bec5e14cfb2445a

      • memory/2028-0-0x0000000000400000-0x0000000000475000-memory.dmp

        Filesize

        468KB

      • memory/2028-1-0x00000000002C0000-0x00000000002C1000-memory.dmp

        Filesize

        4KB

      • memory/2028-9-0x0000000001EF0000-0x0000000001F65000-memory.dmp

        Filesize

        468KB

      • memory/2028-8-0x0000000001EF0000-0x0000000001F65000-memory.dmp

        Filesize

        468KB

      • memory/2028-12-0x0000000000400000-0x0000000000475000-memory.dmp

        Filesize

        468KB

      • memory/2028-13-0x0000000001EF0000-0x0000000001F65000-memory.dmp

        Filesize

        468KB

      • memory/2028-15-0x0000000000400000-0x0000000000475000-memory.dmp

        Filesize

        468KB

      • memory/2788-10-0x0000000000400000-0x0000000000475000-memory.dmp

        Filesize

        468KB

      • memory/2788-11-0x00000000002C0000-0x00000000002C1000-memory.dmp

        Filesize

        4KB

      • memory/2788-14-0x0000000000400000-0x0000000000475000-memory.dmp

        Filesize

        468KB