Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
07-07-2024 02:24
Static task
static1
Behavioral task
behavioral1
Sample
29ac2cd74fbbd572b94da49997af3787_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
29ac2cd74fbbd572b94da49997af3787_JaffaCakes118.exe
-
Size
209KB
-
MD5
29ac2cd74fbbd572b94da49997af3787
-
SHA1
420a96b677a89e1edf7e3e33fa0c2207a100574a
-
SHA256
43db2cbad1c51b724d4ef063820b10ef0375eab0835041511422e79287ccc5fa
-
SHA512
c0388195ba7502bb43aac5d7a206763d41f1e9cb4b781a433f326d26c295875e787f6dc52e4a070644b4756d47d3f9f20b6f3e4750e89b6d9bec5e14cfb2445a
-
SSDEEP
6144:ltpKihsAj3FinywCMqi2JPUsnIlCuXhHdgZw20F:FK/Aj1ieMqi2JPUkIlNXhHP9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2788 xpos.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\windows\xpos.exe 29ac2cd74fbbd572b94da49997af3787_JaffaCakes118.exe File created C:\windows\xpos.exe 29ac2cd74fbbd572b94da49997af3787_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2712 2788 WerFault.exe 34 -
Runs net.exe
-
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2028 wrote to memory of 1224 2028 29ac2cd74fbbd572b94da49997af3787_JaffaCakes118.exe 30 PID 2028 wrote to memory of 1224 2028 29ac2cd74fbbd572b94da49997af3787_JaffaCakes118.exe 30 PID 2028 wrote to memory of 1224 2028 29ac2cd74fbbd572b94da49997af3787_JaffaCakes118.exe 30 PID 2028 wrote to memory of 1224 2028 29ac2cd74fbbd572b94da49997af3787_JaffaCakes118.exe 30 PID 1224 wrote to memory of 2984 1224 net.exe 32 PID 1224 wrote to memory of 2984 1224 net.exe 32 PID 1224 wrote to memory of 2984 1224 net.exe 32 PID 1224 wrote to memory of 2984 1224 net.exe 32 PID 2028 wrote to memory of 2788 2028 29ac2cd74fbbd572b94da49997af3787_JaffaCakes118.exe 34 PID 2028 wrote to memory of 2788 2028 29ac2cd74fbbd572b94da49997af3787_JaffaCakes118.exe 34 PID 2028 wrote to memory of 2788 2028 29ac2cd74fbbd572b94da49997af3787_JaffaCakes118.exe 34 PID 2028 wrote to memory of 2788 2028 29ac2cd74fbbd572b94da49997af3787_JaffaCakes118.exe 34 PID 2788 wrote to memory of 2648 2788 xpos.exe 35 PID 2788 wrote to memory of 2648 2788 xpos.exe 35 PID 2788 wrote to memory of 2648 2788 xpos.exe 35 PID 2788 wrote to memory of 2648 2788 xpos.exe 35 PID 2648 wrote to memory of 2612 2648 net.exe 37 PID 2648 wrote to memory of 2612 2648 net.exe 37 PID 2648 wrote to memory of 2612 2648 net.exe 37 PID 2648 wrote to memory of 2612 2648 net.exe 37 PID 2788 wrote to memory of 2712 2788 xpos.exe 38 PID 2788 wrote to memory of 2712 2788 xpos.exe 38 PID 2788 wrote to memory of 2712 2788 xpos.exe 38 PID 2788 wrote to memory of 2712 2788 xpos.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\29ac2cd74fbbd572b94da49997af3787_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\29ac2cd74fbbd572b94da49997af3787_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess2⤵
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess3⤵PID:2984
-
-
-
C:\windows\xpos.exeC:\windows\xpos.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:2612
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2788 -s 4083⤵
- Program crash
PID:2712
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD529ac2cd74fbbd572b94da49997af3787
SHA1420a96b677a89e1edf7e3e33fa0c2207a100574a
SHA25643db2cbad1c51b724d4ef063820b10ef0375eab0835041511422e79287ccc5fa
SHA512c0388195ba7502bb43aac5d7a206763d41f1e9cb4b781a433f326d26c295875e787f6dc52e4a070644b4756d47d3f9f20b6f3e4750e89b6d9bec5e14cfb2445a