Analysis

  • max time kernel
    141s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-03-2024 00:55

General

  • Target

    KAPE/Modules/bin/JLECmd.exe

  • Size

    4.6MB

  • MD5

    c5a0694bdf4f672d2813112b6174e27c

  • SHA1

    a17879ba2cc6de1490251223841080950dad90c7

  • SHA256

    544ee10af68bac273f1077897888bf90da103ad9941b0095d0cb2aa32b5dcf89

  • SHA512

    8bd3cfde82fbe09b97f431f262cb0847444f152217165bca132c67f2fd1a7df0d1f0b9f5200f46a4b37b0bcb87353a0890afe5dd02470243def44b0a30c26bed

  • SSDEEP

    98304:ARS2pJVaozN9Vl6miVQMRHtnqCSuOw6Sg+Nt2G2dy1E26+GeuZs:oSUXaozhOQ29Yw6Sb6ynYs

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\KAPE\Modules\bin\JLECmd.exe
    "C:\Users\Admin\AppData\Local\Temp\KAPE\Modules\bin\JLECmd.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:4584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4584-0-0x000001A4968D0000-0x000001A496D6C000-memory.dmp

    Filesize

    4.6MB

  • memory/4584-1-0x000001A4988C0000-0x000001A4988E8000-memory.dmp

    Filesize

    160KB

  • memory/4584-2-0x00007FFC87130000-0x00007FFC87BF1000-memory.dmp

    Filesize

    10.8MB

  • memory/4584-3-0x000001A4989A0000-0x000001A4989B0000-memory.dmp

    Filesize

    64KB

  • memory/4584-4-0x000001A4B12C0000-0x000001A4B13BA000-memory.dmp

    Filesize

    1000KB

  • memory/4584-5-0x000001A4B13C0000-0x000001A4B13FC000-memory.dmp

    Filesize

    240KB

  • memory/4584-6-0x000001A4989B0000-0x000001A4989CA000-memory.dmp

    Filesize

    104KB

  • memory/4584-7-0x000001A4B1400000-0x000001A4B1462000-memory.dmp

    Filesize

    392KB

  • memory/4584-8-0x000001A498910000-0x000001A498920000-memory.dmp

    Filesize

    64KB

  • memory/4584-24-0x000001A4B1550000-0x000001A4B1558000-memory.dmp

    Filesize

    32KB

  • memory/4584-25-0x000001A4B1560000-0x000001A4B1586000-memory.dmp

    Filesize

    152KB

  • memory/4584-26-0x000001A4B15C0000-0x000001A4B15C8000-memory.dmp

    Filesize

    32KB

  • memory/4584-28-0x000001A4B1540000-0x000001A4B1554000-memory.dmp

    Filesize

    80KB

  • memory/4584-29-0x000001A4B15A0000-0x000001A4B15B0000-memory.dmp

    Filesize

    64KB

  • memory/4584-30-0x000001A4B1DA0000-0x000001A4B1E44000-memory.dmp

    Filesize

    656KB

  • memory/4584-31-0x000001A4B15D0000-0x000001A4B15EA000-memory.dmp

    Filesize

    104KB

  • memory/4584-33-0x00007FFC87130000-0x00007FFC87BF1000-memory.dmp

    Filesize

    10.8MB