Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
03/05/2024, 11:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
105cf23b2dd4fa045429abaa8125a1b6_JaffaCakes118.exe
Resource
win7-20240419-en
6 signatures
150 seconds
General
-
Target
105cf23b2dd4fa045429abaa8125a1b6_JaffaCakes118.exe
-
Size
305KB
-
MD5
105cf23b2dd4fa045429abaa8125a1b6
-
SHA1
f79f0093e28c46d808a3fc709a447b1b02e2f7a2
-
SHA256
7141ed33f4b26a2e69ac9e1cb681891d4aed7e46b3d8920a616fb99292ac3d9c
-
SHA512
e16e451753f614456fe6b0f8bab0c4147411a5e4889e098c8fa869db55863bb90188b6cc12d14258ffdc4999892778c896edd2900d17a408d97ba6d4df9a7a10
-
SSDEEP
3072:apfkbpaH5b95soeRVsrjmS0CrN93NG/QGB36rPvCOCm4KQwJXLY2/ZJqan9YS20E:aCKzePEjm2931sm4zmXFZJLYMi1A8
Malware Config
Signatures
-
KPOT Core Executable 4 IoCs
resource yara_rule behavioral1/memory/1200-2-0x0000000000220000-0x0000000000236000-memory.dmp family_kpot behavioral1/memory/1200-3-0x0000000000400000-0x0000000000418000-memory.dmp family_kpot behavioral1/memory/1200-4-0x0000000000400000-0x000000000044F000-memory.dmp family_kpot behavioral1/memory/1200-6-0x0000000000400000-0x0000000000418000-memory.dmp family_kpot -
Deletes itself 1 IoCs
pid Process 2644 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3036 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1200 wrote to memory of 2644 1200 105cf23b2dd4fa045429abaa8125a1b6_JaffaCakes118.exe 30 PID 1200 wrote to memory of 2644 1200 105cf23b2dd4fa045429abaa8125a1b6_JaffaCakes118.exe 30 PID 1200 wrote to memory of 2644 1200 105cf23b2dd4fa045429abaa8125a1b6_JaffaCakes118.exe 30 PID 1200 wrote to memory of 2644 1200 105cf23b2dd4fa045429abaa8125a1b6_JaffaCakes118.exe 30 PID 2644 wrote to memory of 3036 2644 cmd.exe 32 PID 2644 wrote to memory of 3036 2644 cmd.exe 32 PID 2644 wrote to memory of 3036 2644 cmd.exe 32 PID 2644 wrote to memory of 3036 2644 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\105cf23b2dd4fa045429abaa8125a1b6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\105cf23b2dd4fa045429abaa8125a1b6_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\105cf23b2dd4fa045429abaa8125a1b6_JaffaCakes118.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:3036
-
-