Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    03/05/2024, 11:04

General

  • Target

    105cf23b2dd4fa045429abaa8125a1b6_JaffaCakes118.exe

  • Size

    305KB

  • MD5

    105cf23b2dd4fa045429abaa8125a1b6

  • SHA1

    f79f0093e28c46d808a3fc709a447b1b02e2f7a2

  • SHA256

    7141ed33f4b26a2e69ac9e1cb681891d4aed7e46b3d8920a616fb99292ac3d9c

  • SHA512

    e16e451753f614456fe6b0f8bab0c4147411a5e4889e098c8fa869db55863bb90188b6cc12d14258ffdc4999892778c896edd2900d17a408d97ba6d4df9a7a10

  • SSDEEP

    3072:apfkbpaH5b95soeRVsrjmS0CrN93NG/QGB36rPvCOCm4KQwJXLY2/ZJqan9YS20E:aCKzePEjm2931sm4zmXFZJLYMi1A8

Score
10/10

Malware Config

Signatures

  • KPOT

    KPOT is an information stealer that steals user data and account credentials.

  • KPOT Core Executable 4 IoCs
  • Deletes itself 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\105cf23b2dd4fa045429abaa8125a1b6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\105cf23b2dd4fa045429abaa8125a1b6_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1200
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\105cf23b2dd4fa045429abaa8125a1b6_JaffaCakes118.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:2644
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:3036

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1200-1-0x0000000000610000-0x0000000000710000-memory.dmp

          Filesize

          1024KB

        • memory/1200-2-0x0000000000220000-0x0000000000236000-memory.dmp

          Filesize

          88KB

        • memory/1200-3-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/1200-4-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB

        • memory/1200-6-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/1200-7-0x0000000000610000-0x0000000000710000-memory.dmp

          Filesize

          1024KB