Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
07-05-2024 08:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1ffc8bb97af9f908655894fbf8a93064_JaffaCakes118.exe
Resource
win7-20231129-en
windows7-x64
6 signatures
150 seconds
General
-
Target
1ffc8bb97af9f908655894fbf8a93064_JaffaCakes118.exe
-
Size
277KB
-
MD5
1ffc8bb97af9f908655894fbf8a93064
-
SHA1
9679508979e389fb5c287957c817bb979e06d902
-
SHA256
5c197a3050357890623e49dff313b1189d61c7902cb97145bcdb9bb6433d7e67
-
SHA512
7883a5a75fb57f9971081e5a23b7cee742e96e82877df3c97c87a842298d5ba47133f969c2f606ce94c06d30d191bf3925c981342d984299c9201d58975c45d1
-
SSDEEP
6144:t6WAf0enplUTOTHvnajRoe0e0jlS4kAEy5fJ:t6pMylUTOTHvajiy0BXkOxJ
Malware Config
Signatures
-
KPOT Core Executable 4 IoCs
resource yara_rule behavioral1/memory/2332-3-0x0000000000400000-0x0000000000419000-memory.dmp family_kpot behavioral1/memory/2332-2-0x0000000000020000-0x0000000000037000-memory.dmp family_kpot behavioral1/memory/2332-4-0x0000000000400000-0x0000000000452000-memory.dmp family_kpot behavioral1/memory/2332-5-0x0000000000400000-0x0000000000419000-memory.dmp family_kpot -
Deletes itself 1 IoCs
pid Process 1692 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2176 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2332 wrote to memory of 1692 2332 1ffc8bb97af9f908655894fbf8a93064_JaffaCakes118.exe 28 PID 2332 wrote to memory of 1692 2332 1ffc8bb97af9f908655894fbf8a93064_JaffaCakes118.exe 28 PID 2332 wrote to memory of 1692 2332 1ffc8bb97af9f908655894fbf8a93064_JaffaCakes118.exe 28 PID 2332 wrote to memory of 1692 2332 1ffc8bb97af9f908655894fbf8a93064_JaffaCakes118.exe 28 PID 1692 wrote to memory of 2176 1692 cmd.exe 30 PID 1692 wrote to memory of 2176 1692 cmd.exe 30 PID 1692 wrote to memory of 2176 1692 cmd.exe 30 PID 1692 wrote to memory of 2176 1692 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ffc8bb97af9f908655894fbf8a93064_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1ffc8bb97af9f908655894fbf8a93064_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\1ffc8bb97af9f908655894fbf8a93064_JaffaCakes118.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:2176
-
-