Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2024 08:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1ffc8bb97af9f908655894fbf8a93064_JaffaCakes118.exe
Resource
win7-20231129-en
windows7-x64
6 signatures
150 seconds
General
-
Target
1ffc8bb97af9f908655894fbf8a93064_JaffaCakes118.exe
-
Size
277KB
-
MD5
1ffc8bb97af9f908655894fbf8a93064
-
SHA1
9679508979e389fb5c287957c817bb979e06d902
-
SHA256
5c197a3050357890623e49dff313b1189d61c7902cb97145bcdb9bb6433d7e67
-
SHA512
7883a5a75fb57f9971081e5a23b7cee742e96e82877df3c97c87a842298d5ba47133f969c2f606ce94c06d30d191bf3925c981342d984299c9201d58975c45d1
-
SSDEEP
6144:t6WAf0enplUTOTHvnajRoe0e0jlS4kAEy5fJ:t6pMylUTOTHvajiy0BXkOxJ
Malware Config
Signatures
-
KPOT Core Executable 5 IoCs
resource yara_rule behavioral2/memory/4412-1-0x0000000000510000-0x0000000000610000-memory.dmp family_kpot behavioral2/memory/4412-3-0x0000000000400000-0x0000000000419000-memory.dmp family_kpot behavioral2/memory/4412-2-0x0000000000460000-0x0000000000477000-memory.dmp family_kpot behavioral2/memory/4412-4-0x0000000000400000-0x0000000000452000-memory.dmp family_kpot behavioral2/memory/4412-5-0x0000000000400000-0x0000000000419000-memory.dmp family_kpot -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation 1ffc8bb97af9f908655894fbf8a93064_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4808 4412 WerFault.exe 82 -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2024 PING.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4412 wrote to memory of 4952 4412 1ffc8bb97af9f908655894fbf8a93064_JaffaCakes118.exe 86 PID 4412 wrote to memory of 4952 4412 1ffc8bb97af9f908655894fbf8a93064_JaffaCakes118.exe 86 PID 4412 wrote to memory of 4952 4412 1ffc8bb97af9f908655894fbf8a93064_JaffaCakes118.exe 86 PID 4952 wrote to memory of 2024 4952 cmd.exe 90 PID 4952 wrote to memory of 2024 4952 cmd.exe 90 PID 4952 wrote to memory of 2024 4952 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ffc8bb97af9f908655894fbf8a93064_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1ffc8bb97af9f908655894fbf8a93064_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\1ffc8bb97af9f908655894fbf8a93064_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:2024
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 12962⤵
- Program crash
PID:4808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4412 -ip 44121⤵PID:3256