Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-05-2024 19:54
Static task
static1
Behavioral task
behavioral1
Sample
7a53429710e5d456bd79c147316c1bbb_JaffaCakes118.exe
Resource
win7-20240221-en
10 signatures
150 seconds
General
-
Target
7a53429710e5d456bd79c147316c1bbb_JaffaCakes118.exe
-
Size
406KB
-
MD5
7a53429710e5d456bd79c147316c1bbb
-
SHA1
4d46fc427c0c5aa412e13b96dd6be72044ceb18d
-
SHA256
53e1f72ca9dbdfe05ec0baca1f5b5bad453549d7a38845eb14013de9b05f2135
-
SHA512
2673325f08ff43f0a6afcdac341f7fe944927153c09efb14e16dd53974cabba283ca41c03a5c40bc5e0d5d5537d7757284ef7dce70383881deb6c0d2efaa769a
-
SSDEEP
6144:Bdq3IOyQfp+IC0TbC4oWlJBAMZTZwHrmmLWcBagudQOzmGTpozs7:BTQ8sbXLJBAMxCLmmLWcBax6qmGv
Malware Config
Signatures
-
KPOT Core Executable 5 IoCs
resource yara_rule behavioral1/memory/1284-13-0x0000000000400000-0x000000000041B000-memory.dmp family_kpot behavioral1/memory/1284-10-0x0000000000400000-0x000000000041B000-memory.dmp family_kpot behavioral1/memory/1284-9-0x0000000000400000-0x000000000041B000-memory.dmp family_kpot behavioral1/memory/1284-14-0x0000000000400000-0x000000000041B000-memory.dmp family_kpot behavioral1/memory/1284-16-0x0000000000400000-0x000000000041B000-memory.dmp family_kpot -
ReZer0 packer 1 IoCs
Detects ReZer0, a packer with multiple versions used in various campaigns.
resource yara_rule behavioral1/memory/2156-6-0x00000000042E0000-0x0000000004306000-memory.dmp rezer0 -
Deletes itself 1 IoCs
pid Process 2276 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2156 set thread context of 1284 2156 7a53429710e5d456bd79c147316c1bbb_JaffaCakes118.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2672 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2156 7a53429710e5d456bd79c147316c1bbb_JaffaCakes118.exe 2156 7a53429710e5d456bd79c147316c1bbb_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2156 7a53429710e5d456bd79c147316c1bbb_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2156 wrote to memory of 1284 2156 7a53429710e5d456bd79c147316c1bbb_JaffaCakes118.exe 28 PID 2156 wrote to memory of 1284 2156 7a53429710e5d456bd79c147316c1bbb_JaffaCakes118.exe 28 PID 2156 wrote to memory of 1284 2156 7a53429710e5d456bd79c147316c1bbb_JaffaCakes118.exe 28 PID 2156 wrote to memory of 1284 2156 7a53429710e5d456bd79c147316c1bbb_JaffaCakes118.exe 28 PID 2156 wrote to memory of 1284 2156 7a53429710e5d456bd79c147316c1bbb_JaffaCakes118.exe 28 PID 2156 wrote to memory of 1284 2156 7a53429710e5d456bd79c147316c1bbb_JaffaCakes118.exe 28 PID 2156 wrote to memory of 1284 2156 7a53429710e5d456bd79c147316c1bbb_JaffaCakes118.exe 28 PID 2156 wrote to memory of 1284 2156 7a53429710e5d456bd79c147316c1bbb_JaffaCakes118.exe 28 PID 2156 wrote to memory of 1284 2156 7a53429710e5d456bd79c147316c1bbb_JaffaCakes118.exe 28 PID 1284 wrote to memory of 2276 1284 7a53429710e5d456bd79c147316c1bbb_JaffaCakes118.exe 29 PID 1284 wrote to memory of 2276 1284 7a53429710e5d456bd79c147316c1bbb_JaffaCakes118.exe 29 PID 1284 wrote to memory of 2276 1284 7a53429710e5d456bd79c147316c1bbb_JaffaCakes118.exe 29 PID 1284 wrote to memory of 2276 1284 7a53429710e5d456bd79c147316c1bbb_JaffaCakes118.exe 29 PID 2276 wrote to memory of 2672 2276 cmd.exe 31 PID 2276 wrote to memory of 2672 2276 cmd.exe 31 PID 2276 wrote to memory of 2672 2276 cmd.exe 31 PID 2276 wrote to memory of 2672 2276 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a53429710e5d456bd79c147316c1bbb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7a53429710e5d456bd79c147316c1bbb_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\7a53429710e5d456bd79c147316c1bbb_JaffaCakes118.exe"{path}"2⤵
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\7a53429710e5d456bd79c147316c1bbb_JaffaCakes118.exe"3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.14⤵
- Runs ping.exe
PID:2672
-
-
-