Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 19:54
Static task
static1
Behavioral task
behavioral1
Sample
7a53429710e5d456bd79c147316c1bbb_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
7a53429710e5d456bd79c147316c1bbb_JaffaCakes118.exe
-
Size
406KB
-
MD5
7a53429710e5d456bd79c147316c1bbb
-
SHA1
4d46fc427c0c5aa412e13b96dd6be72044ceb18d
-
SHA256
53e1f72ca9dbdfe05ec0baca1f5b5bad453549d7a38845eb14013de9b05f2135
-
SHA512
2673325f08ff43f0a6afcdac341f7fe944927153c09efb14e16dd53974cabba283ca41c03a5c40bc5e0d5d5537d7757284ef7dce70383881deb6c0d2efaa769a
-
SSDEEP
6144:Bdq3IOyQfp+IC0TbC4oWlJBAMZTZwHrmmLWcBagudQOzmGTpozs7:BTQ8sbXLJBAMxCLmmLWcBax6qmGv
Malware Config
Signatures
-
KPOT Core Executable 3 IoCs
resource yara_rule behavioral2/memory/4004-13-0x0000000000400000-0x000000000041B000-memory.dmp family_kpot behavioral2/memory/4004-14-0x0000000000400000-0x000000000041B000-memory.dmp family_kpot behavioral2/memory/4004-17-0x0000000000400000-0x000000000041B000-memory.dmp family_kpot -
ReZer0 packer 1 IoCs
Detects ReZer0, a packer with multiple versions used in various campaigns.
resource yara_rule behavioral2/memory/940-11-0x0000000007620000-0x0000000007646000-memory.dmp rezer0 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 7a53429710e5d456bd79c147316c1bbb_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 940 set thread context of 4004 940 7a53429710e5d456bd79c147316c1bbb_JaffaCakes118.exe 85 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1396 PING.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 940 7a53429710e5d456bd79c147316c1bbb_JaffaCakes118.exe 940 7a53429710e5d456bd79c147316c1bbb_JaffaCakes118.exe 940 7a53429710e5d456bd79c147316c1bbb_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 940 7a53429710e5d456bd79c147316c1bbb_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 940 wrote to memory of 4004 940 7a53429710e5d456bd79c147316c1bbb_JaffaCakes118.exe 85 PID 940 wrote to memory of 4004 940 7a53429710e5d456bd79c147316c1bbb_JaffaCakes118.exe 85 PID 940 wrote to memory of 4004 940 7a53429710e5d456bd79c147316c1bbb_JaffaCakes118.exe 85 PID 940 wrote to memory of 4004 940 7a53429710e5d456bd79c147316c1bbb_JaffaCakes118.exe 85 PID 940 wrote to memory of 4004 940 7a53429710e5d456bd79c147316c1bbb_JaffaCakes118.exe 85 PID 940 wrote to memory of 4004 940 7a53429710e5d456bd79c147316c1bbb_JaffaCakes118.exe 85 PID 940 wrote to memory of 4004 940 7a53429710e5d456bd79c147316c1bbb_JaffaCakes118.exe 85 PID 940 wrote to memory of 4004 940 7a53429710e5d456bd79c147316c1bbb_JaffaCakes118.exe 85 PID 4004 wrote to memory of 1360 4004 7a53429710e5d456bd79c147316c1bbb_JaffaCakes118.exe 86 PID 4004 wrote to memory of 1360 4004 7a53429710e5d456bd79c147316c1bbb_JaffaCakes118.exe 86 PID 4004 wrote to memory of 1360 4004 7a53429710e5d456bd79c147316c1bbb_JaffaCakes118.exe 86 PID 1360 wrote to memory of 1396 1360 cmd.exe 88 PID 1360 wrote to memory of 1396 1360 cmd.exe 88 PID 1360 wrote to memory of 1396 1360 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a53429710e5d456bd79c147316c1bbb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7a53429710e5d456bd79c147316c1bbb_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Users\Admin\AppData\Local\Temp\7a53429710e5d456bd79c147316c1bbb_JaffaCakes118.exe"{path}"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\7a53429710e5d456bd79c147316c1bbb_JaffaCakes118.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.14⤵
- Runs ping.exe
PID:1396
-
-
-