Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 13:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a5b41d7b7c2414c060c457608d2db55f_JaffaCakes118.exe
Resource
win7-20240220-en
windows7-x64
7 signatures
150 seconds
General
-
Target
a5b41d7b7c2414c060c457608d2db55f_JaffaCakes118.exe
-
Size
631KB
-
MD5
a5b41d7b7c2414c060c457608d2db55f
-
SHA1
00a63a124328538e4eea8282d9c6d7032635768f
-
SHA256
52a6d2dbcc2ee1429418a1d67124c9600db852e5bcbd179f8557a353d45052b9
-
SHA512
1e678e68067f8771e7a436d2bfb2f7be73465b47ee5d9d16b882957e7a192e0c0368f6b1e4e52d8718d852c084331c9bbfeb5c053bacd69dcff61268f01c47e0
-
SSDEEP
12288:e3SmeR3feZ+LBrv1SBOU4n1HzXTW/J0uWnXdNNpWpUaaiNzLRHAspqVZlXQgO0Ir:xYOU4n1TXTW/a5nXdRWpUTixR7cbXO0
Malware Config
Signatures
-
KPOT Core Executable 2 IoCs
resource yara_rule behavioral1/memory/2868-11-0x0000000000400000-0x00000000004A3000-memory.dmp family_kpot behavioral1/memory/2868-13-0x0000000000400000-0x00000000004A3000-memory.dmp family_kpot -
Deletes itself 1 IoCs
pid Process 2112 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1680 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2868 a5b41d7b7c2414c060c457608d2db55f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2112 2868 a5b41d7b7c2414c060c457608d2db55f_JaffaCakes118.exe 30 PID 2868 wrote to memory of 2112 2868 a5b41d7b7c2414c060c457608d2db55f_JaffaCakes118.exe 30 PID 2868 wrote to memory of 2112 2868 a5b41d7b7c2414c060c457608d2db55f_JaffaCakes118.exe 30 PID 2868 wrote to memory of 2112 2868 a5b41d7b7c2414c060c457608d2db55f_JaffaCakes118.exe 30 PID 2112 wrote to memory of 1680 2112 cmd.exe 32 PID 2112 wrote to memory of 1680 2112 cmd.exe 32 PID 2112 wrote to memory of 1680 2112 cmd.exe 32 PID 2112 wrote to memory of 1680 2112 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5b41d7b7c2414c060c457608d2db55f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5b41d7b7c2414c060c457608d2db55f_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\a5b41d7b7c2414c060c457608d2db55f_JaffaCakes118.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1680
-
-