Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
08-07-2024 11:19
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2c2248aec7c92b56ddbb493e84dfaddd_JaffaCakes118.exe
Resource
win7-20240705-en
windows7-x64
6 signatures
150 seconds
General
-
Target
2c2248aec7c92b56ddbb493e84dfaddd_JaffaCakes118.exe
-
Size
169KB
-
MD5
2c2248aec7c92b56ddbb493e84dfaddd
-
SHA1
4dd1767b3f305999a80aa3a5f36776d9587a1afb
-
SHA256
a33b11b4add719f4674e95c3a45a66b40c76b4c531f671f6677b1b88d0c01ad4
-
SHA512
c26f4e4559511f34d92ece2eb3728754c6fc77382e183c6f84429b4b0fd46ef16d4f1d4d357d01e9ec1ca28ac172ae237c6e4402293310faad69ba8a6908f7e3
-
SSDEEP
3072:NP/0iJ1CtTsYebjNdBnwEq0B3I+5b3Qrr8V:NP/Pwlytd1lB4oU+
Malware Config
Signatures
-
KPOT Core Executable 5 IoCs
resource yara_rule behavioral1/memory/2272-2-0x0000000000020000-0x0000000000036000-memory.dmp family_kpot behavioral1/memory/2272-3-0x0000000000400000-0x0000000000418000-memory.dmp family_kpot behavioral1/memory/2272-4-0x0000000000400000-0x0000000000432000-memory.dmp family_kpot behavioral1/memory/2272-5-0x0000000000020000-0x0000000000036000-memory.dmp family_kpot behavioral1/memory/2272-6-0x0000000000400000-0x0000000000418000-memory.dmp family_kpot -
Deletes itself 1 IoCs
pid Process 2688 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2760 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2688 2272 2c2248aec7c92b56ddbb493e84dfaddd_JaffaCakes118.exe 30 PID 2272 wrote to memory of 2688 2272 2c2248aec7c92b56ddbb493e84dfaddd_JaffaCakes118.exe 30 PID 2272 wrote to memory of 2688 2272 2c2248aec7c92b56ddbb493e84dfaddd_JaffaCakes118.exe 30 PID 2272 wrote to memory of 2688 2272 2c2248aec7c92b56ddbb493e84dfaddd_JaffaCakes118.exe 30 PID 2688 wrote to memory of 2760 2688 cmd.exe 32 PID 2688 wrote to memory of 2760 2688 cmd.exe 32 PID 2688 wrote to memory of 2760 2688 cmd.exe 32 PID 2688 wrote to memory of 2760 2688 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c2248aec7c92b56ddbb493e84dfaddd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2c2248aec7c92b56ddbb493e84dfaddd_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\2c2248aec7c92b56ddbb493e84dfaddd_JaffaCakes118.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:2760
-
-