Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 19:54
Static task
static1
Behavioral task
behavioral1
Sample
70ff5016cfd237faef1b9f7c3f3d6c5b_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
70ff5016cfd237faef1b9f7c3f3d6c5b_JaffaCakes118.exe
-
Size
372KB
-
MD5
70ff5016cfd237faef1b9f7c3f3d6c5b
-
SHA1
207cea13c545afc5d94fca97fa3c4b3134ba2e2a
-
SHA256
60b90d95244ff7150826ab96162a32269429ffca7d02ab33306b131db33f2211
-
SHA512
35e1aa05decacdc41b69c31b2500a6fa02ff0bf38da96162a8cef4869871a35be34a2a50ba1161a2997413c2d4b41f3de3750e38aed9b920912962d66e628487
-
SSDEEP
3072:QP8fomAU/fGRFKWJ8pypVcfjXOCHXMem1GVMm++53YlFYAFI:QYAxFRynfTOCH8eUMU+RiS
Malware Config
Signatures
-
KPOT Core Executable 2 IoCs
resource yara_rule behavioral1/memory/2876-10-0x0000000000400000-0x0000000000460000-memory.dmp family_kpot behavioral1/memory/2876-12-0x0000000000400000-0x0000000000460000-memory.dmp family_kpot -
Deletes itself 1 IoCs
pid Process 2772 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2056 set thread context of 2876 2056 70ff5016cfd237faef1b9f7c3f3d6c5b_JaffaCakes118.exe 30 -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\win.ini 70ff5016cfd237faef1b9f7c3f3d6c5b_JaffaCakes118.exe File opened for modification C:\Windows\win.ini 70ff5016cfd237faef1b9f7c3f3d6c5b_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 70ff5016cfd237faef1b9f7c3f3d6c5b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 70ff5016cfd237faef1b9f7c3f3d6c5b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2772 cmd.exe 2640 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2640 PING.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2056 70ff5016cfd237faef1b9f7c3f3d6c5b_JaffaCakes118.exe 2876 70ff5016cfd237faef1b9f7c3f3d6c5b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2876 2056 70ff5016cfd237faef1b9f7c3f3d6c5b_JaffaCakes118.exe 30 PID 2056 wrote to memory of 2876 2056 70ff5016cfd237faef1b9f7c3f3d6c5b_JaffaCakes118.exe 30 PID 2056 wrote to memory of 2876 2056 70ff5016cfd237faef1b9f7c3f3d6c5b_JaffaCakes118.exe 30 PID 2056 wrote to memory of 2876 2056 70ff5016cfd237faef1b9f7c3f3d6c5b_JaffaCakes118.exe 30 PID 2876 wrote to memory of 2772 2876 70ff5016cfd237faef1b9f7c3f3d6c5b_JaffaCakes118.exe 32 PID 2876 wrote to memory of 2772 2876 70ff5016cfd237faef1b9f7c3f3d6c5b_JaffaCakes118.exe 32 PID 2876 wrote to memory of 2772 2876 70ff5016cfd237faef1b9f7c3f3d6c5b_JaffaCakes118.exe 32 PID 2876 wrote to memory of 2772 2876 70ff5016cfd237faef1b9f7c3f3d6c5b_JaffaCakes118.exe 32 PID 2772 wrote to memory of 2640 2772 cmd.exe 34 PID 2772 wrote to memory of 2640 2772 cmd.exe 34 PID 2772 wrote to memory of 2640 2772 cmd.exe 34 PID 2772 wrote to memory of 2640 2772 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\70ff5016cfd237faef1b9f7c3f3d6c5b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\70ff5016cfd237faef1b9f7c3f3d6c5b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\70ff5016cfd237faef1b9f7c3f3d6c5b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\70ff5016cfd237faef1b9f7c3f3d6c5b_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\70ff5016cfd237faef1b9f7c3f3d6c5b_JaffaCakes118.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2640
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
509B
MD5d2a2412bddba16d60ec63bd9550d933f
SHA1deb3d3bdc9055f0b4909b31d3048446848fae0e1
SHA25679ff2254e38192be1626d05bec6c82e10c85e1cf91df7440c4c443380a1e877a
SHA5128fecada107f72e59e43a689eeb8e2e18fa6134d0941c122025ed5bd00e5eab8114d7125bd289505be75641385a0c3f112d402c693f142c3ddc870d5fa8116e31