Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2024 19:54
Static task
static1
Behavioral task
behavioral1
Sample
70ff5016cfd237faef1b9f7c3f3d6c5b_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
70ff5016cfd237faef1b9f7c3f3d6c5b_JaffaCakes118.exe
-
Size
372KB
-
MD5
70ff5016cfd237faef1b9f7c3f3d6c5b
-
SHA1
207cea13c545afc5d94fca97fa3c4b3134ba2e2a
-
SHA256
60b90d95244ff7150826ab96162a32269429ffca7d02ab33306b131db33f2211
-
SHA512
35e1aa05decacdc41b69c31b2500a6fa02ff0bf38da96162a8cef4869871a35be34a2a50ba1161a2997413c2d4b41f3de3750e38aed9b920912962d66e628487
-
SSDEEP
3072:QP8fomAU/fGRFKWJ8pypVcfjXOCHXMem1GVMm++53YlFYAFI:QYAxFRynfTOCH8eUMU+RiS
Malware Config
Signatures
-
KPOT Core Executable 2 IoCs
resource yara_rule behavioral2/memory/4476-11-0x0000000000400000-0x0000000000460000-memory.dmp family_kpot behavioral2/memory/4476-13-0x0000000000400000-0x0000000000460000-memory.dmp family_kpot -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation 70ff5016cfd237faef1b9f7c3f3d6c5b_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\win.ini 70ff5016cfd237faef1b9f7c3f3d6c5b_JaffaCakes118.exe File opened for modification C:\Windows\win.ini 70ff5016cfd237faef1b9f7c3f3d6c5b_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 70ff5016cfd237faef1b9f7c3f3d6c5b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 70ff5016cfd237faef1b9f7c3f3d6c5b_JaffaCakes118.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5108 cmd.exe 688 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 688 PING.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3512 70ff5016cfd237faef1b9f7c3f3d6c5b_JaffaCakes118.exe 4476 70ff5016cfd237faef1b9f7c3f3d6c5b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3512 wrote to memory of 4476 3512 70ff5016cfd237faef1b9f7c3f3d6c5b_JaffaCakes118.exe 91 PID 3512 wrote to memory of 4476 3512 70ff5016cfd237faef1b9f7c3f3d6c5b_JaffaCakes118.exe 91 PID 3512 wrote to memory of 4476 3512 70ff5016cfd237faef1b9f7c3f3d6c5b_JaffaCakes118.exe 91 PID 4476 wrote to memory of 5108 4476 70ff5016cfd237faef1b9f7c3f3d6c5b_JaffaCakes118.exe 95 PID 4476 wrote to memory of 5108 4476 70ff5016cfd237faef1b9f7c3f3d6c5b_JaffaCakes118.exe 95 PID 4476 wrote to memory of 5108 4476 70ff5016cfd237faef1b9f7c3f3d6c5b_JaffaCakes118.exe 95 PID 5108 wrote to memory of 688 5108 cmd.exe 97 PID 5108 wrote to memory of 688 5108 cmd.exe 97 PID 5108 wrote to memory of 688 5108 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\70ff5016cfd237faef1b9f7c3f3d6c5b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\70ff5016cfd237faef1b9f7c3f3d6c5b_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\70ff5016cfd237faef1b9f7c3f3d6c5b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\70ff5016cfd237faef1b9f7c3f3d6c5b_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\70ff5016cfd237faef1b9f7c3f3d6c5b_JaffaCakes118.exe"3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:688
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
123B
MD56bf517432f65eb7f0d18d574bf14124c
SHA15b9f37c1dd1318ebbec3bd2f07c109eb9d22c727
SHA2566e2b70dfccabf3cc651545676a3a566c9cfae03f15f772886646abce1da35b46
SHA5127b0cb8c20034585ec8bf4b45eda5eda5993a56e24931a7426dc5a9f081ec1f82545f3e26a48a4df885c8691fc6e8026d0808aebe3cc3358ba85ddca08ac4cb06