Analysis
-
max time kernel
98s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 22:41
Static task
static1
Behavioral task
behavioral1
Sample
8203adbdf5c3fb50ef27b7aa46cf44d6_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
8203adbdf5c3fb50ef27b7aa46cf44d6_JaffaCakes118.exe
-
Size
252KB
-
MD5
8203adbdf5c3fb50ef27b7aa46cf44d6
-
SHA1
38608cc76c00e046908cd8d35a658fd28568b2c8
-
SHA256
b1f3b16016bc11788a7a94d89df8a145cbfe9d7110a4f333d7482f817d2db8cf
-
SHA512
b5504dce532eb331ec500c1e1fdf59c2e38c1e957ff9bd984d7f363d9de75f1125ed2c80ecf2adbb0b65a0e9b4e78234b1e97e8fa3ba7ba41ab986926703b677
-
SSDEEP
6144:T5QpeUUeSwGUTPcdBMsXS593xRExRYnzCvY:KpeUlCUTPcdBHSfGRdvY
Malware Config
Signatures
-
KPOT Core Executable 3 IoCs
resource yara_rule behavioral2/memory/540-2-0x0000000000400000-0x0000000000418000-memory.dmp family_kpot behavioral2/memory/540-3-0x0000000000400000-0x0000000000418000-memory.dmp family_kpot behavioral2/memory/540-4-0x0000000000400000-0x0000000000418000-memory.dmp family_kpot -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2721909339-1374969515-2476821579-1000\Control Panel\International\Geo\Nation 8203adbdf5c3fb50ef27b7aa46cf44d6_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3188 set thread context of 540 3188 8203adbdf5c3fb50ef27b7aa46cf44d6_JaffaCakes118.exe 85 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8203adbdf5c3fb50ef27b7aa46cf44d6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8203adbdf5c3fb50ef27b7aa46cf44d6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 388 cmd.exe 4364 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4364 PING.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3188 8203adbdf5c3fb50ef27b7aa46cf44d6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3188 wrote to memory of 540 3188 8203adbdf5c3fb50ef27b7aa46cf44d6_JaffaCakes118.exe 85 PID 3188 wrote to memory of 540 3188 8203adbdf5c3fb50ef27b7aa46cf44d6_JaffaCakes118.exe 85 PID 3188 wrote to memory of 540 3188 8203adbdf5c3fb50ef27b7aa46cf44d6_JaffaCakes118.exe 85 PID 3188 wrote to memory of 540 3188 8203adbdf5c3fb50ef27b7aa46cf44d6_JaffaCakes118.exe 85 PID 3188 wrote to memory of 540 3188 8203adbdf5c3fb50ef27b7aa46cf44d6_JaffaCakes118.exe 85 PID 3188 wrote to memory of 540 3188 8203adbdf5c3fb50ef27b7aa46cf44d6_JaffaCakes118.exe 85 PID 3188 wrote to memory of 540 3188 8203adbdf5c3fb50ef27b7aa46cf44d6_JaffaCakes118.exe 85 PID 3188 wrote to memory of 540 3188 8203adbdf5c3fb50ef27b7aa46cf44d6_JaffaCakes118.exe 85 PID 540 wrote to memory of 388 540 8203adbdf5c3fb50ef27b7aa46cf44d6_JaffaCakes118.exe 86 PID 540 wrote to memory of 388 540 8203adbdf5c3fb50ef27b7aa46cf44d6_JaffaCakes118.exe 86 PID 540 wrote to memory of 388 540 8203adbdf5c3fb50ef27b7aa46cf44d6_JaffaCakes118.exe 86 PID 388 wrote to memory of 4364 388 cmd.exe 88 PID 388 wrote to memory of 4364 388 cmd.exe 88 PID 388 wrote to memory of 4364 388 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\8203adbdf5c3fb50ef27b7aa46cf44d6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8203adbdf5c3fb50ef27b7aa46cf44d6_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\8203adbdf5c3fb50ef27b7aa46cf44d6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8203adbdf5c3fb50ef27b7aa46cf44d6_JaffaCakes118.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\8203adbdf5c3fb50ef27b7aa46cf44d6_JaffaCakes118.exe"3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4364
-
-
-