Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 10:57
Static task
static1
Behavioral task
behavioral1
Sample
0dcf19e167be7c6eb6e729f7d01c3435_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0dcf19e167be7c6eb6e729f7d01c3435_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0dcf19e167be7c6eb6e729f7d01c3435_JaffaCakes118.exe
-
Size
256KB
-
MD5
0dcf19e167be7c6eb6e729f7d01c3435
-
SHA1
40a02667cdef6b9098fe8bb515773f7008c83cab
-
SHA256
8af2d892410f68b1239bd33b4e8e90a63d81bc240136aafcc93dce4429d0a255
-
SHA512
64197643d364bb63beb4eef66f9805fac56b0cf174f633843eb75a5947263d5442231a1ce73414d9c1df4cbad99e8037ac336b22e85f371d860b240fe648bcdf
-
SSDEEP
6144:ZlE9AeNGBHzsMBvN8JAi0IpH+QR9g7JkwIJ8l1rbxi:ZlPeazoJc0+Q3g7Jke9
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0dcf19e167be7c6eb6e729f7d01c3435_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1056 pkkmp.exe -
Loads dropped DLL 1 IoCs
pid Process 1056 pkkmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 3600 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2756 PING.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1056 pkkmp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3600 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1056 pkkmp.exe 1056 pkkmp.exe 1056 pkkmp.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1056 pkkmp.exe 1056 pkkmp.exe 1056 pkkmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2684 wrote to memory of 2064 2684 0dcf19e167be7c6eb6e729f7d01c3435_JaffaCakes118.exe 81 PID 2684 wrote to memory of 2064 2684 0dcf19e167be7c6eb6e729f7d01c3435_JaffaCakes118.exe 81 PID 2684 wrote to memory of 2064 2684 0dcf19e167be7c6eb6e729f7d01c3435_JaffaCakes118.exe 81 PID 2064 wrote to memory of 3600 2064 cmd.exe 83 PID 2064 wrote to memory of 3600 2064 cmd.exe 83 PID 2064 wrote to memory of 3600 2064 cmd.exe 83 PID 2064 wrote to memory of 2756 2064 cmd.exe 85 PID 2064 wrote to memory of 2756 2064 cmd.exe 85 PID 2064 wrote to memory of 2756 2064 cmd.exe 85 PID 2064 wrote to memory of 1056 2064 cmd.exe 86 PID 2064 wrote to memory of 1056 2064 cmd.exe 86 PID 2064 wrote to memory of 1056 2064 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\0dcf19e167be7c6eb6e729f7d01c3435_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0dcf19e167be7c6eb6e729f7d01c3435_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /pid 2684 & ping -n 3 127.1 & del /f /q "C:\Users\Admin\AppData\Local\Temp\0dcf19e167be7c6eb6e729f7d01c3435_JaffaCakes118.exe" & start C:\Users\Admin\AppData\Local\pkkmp.exe -f2⤵
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 26843⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3600
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 127.13⤵
- Runs ping.exe
PID:2756
-
-
C:\Users\Admin\AppData\Local\pkkmp.exeC:\Users\Admin\AppData\Local\pkkmp.exe -f3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1056
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD50dcf19e167be7c6eb6e729f7d01c3435
SHA140a02667cdef6b9098fe8bb515773f7008c83cab
SHA2568af2d892410f68b1239bd33b4e8e90a63d81bc240136aafcc93dce4429d0a255
SHA51264197643d364bb63beb4eef66f9805fac56b0cf174f633843eb75a5947263d5442231a1ce73414d9c1df4cbad99e8037ac336b22e85f371d860b240fe648bcdf