Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/03/2025, 22:43

General

  • Target

    JaffaCakes118_895a38bc3fc7a0b21cadbf5b306faff7.exe

  • Size

    512KB

  • MD5

    895a38bc3fc7a0b21cadbf5b306faff7

  • SHA1

    30c3c92c4e9fbd61db6dcff4ad1a42a6d5312e09

  • SHA256

    7a093c88448db7ce4e48155a1a14a15ee3f9f850ddd5853c2597869bcdd004ee

  • SHA512

    01bbcd194671e08cbeab90592756cf8c7f8f03248cf99d195986d45006dfc7b2d1e31808887dfcafa9261b1e92b4bf5ecf0afcda3fd279ab8e2173c3e1834d4e

  • SSDEEP

    6144:bXj6/wndfF/gl0LQIk8DR3dEuAI7pEfxsZozAm9TMdGQLUg1nYmefPImdrionXz:bT6onxOp8FySpE5zvIdtU+YmefH

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 4 IoCs
  • Pykspa

    Pykspa is a worm spreads via Skype uses DGA and it's written in C++.

  • Pykspa family
  • UAC bypass 3 TTPs 13 IoCs
  • Detect Pykspa worm 2 IoCs
  • Adds policy Run key to start application 2 TTPs 28 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Impair Defenses: Safe Mode Boot 1 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 64 IoCs
  • Checks whether UAC is enabled 1 TTPs 8 IoCs
  • Hijack Execution Flow: Executable Installer File Permissions Weakness 1 TTPs 3 IoCs

    Possible Turn off User Account Control's privilege elevation for standard users.

  • Looks up external IP address via web service 8 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 32 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 32 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • System policy modification 1 TTPs 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_895a38bc3fc7a0b21cadbf5b306faff7.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_895a38bc3fc7a0b21cadbf5b306faff7.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4556
    • C:\Users\Admin\AppData\Local\Temp\whljbuilgrv.exe
      "C:\Users\Admin\AppData\Local\Temp\whljbuilgrv.exe" "c:\users\admin\appdata\local\temp\jaffacakes118_895a38bc3fc7a0b21cadbf5b306faff7.exe*"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Hijack Execution Flow: Executable Installer File Permissions Weakness
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1828
      • C:\Users\Admin\AppData\Local\Temp\dbomx.exe
        "C:\Users\Admin\AppData\Local\Temp\dbomx.exe" "-C:\Users\Admin\AppData\Local\Temp\ajhqmdtczpforomf.exe"
        3⤵
        • Modifies WinLogon for persistence
        • UAC bypass
        • Adds policy Run key to start application
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Hijack Execution Flow: Executable Installer File Permissions Weakness
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • System policy modification
        PID:1732
      • C:\Users\Admin\AppData\Local\Temp\dbomx.exe
        "C:\Users\Admin\AppData\Local\Temp\dbomx.exe" "-C:\Users\Admin\AppData\Local\Temp\ajhqmdtczpforomf.exe"
        3⤵
        • Modifies WinLogon for persistence
        • UAC bypass
        • Adds policy Run key to start application
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Impair Defenses: Safe Mode Boot
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Hijack Execution Flow: Executable Installer File Permissions Weakness
        • Drops autorun.inf file
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • System policy modification
        PID:3644
    • C:\Users\Admin\AppData\Local\Temp\whljbuilgrv.exe
      "C:\Users\Admin\AppData\Local\Temp\whljbuilgrv.exe" "c:\users\admin\appdata\local\temp\jaffacakes118_895a38bc3fc7a0b21cadbf5b306faff7.exe"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System policy modification
      PID:1524

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\njuqzdgcmpsoeozfamitpycfb.orn

    Filesize

    272B

    MD5

    034d27450754e8943e61fa54d7616588

    SHA1

    28e31c8ee06697652f009c1fc63e95186cb4778d

    SHA256

    cca6f7eb9763961cc786994b211e6b32093659d8bedde69e6b90dd6ec411248a

    SHA512

    26fa571e85e1d75ad1f96df6011c652f91e08eaabe51ca43649d2f611b05b596a968c014cd90749897c36abd89e2e904e001d3cb5b5e8e499f67e1bf032a55db

  • C:\Program Files (x86)\njuqzdgcmpsoeozfamitpycfb.orn

    Filesize

    272B

    MD5

    74ef8ea01f68016e9b6bbb27dc71ae37

    SHA1

    f6274da39ca0bc030afab55e2e21c1025efc7212

    SHA256

    1b53fb7f9edfb4ea344e34b604c5c1cb435ee7589aee858f5b07ad211f7f49f6

    SHA512

    ddbe94af410115c0b205bb7fb9a2808677a85c1e856f60d8c5b6cea651133aad38a0db0879d69d8123142efe84e0667786b0f4cc2d0cfbaaab37c05424297802

  • C:\Program Files (x86)\njuqzdgcmpsoeozfamitpycfb.orn

    Filesize

    272B

    MD5

    8a08116d7c1ba6f7fe622799e00a3942

    SHA1

    590ed9483c54740b0cc054ca3c29ba17aba3255f

    SHA256

    37efd50765863607eab4d31635c1708a82ff70a293ceef02d744ff58753824f9

    SHA512

    287167a1bb3b19168870227f3f5070169e92869fbfc589af03d7e695176481e58fae2a7b1d062cc0b9c286422d2dba38a49787b65c8d9e17224425e61f782b4d

  • C:\Program Files (x86)\njuqzdgcmpsoeozfamitpycfb.orn

    Filesize

    272B

    MD5

    fd8ae2ac72e3ae549a1fbc6dd0f2cdf1

    SHA1

    41b03f822f208d8e364dbc7e545443caa1fded48

    SHA256

    1cdd22b9d063eb6b96c284d9851d79b5895f35b45a286858a420b3b01b3595ae

    SHA512

    bda90642cbe276f54e679421adc70158535fc2da85e229a377fdca9f41a9a1df1849f37ef11c7bf647613e96cd0ac0000211f3d9a41a6bc3edd3ccff9700d56e

  • C:\Program Files (x86)\njuqzdgcmpsoeozfamitpycfb.orn

    Filesize

    272B

    MD5

    b5caea20d5324ad16da706967586c68c

    SHA1

    3d01ed5702a411983f1d341098ec514e7459e8c2

    SHA256

    939a128862f21ff830b71aa94cd7ffecde7b2b1f67a6b841ba1970dc01b8ee72

    SHA512

    11674298e52d4fa6121e2df4bc60301faa7ce8ce4ad406e17db85ce5d5ec01093036d3df06b6813489b40373a2a5d392dd3c8bc528ac7d8df0e553df77a835c4

  • C:\Users\Admin\AppData\Local\Temp\dbomx.exe

    Filesize

    720KB

    MD5

    192215c06f79c5986bd293807cb3f9b4

    SHA1

    7981c4f05052761c7f32b919d939f7d3992203c8

    SHA256

    30d32da06b27b48c646495155bcae71f3cc01464598d60b92fa4f7143eb6271d

    SHA512

    b73e979f49800bdead805209178dc64e7d1ca9e1a9b40915c3c81811e6a4c7e775083cf71f4125ea46ff07f052e04ec801013ddcb7884519534c11be4867b5f3

  • C:\Users\Admin\AppData\Local\Temp\whljbuilgrv.exe

    Filesize

    320KB

    MD5

    5203b6ea0901877fbf2d8d6f6d8d338e

    SHA1

    c803e92561921b38abe13239c1fd85605b570936

    SHA256

    0cc02d34d5fd4cf892fed282f98c1ad3e7dd6159a8877ae5c46d3f834ed36060

    SHA512

    d48a41b4fc4c38a6473f789c02918fb7353a4b4199768a3624f3b685d91d38519887a1ccd3616e0d2b079a346afaec5a0f2ef2c46d72d3097ef561cedb476471

  • C:\Users\Admin\AppData\Local\njuqzdgcmpsoeozfamitpycfb.orn

    Filesize

    272B

    MD5

    17dfb8dfe0e332f6ad75e843496583b7

    SHA1

    03adc9cc31a679f42617ce1fb6c81e9a252e7259

    SHA256

    9b60661604b94ca399c5630f5de3aabde342bad878b2b06996ed752f20426f72

    SHA512

    8341d4dcf1bcd2ddf6a0522bff9ef7aa03b13c3335b9afed2cf045268e00528adf6b9a7b8b4602273d37157238acb291e2c5522f9a9019acf1675abeb9dad9ee

  • C:\Users\Admin\AppData\Local\szvcwlzgbpdklgctzwdzgapdkfthopkgxdah.ket

    Filesize

    3KB

    MD5

    939f110fc2a6bbbd17c75a7e0f08e8b7

    SHA1

    f5fd9651f65c4a76293d2162952ce1ff3634dfb0

    SHA256

    537cde5c4edccf391300c1ec965bc8fcd7be62ad055e0efbfbe9193fbcb82693

    SHA512

    354c7be60a23e452951b517d01bd2e4d8267587f13c1e56a0c0e8a33e57a233975488b8b7916c9aa9dc8f66d2047305c286b17252f98b868247a8addb80e51a3

  • C:\Windows\SysWOW64\qbbmkdvgfxpafeezjk.exe

    Filesize

    512KB

    MD5

    895a38bc3fc7a0b21cadbf5b306faff7

    SHA1

    30c3c92c4e9fbd61db6dcff4ad1a42a6d5312e09

    SHA256

    7a093c88448db7ce4e48155a1a14a15ee3f9f850ddd5853c2597869bcdd004ee

    SHA512

    01bbcd194671e08cbeab90592756cf8c7f8f03248cf99d195986d45006dfc7b2d1e31808887dfcafa9261b1e92b4bf5ecf0afcda3fd279ab8e2173c3e1834d4e

  • C:\advyozjmdn.bat

    Filesize

    656KB

    MD5

    3a5105ff03e7b827b68b650bae59f7ce

    SHA1

    b7dd7f343228e875eaaea019f0751ba5751be9f0

    SHA256

    b5a39772351cbe7f8a5efd9eef8454d86535dbba0d4a600dd9645b7976b88a6c

    SHA512

    99d64f0cc8f94ec3485aec5ca4e2116cfb6a94155a09ce04816d7275b8b91fe056ff3fd17e260a4ff722f3e18b8ccf7a09b6bbdde3609474bda6d2372c0207fc