Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/03/2025, 02:42

General

  • Target

    JaffaCakes118_8970327ee75efc6d291e9fa94473fa4e.exe

  • Size

    556KB

  • MD5

    8970327ee75efc6d291e9fa94473fa4e

  • SHA1

    dce4a0d459b277c8ecf8edd903910ea4bac15769

  • SHA256

    439ce0019a7fb62b9832175f3504fad7aaa7c9d1b3cc765da31316dbfcb45168

  • SHA512

    6d29535c57788756521fc0a65d7b354e6e18968454f7b8f7171813207b3dba743f67d53f33f98c790986951126e8e13174664ab9bd67bdcdf2104b399e25eb1f

  • SSDEEP

    6144:Sj6/wndfF/gl0LQIk8DR3dEuAI7pEfxsZozAm9TMdGQLUg1nYmefPImdrionr:A6onxOp8FySpE5zvIdtU+Ymef

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 4 IoCs
  • Pykspa

    Pykspa is a worm spreads via Skype uses DGA and it's written in C++.

  • Pykspa family
  • UAC bypass 3 TTPs 13 IoCs
  • Detect Pykspa worm 2 IoCs
  • Adds policy Run key to start application 2 TTPs 24 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Impair Defenses: Safe Mode Boot 1 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 64 IoCs
  • Checks whether UAC is enabled 1 TTPs 8 IoCs
  • Hijack Execution Flow: Executable Installer File Permissions Weakness 1 TTPs 3 IoCs

    Possible Turn off User Account Control's privilege elevation for standard users.

  • Looks up external IP address via web service 6 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 32 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 32 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • System policy modification 1 TTPs 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8970327ee75efc6d291e9fa94473fa4e.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8970327ee75efc6d291e9fa94473fa4e.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1528
    • C:\Users\Admin\AppData\Local\Temp\whljbuilgrv.exe
      "C:\Users\Admin\AppData\Local\Temp\whljbuilgrv.exe" "c:\users\admin\appdata\local\temp\jaffacakes118_8970327ee75efc6d291e9fa94473fa4e.exe*"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Hijack Execution Flow: Executable Installer File Permissions Weakness
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4888
      • C:\Users\Admin\AppData\Local\Temp\jqbgfm.exe
        "C:\Users\Admin\AppData\Local\Temp\jqbgfm.exe" "-C:\Users\Admin\AppData\Local\Temp\vmhwfwobzhfvehec.exe"
        3⤵
        • Modifies WinLogon for persistence
        • UAC bypass
        • Adds policy Run key to start application
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Impair Defenses: Safe Mode Boot
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Hijack Execution Flow: Executable Installer File Permissions Weakness
        • Drops autorun.inf file
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • System policy modification
        PID:2812
      • C:\Users\Admin\AppData\Local\Temp\jqbgfm.exe
        "C:\Users\Admin\AppData\Local\Temp\jqbgfm.exe" "-C:\Users\Admin\AppData\Local\Temp\vmhwfwobzhfvehec.exe"
        3⤵
        • Modifies WinLogon for persistence
        • UAC bypass
        • Adds policy Run key to start application
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Hijack Execution Flow: Executable Installer File Permissions Weakness
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System policy modification
        PID:4876
    • C:\Users\Admin\AppData\Local\Temp\whljbuilgrv.exe
      "C:\Users\Admin\AppData\Local\Temp\whljbuilgrv.exe" "c:\users\admin\appdata\local\temp\jaffacakes118_8970327ee75efc6d291e9fa94473fa4e.exe"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System policy modification
      PID:4816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\yeosqwdfspchfxjwebkqaecipre.otr

    Filesize

    272B

    MD5

    59d7f592da762a531d73efb0e68487ae

    SHA1

    bb15fa0538351dcc75ab3075deefc4b2727ce867

    SHA256

    bda677235b184e17f5b481342234022c512a26ef088f573bf41073218f14e898

    SHA512

    ad3dd053a44af6da613fa2e5d798e9644532d8259e72d1fdf8795b4490db08246dbfd24920e67b62e5033d55d23c95187f587543e39c5e8ff53b745722881996

  • C:\Program Files (x86)\yeosqwdfspchfxjwebkqaecipre.otr

    Filesize

    272B

    MD5

    35baffdff670dcc3ae2a7597ae391bf0

    SHA1

    d4b415eaf11350514a2f75df6c93a874b9b07d6c

    SHA256

    def67a38f2227ea448cdb5a1eb20c00aa5e90828d78ff1728fcf46fa8ee766e1

    SHA512

    b749bcbe58afbc23520ff1bdadc0e68f7786c22b93f3bdae9e80c225eb683d15ab09e754abe8aeeeee32df326a007a06883d2fa171c9e51aa54c32d5bc66b8d2

  • C:\Program Files (x86)\yeosqwdfspchfxjwebkqaecipre.otr

    Filesize

    272B

    MD5

    60bac387f1b4a0d8081e9ad64e10f0cd

    SHA1

    92fe595ba34f00011afbab1aafa47adf1eedf484

    SHA256

    649fec8fe0d18192dc73085357c198c872cf4ec2daefef9ed3e23fbf29d3e216

    SHA512

    f8c8338fa463c42fbe827274373fdd220bcfc67262113fcd9a6d408192e1e4728089c18595c5de8d50e09534ffb029436f26bfafb0b68cc23a2b413866aed5cf

  • C:\Program Files (x86)\yeosqwdfspchfxjwebkqaecipre.otr

    Filesize

    272B

    MD5

    774f16f6ad4df6d6b324d2bfc5ab41df

    SHA1

    353ecfc1a8d3a061ded958cc6ae68e19c3adb8df

    SHA256

    d54480d41dcc1b1fc825e0d4a0b51c4ea09422cfa236986a1933a78e4166f4ff

    SHA512

    f7f5174bfd2b13f15611ebe29da425042241a638086aec4a82039b34475ec04933f6dababfa886f24b42cfe3de7bd132107315a54ed4152de04415295c6f682e

  • C:\Users\Admin\AppData\Local\Temp\jqbgfm.exe

    Filesize

    712KB

    MD5

    fca5fe4ae6b79f4db7dba39b5b1e7beb

    SHA1

    bfa91f35ae638df1c7ddbecfaeba5fac8fff38f3

    SHA256

    897afb365d65b1b9bb16d157b6b519af150f1b289293151f45e81561b39cba72

    SHA512

    8cca341b314dd021a430e36c55d2c34ad7199b2efe6602ce60acffa6a7ce3a3319fe9a035b14a8a598d5fe96ed3e2c139ce4090e0126a8904dc2f0848bca294a

  • C:\Users\Admin\AppData\Local\Temp\whljbuilgrv.exe

    Filesize

    320KB

    MD5

    5203b6ea0901877fbf2d8d6f6d8d338e

    SHA1

    c803e92561921b38abe13239c1fd85605b570936

    SHA256

    0cc02d34d5fd4cf892fed282f98c1ad3e7dd6159a8877ae5c46d3f834ed36060

    SHA512

    d48a41b4fc4c38a6473f789c02918fb7353a4b4199768a3624f3b685d91d38519887a1ccd3616e0d2b079a346afaec5a0f2ef2c46d72d3097ef561cedb476471

  • C:\Users\Admin\AppData\Local\vmhwfwobzhfvehecvdxojyhyqdbjhxgjgexfzq.aja

    Filesize

    3KB

    MD5

    d98c22d011c54562520a960be8cc05b8

    SHA1

    2fa3e7dca0dea779e2ab847fd2f1bc942bf4bc41

    SHA256

    bff92deb922dd823d5d4571212ed083123f3de1740c5c80535bfb44e00c0d305

    SHA512

    5744f284691ad75598afd92f2681a8d6ce1b203aa5788f64761cdb067662d6a31e4b7496a96864315d2d97082fc331d4a3a564f906f0b0825260ef390a9b6e9f

  • C:\Users\Admin\AppData\Local\yeosqwdfspchfxjwebkqaecipre.otr

    Filesize

    272B

    MD5

    363941d33b8c9d67f6a2d430bd21ba53

    SHA1

    d5c3b51eb045124676168ca264a4206fe83d23ab

    SHA256

    6cbac2ddc6bf4a463e3182f36093bfd6d4159689d9a42ecac080d641675262b3

    SHA512

    b81e795f25eefadf610b81f38d1416568a922599b7735032e3ed33533e29b9f7aa0ed621e4f2c81c43f61f8e7d6296a902021a842c543a9de3e71218d464fc5e

  • C:\Users\Admin\AppData\Local\yeosqwdfspchfxjwebkqaecipre.otr

    Filesize

    272B

    MD5

    3bdd3c9004696f991cd3cd234289b5e0

    SHA1

    94d1ef17fac9a4298bd153659626f8943744aae0

    SHA256

    fde77f7f0a0ecdda30039596bd7634841590dca31f22487db57d9752646b4569

    SHA512

    9b98f85271124a788f908327a5383d7ea42f65048b68631fb2efbcb48a0ea74bd2991836352815ea45e54f13c982c866c5f70f05158d6bc7758793038ee62282

  • C:\Users\Admin\AppData\Local\yeosqwdfspchfxjwebkqaecipre.otr

    Filesize

    272B

    MD5

    4b24a7197ec24f40735b00a5d8a75fba

    SHA1

    e8fe8efca93e87af2050e7fcfc77b372f34aeffa

    SHA256

    2a63839a251712e18952c800e8d71370be949decc0f62de70aded7eab4bd2385

    SHA512

    059eec608bbd8957b972b18eb4089139ec66303c18a0299643a57b759a7d194c8a1ee4fb1464a855e53d910eac48051dbf8daf34252ee1dbc82a585f7234a59e

  • C:\Windows\SysWOW64\lebsdwqffpphsxwwrb.exe

    Filesize

    556KB

    MD5

    8970327ee75efc6d291e9fa94473fa4e

    SHA1

    dce4a0d459b277c8ecf8edd903910ea4bac15769

    SHA256

    439ce0019a7fb62b9832175f3504fad7aaa7c9d1b3cc765da31316dbfcb45168

    SHA512

    6d29535c57788756521fc0a65d7b354e6e18968454f7b8f7171813207b3dba743f67d53f33f98c790986951126e8e13174664ab9bd67bdcdf2104b399e25eb1f

  • C:\cmaikuflc.bat

    Filesize

    556KB

    MD5

    a6ed097f83d63d7b5b640dc2160b2a4d

    SHA1

    38c9b406522f13d25662f4bd49169e5c53298aca

    SHA256

    d66e2a70366f869711df4dbe9f56401a90cfe6911abe14202ba5eeb821d95a31

    SHA512

    61b645b71e7b341d984aae0c3bb9347b8a7ea224bfa35af945dbb751c0939702040136300ddca8e6f6727c274df875303fa0efd446df9971ef3e7715731a4d38