Analysis
-
max time kernel
3s -
max time network
5s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
27/03/2025, 14:27
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_89d19bf090f579e04d66ee3035fe64dd.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_89d19bf090f579e04d66ee3035fe64dd.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_89d19bf090f579e04d66ee3035fe64dd.exe
-
Size
564KB
-
MD5
89d19bf090f579e04d66ee3035fe64dd
-
SHA1
ad6c6785bf77d71ddd40a55f01e1b219aebd06d3
-
SHA256
a6afc8a42ff96ee7f475419b54cf84f7ac1296c7cfbea713ab6886fb5a387e29
-
SHA512
b1b6b3b5ebd7afeffc51280b25a42cd1b87c06cedfa012bd3e58eea4a0703eed1f1dde3506374265ac7df4bd1856d5fc0d72fafcfd5694d123b23bed108f462a
-
SSDEEP
12288:4pUJ3r6YkVwJgNnSykgb9cqWnw4q6ZmFhqsD:4pUNr6YkVRFkgbeqeo68Fhqy
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" izfuneuesjp.exe -
Pykspa family
-
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" izfuneuesjp.exe -
Detect Pykspa worm 1 IoCs
resource yara_rule behavioral1/files/0x000d0000000133b8-2.dat family_pykspa -
Executes dropped EXE 1 IoCs
pid Process 2904 izfuneuesjp.exe -
Loads dropped DLL 2 IoCs
pid Process 3056 JaffaCakes118_89d19bf090f579e04d66ee3035fe64dd.exe 3056 JaffaCakes118_89d19bf090f579e04d66ee3035fe64dd.exe -
Checks whether UAC is enabled 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" izfuneuesjp.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA izfuneuesjp.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\bjyrhyshuirnysqm.exe izfuneuesjp.exe File opened for modification C:\Windows\SysWOW64\irhbskfvjyifrmlie.exe izfuneuesjp.exe File opened for modification C:\Windows\SysWOW64\rbsnfyulaqbzmiigdu.exe izfuneuesjp.exe File opened for modification C:\Windows\SysWOW64\cnfbuoldtkwvjghgewg.exe izfuneuesjp.exe File opened for modification C:\Windows\SysWOW64\pburlgexogttigiihalx.exe izfuneuesjp.exe File opened for modification C:\Windows\SysWOW64\erljeaztlestjilmmgsfz.exe izfuneuesjp.exe File opened for modification C:\Windows\SysWOW64\vjedzwwrketvmmqstobpkj.exe izfuneuesjp.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\vjedzwwrketvmmqstobpkj.exe izfuneuesjp.exe File opened for modification C:\Windows\bjyrhyshuirnysqm.exe izfuneuesjp.exe File opened for modification C:\Windows\irhbskfvjyifrmlie.exe izfuneuesjp.exe File opened for modification C:\Windows\rbsnfyulaqbzmiigdu.exe izfuneuesjp.exe File opened for modification C:\Windows\cnfbuoldtkwvjghgewg.exe izfuneuesjp.exe File opened for modification C:\Windows\pburlgexogttigiihalx.exe izfuneuesjp.exe File opened for modification C:\Windows\erljeaztlestjilmmgsfz.exe izfuneuesjp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_89d19bf090f579e04d66ee3035fe64dd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3056 JaffaCakes118_89d19bf090f579e04d66ee3035fe64dd.exe 3056 JaffaCakes118_89d19bf090f579e04d66ee3035fe64dd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2904 3056 JaffaCakes118_89d19bf090f579e04d66ee3035fe64dd.exe 30 PID 3056 wrote to memory of 2904 3056 JaffaCakes118_89d19bf090f579e04d66ee3035fe64dd.exe 30 PID 3056 wrote to memory of 2904 3056 JaffaCakes118_89d19bf090f579e04d66ee3035fe64dd.exe 30 PID 3056 wrote to memory of 2904 3056 JaffaCakes118_89d19bf090f579e04d66ee3035fe64dd.exe 30 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System izfuneuesjp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" izfuneuesjp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_89d19bf090f579e04d66ee3035fe64dd.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_89d19bf090f579e04d66ee3035fe64dd.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\izfuneuesjp.exe"C:\Users\Admin\AppData\Local\Temp\izfuneuesjp.exe" "c:\users\admin\appdata\local\temp\jaffacakes118_89d19bf090f579e04d66ee3035fe64dd.exe*"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System policy modification
PID:2904
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
564KB
MD589d19bf090f579e04d66ee3035fe64dd
SHA1ad6c6785bf77d71ddd40a55f01e1b219aebd06d3
SHA256a6afc8a42ff96ee7f475419b54cf84f7ac1296c7cfbea713ab6886fb5a387e29
SHA512b1b6b3b5ebd7afeffc51280b25a42cd1b87c06cedfa012bd3e58eea4a0703eed1f1dde3506374265ac7df4bd1856d5fc0d72fafcfd5694d123b23bed108f462a
-
Filesize
320KB
MD5977bc0393d37a6e56c095554e321f5df
SHA1b8727d084dece8e01781140b278dc8d7e862f326
SHA256053887c4e84cbc82b26257b32c692f7d91c7e824bf81f36be3db4df4beaa339e
SHA51270b18e6debacc196731f513ff604621158a06cfe76b97968c09d2464e405904abb7b80e2478dde10c1d00c43ec07f3f56aa67cece594e88b7d8f3e3a974bc49e