Analysis
-
max time kernel
1s -
max time network
0s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/03/2025, 12:12
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8b35c3401f106b86f1ef0d5b0dda2138.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8b35c3401f106b86f1ef0d5b0dda2138.exe
Resource
win10v2004-20250313-en
General
-
Target
JaffaCakes118_8b35c3401f106b86f1ef0d5b0dda2138.exe
-
Size
500KB
-
MD5
8b35c3401f106b86f1ef0d5b0dda2138
-
SHA1
ffc1d2f3894800772a5d9c312c12d47a3f42c57e
-
SHA256
fee5238781445c4ab42965493f89ed336d233e263a2f8e48e18d41cb429c26ac
-
SHA512
f957791dbfe0c12a78a4b8c02f6fda43b47849d485d3919230f711a9ea0e2a3c9fe67debf8ffbe24bc7ab91706695110778448e1429f4fdf1f8500935359605a
-
SSDEEP
12288:2g5pBHxXptbN5ZRgOiBjw/C0AWzFjdTkkXBD:jH7tbrbIBjwuWR1kkxD
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" yxvnauhxihf.exe -
Pykspa family
-
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yxvnauhxihf.exe -
Detect Pykspa worm 1 IoCs
resource yara_rule behavioral1/files/0x0007000000012118-2.dat family_pykspa -
Executes dropped EXE 1 IoCs
pid Process 2000 yxvnauhxihf.exe -
Loads dropped DLL 2 IoCs
pid Process 2384 JaffaCakes118_8b35c3401f106b86f1ef0d5b0dda2138.exe 2384 JaffaCakes118_8b35c3401f106b86f1ef0d5b0dda2138.exe -
Checks whether UAC is enabled 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yxvnauhxihf.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA yxvnauhxihf.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\momifbrrgdjtcfdighsuso.exe yxvnauhxihf.exe File opened for modification C:\Windows\SysWOW64\sogwndnhqhhloldc.exe yxvnauhxihf.exe File opened for modification C:\Windows\SysWOW64\zwpgypavfxydhfyyr.exe yxvnauhxihf.exe File opened for modification C:\Windows\SysWOW64\igasldplwprxcbvwqn.exe yxvnauhxihf.exe File opened for modification C:\Windows\SysWOW64\tsngatgdpjmtzzuwrpx.exe yxvnauhxihf.exe File opened for modification C:\Windows\SysWOW64\ggcwrlzxkfjryzvyutcc.exe yxvnauhxihf.exe File opened for modification C:\Windows\SysWOW64\vwtokfuthdirzbyczzjkh.exe yxvnauhxihf.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\igasldplwprxcbvwqn.exe yxvnauhxihf.exe File opened for modification C:\Windows\tsngatgdpjmtzzuwrpx.exe yxvnauhxihf.exe File opened for modification C:\Windows\ggcwrlzxkfjryzvyutcc.exe yxvnauhxihf.exe File opened for modification C:\Windows\vwtokfuthdirzbyczzjkh.exe yxvnauhxihf.exe File opened for modification C:\Windows\momifbrrgdjtcfdighsuso.exe yxvnauhxihf.exe File opened for modification C:\Windows\sogwndnhqhhloldc.exe yxvnauhxihf.exe File opened for modification C:\Windows\zwpgypavfxydhfyyr.exe yxvnauhxihf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8b35c3401f106b86f1ef0d5b0dda2138.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2384 JaffaCakes118_8b35c3401f106b86f1ef0d5b0dda2138.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2000 2384 JaffaCakes118_8b35c3401f106b86f1ef0d5b0dda2138.exe 30 PID 2384 wrote to memory of 2000 2384 JaffaCakes118_8b35c3401f106b86f1ef0d5b0dda2138.exe 30 PID 2384 wrote to memory of 2000 2384 JaffaCakes118_8b35c3401f106b86f1ef0d5b0dda2138.exe 30 PID 2384 wrote to memory of 2000 2384 JaffaCakes118_8b35c3401f106b86f1ef0d5b0dda2138.exe 30 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System yxvnauhxihf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yxvnauhxihf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8b35c3401f106b86f1ef0d5b0dda2138.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8b35c3401f106b86f1ef0d5b0dda2138.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\yxvnauhxihf.exe"C:\Users\Admin\AppData\Local\Temp\yxvnauhxihf.exe" "c:\users\admin\appdata\local\temp\jaffacakes118_8b35c3401f106b86f1ef0d5b0dda2138.exe*"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System policy modification
PID:2000
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
500KB
MD58b35c3401f106b86f1ef0d5b0dda2138
SHA1ffc1d2f3894800772a5d9c312c12d47a3f42c57e
SHA256fee5238781445c4ab42965493f89ed336d233e263a2f8e48e18d41cb429c26ac
SHA512f957791dbfe0c12a78a4b8c02f6fda43b47849d485d3919230f711a9ea0e2a3c9fe67debf8ffbe24bc7ab91706695110778448e1429f4fdf1f8500935359605a
-
Filesize
320KB
MD5eb09c682903ecbd87f30b0366e008d8f
SHA159b0dc27c06ce536327490439a37751a3dbd5e38
SHA256c4b122f7bab30363b472a3dffb8a7c61604c0ec4719ebd233ccbac8be0951be1
SHA51283236c0955b81375666c10445d2cf5e4723b24e42e4ee5fb951f53945483be2fff5c8ef167f08cfad3accc162c61e750bb1039edbf09e26afe18cba2f994eb5d