General

  • Target

    JaffaCakes118_8dff3b4a70e2f731ac76b54a2cae9976

  • Size

    760KB

  • Sample

    250329-v6bhfaysgx

  • MD5

    8dff3b4a70e2f731ac76b54a2cae9976

  • SHA1

    918d5bb23fd717a572443e4cbde6b5a5aff5382f

  • SHA256

    fef766aad31029b9fa7a34197dac3e35e0526d9b18e68e02579961117b42cf8f

  • SHA512

    d1bdcd9501ce5ce10989fce29276c587f537817bdb11299bf3a9c1cb0777842372a2c083f860f858eb479926b9f00ae1fecca85b075245a4d5cfe2400897d0c5

  • SSDEEP

    12288:R6onxOp8FySpE5zvIdtU+YmefF88FoTTlkCzGsj:nwp8DozAdO9F2lLz5

Malware Config

Targets

    • Target

      JaffaCakes118_8dff3b4a70e2f731ac76b54a2cae9976

    • Size

      760KB

    • MD5

      8dff3b4a70e2f731ac76b54a2cae9976

    • SHA1

      918d5bb23fd717a572443e4cbde6b5a5aff5382f

    • SHA256

      fef766aad31029b9fa7a34197dac3e35e0526d9b18e68e02579961117b42cf8f

    • SHA512

      d1bdcd9501ce5ce10989fce29276c587f537817bdb11299bf3a9c1cb0777842372a2c083f860f858eb479926b9f00ae1fecca85b075245a4d5cfe2400897d0c5

    • SSDEEP

      12288:R6onxOp8FySpE5zvIdtU+YmefF88FoTTlkCzGsj:nwp8DozAdO9F2lLz5

    • Modifies WinLogon for persistence

    • Pykspa

      Pykspa is a worm spreads via Skype uses DGA and it's written in C++.

    • Pykspa family

    • Detect Pykspa worm

    • Adds policy Run key to start application

    • Blocklisted process makes network request

    • Disables RegEdit via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Hijack Execution Flow: Executable Installer File Permissions Weakness

      Possible Turn off User Account Control's privilege elevation for standard users.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks