General

  • Target

    JaffaCakes118_8e7dcdbbca7e276cd14b97d88d2b92ca

  • Size

    496KB

  • Sample

    250329-v8wamaztby

  • MD5

    8e7dcdbbca7e276cd14b97d88d2b92ca

  • SHA1

    c1f04482270dd3685f0f4fe90d049bb0b1604614

  • SHA256

    c26f5632fb49cb95cf5f29e95b8973e1a246ba425258a6b4cce07fe00a142bb9

  • SHA512

    6388db8ca9165abee847a5403caa49d4af891ee769a89bdf6930e6b9da25599854c854a8151410ad3fe30fb8b6ce4cb23fa23d7a905b79f9c9c74884d9dfeb09

  • SSDEEP

    6144:yj6/wndfF/gl0LQIk8DR3dEuAI7pEfxsZozAm9TMdGQLUg1nYmefPImdriongp+:g6onxOp8FySpE5zvIdtU+Ymef7

Malware Config

Targets

    • Target

      JaffaCakes118_8e7dcdbbca7e276cd14b97d88d2b92ca

    • Size

      496KB

    • MD5

      8e7dcdbbca7e276cd14b97d88d2b92ca

    • SHA1

      c1f04482270dd3685f0f4fe90d049bb0b1604614

    • SHA256

      c26f5632fb49cb95cf5f29e95b8973e1a246ba425258a6b4cce07fe00a142bb9

    • SHA512

      6388db8ca9165abee847a5403caa49d4af891ee769a89bdf6930e6b9da25599854c854a8151410ad3fe30fb8b6ce4cb23fa23d7a905b79f9c9c74884d9dfeb09

    • SSDEEP

      6144:yj6/wndfF/gl0LQIk8DR3dEuAI7pEfxsZozAm9TMdGQLUg1nYmefPImdriongp+:g6onxOp8FySpE5zvIdtU+Ymef7

    • Modifies WinLogon for persistence

    • Pykspa

      Pykspa is a worm spreads via Skype uses DGA and it's written in C++.

    • Pykspa family

    • Detect Pykspa worm

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables RegEdit via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Hijack Execution Flow: Executable Installer File Permissions Weakness

      Possible Turn off User Account Control's privilege elevation for standard users.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks