General

  • Target

    JaffaCakes118_8c0afd40d1eaf4dbd91bacaf28849074

  • Size

    644KB

  • Sample

    250329-vpczyazygw

  • MD5

    8c0afd40d1eaf4dbd91bacaf28849074

  • SHA1

    2f40d165f1d3961237197f7e454b5fb52c74fad4

  • SHA256

    16c93fc1a426856cff62d7a99f8ae5e41442222861a72ca0ede3ecbaf54642e8

  • SHA512

    e0e54076624aa6f318401d6673f2cdba1aa1134bfe7d3bbcc557dc2aca9113189dcee4e06cbc99bec05cbebc3a5bf151f32904d737a2ef9335e35f69872b4097

  • SSDEEP

    12288:Q6onxOp8FySpE5zvIdtU+YmefT9/mqOplf2AQNWxgqFjj:Ewp8DozAdO98fplf2MJ

Malware Config

Targets

    • Target

      JaffaCakes118_8c0afd40d1eaf4dbd91bacaf28849074

    • Size

      644KB

    • MD5

      8c0afd40d1eaf4dbd91bacaf28849074

    • SHA1

      2f40d165f1d3961237197f7e454b5fb52c74fad4

    • SHA256

      16c93fc1a426856cff62d7a99f8ae5e41442222861a72ca0ede3ecbaf54642e8

    • SHA512

      e0e54076624aa6f318401d6673f2cdba1aa1134bfe7d3bbcc557dc2aca9113189dcee4e06cbc99bec05cbebc3a5bf151f32904d737a2ef9335e35f69872b4097

    • SSDEEP

      12288:Q6onxOp8FySpE5zvIdtU+YmefT9/mqOplf2AQNWxgqFjj:Ewp8DozAdO98fplf2MJ

    • Modifies WinLogon for persistence

    • Pykspa

      Pykspa is a worm spreads via Skype uses DGA and it's written in C++.

    • Pykspa family

    • Detect Pykspa worm

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables RegEdit via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Hijack Execution Flow: Executable Installer File Permissions Weakness

      Possible Turn off User Account Control's privilege elevation for standard users.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.