General
-
Target
JaffaCakes118_8f5864ea1a5fdaab0f9affd80a8ea064
-
Size
2.3MB
-
Sample
250329-wfx47aszft
-
MD5
8f5864ea1a5fdaab0f9affd80a8ea064
-
SHA1
098ae90fd2d786d8c9a33109ed2963b0495a34e9
-
SHA256
ecb1fe140bd7915b694e41679e055200c280301c08a8ba33bca7ba5d5c34d21b
-
SHA512
2f4af6aa52c36592978d09f7d0e95747e9a438379929d665e5bbcd92bd27087ca2e5f2f5e7242af98460f11452f28903abb6e970574b7fa208be8f5b475e3371
-
SSDEEP
49152:ZYw1afW0l9hPFs8pVyKRdOd2RRHG+CKht+iz5fRrU4tVX:Z8VlHFs8njR8U/CKhssRhtp
Static task
static1
Behavioral task
behavioral1
Sample
assasin terror.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
assasin terror.exe
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
assasin terror.pif
-
Size
456KB
-
MD5
b46ee2dfaa9ff0d313f2961dfed817de
-
SHA1
f0cc165c55eb0cefc228ef74546f2af7bf046dd5
-
SHA256
a10701e1ca478e967fe767382a33025aef1183259e0d1aff990f5f9b34335fb6
-
SHA512
8fe28ea982f48e9d79a0c06b9c17ad0a350c594115bc88a65456feae50b261e196bd886d703e7b4cada1588b205d93492502c3632bba898bb5e2909f5ecfc829
-
SSDEEP
12288:HpUJ3r6YkVwJgNnSykgb9cqWnw4q6ZmFhqse:HpUNr6YkVRFkgbeqeo68Fhq/
-
Modifies WinLogon for persistence
-
Pykspa family
-
UAC bypass
-
Detect Pykspa worm
-
Adds policy Run key to start application
-
Disables RegEdit via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Impair Defenses: Safe Mode Boot
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Hijack Execution Flow: Executable Installer File Permissions Weakness
Possible Turn off User Account Control's privilege elevation for standard users.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Impair Defenses
2Disable or Modify Tools
1Safe Mode Boot
1Modify Registry
5