Analysis

  • max time kernel
    4s
  • max time network
    1s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    29/03/2025, 17:53

General

  • Target

    JaffaCakes118_8f6670643f92a191cf11f597cdb31810.exe

  • Size

    1016KB

  • MD5

    8f6670643f92a191cf11f597cdb31810

  • SHA1

    023b749012394dbc5223909a78f43f54dc11da79

  • SHA256

    6164906dbadeb6038df8acdc4bd7359289a3830591707974542964410e684c62

  • SHA512

    82cb5fc2b8a5d0225a55781f428595e71200e27aac90b1fdf1a0fde57985ab4c6d455e0003ab842e0d829214e552b52b21d75e0ff98c86764f61a997a8192bdd

  • SSDEEP

    6144:fNIXsL0tvrSVz1DnemeYbpsnEf78AoXh6KkiD0OofzA+/VygHU:VIXsgtvm1De5YlOx6lzBH46U

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Pykspa

    Pykspa is a worm spreads via Skype uses DGA and it's written in C++.

  • Pykspa family
  • UAC bypass 3 TTPs 3 IoCs
  • Detect Pykspa worm 2 IoCs
  • Adds policy Run key to start application 2 TTPs 3 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Drops file in System32 directory 7 IoCs
  • Drops file in Windows directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • System policy modification 1 TTPs 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8f6670643f92a191cf11f597cdb31810.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8f6670643f92a191cf11f597cdb31810.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2752
    • C:\Users\Admin\AppData\Local\Temp\hrnoqjwarbx.exe
      "C:\Users\Admin\AppData\Local\Temp\hrnoqjwarbx.exe" "c:\users\admin\appdata\local\temp\jaffacakes118_8f6670643f92a191cf11f597cdb31810.exe*"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • System policy modification
      PID:3008
      • C:\Users\Admin\AppData\Local\Temp\eclkq.exe
        "C:\Users\Admin\AppData\Local\Temp\eclkq.exe" "-C:\Users\Admin\AppData\Local\Temp\bkeofwshqiqfgmtr.exe"
        3⤵
          PID:864
        • C:\Users\Admin\AppData\Local\Temp\eclkq.exe
          "C:\Users\Admin\AppData\Local\Temp\eclkq.exe" "-C:\Users\Admin\AppData\Local\Temp\bkeofwshqiqfgmtr.exe"
          3⤵
            PID:1968

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\isnyqifvfyhxzgong.exe

        Filesize

        2KB

        MD5

        90d5ef3c8e36d81c2b901866930867a6

        SHA1

        013a8cee553b5d781e9b96ae387d8d2f07e8c702

        SHA256

        dd4ec0ea60a5e43f5b86ffd59f4fc3925b37426bd4615470cc2496b2017630a2

        SHA512

        34f57b983287c7975a2d780a27a5afdf0ced70818989c611497def841956041643432a700e29a1e9262ea5cad5f590ff4938b79ec5b5c32dd2a72a05e0796461

      • C:\Windows\SysWOW64\isnyqifvfyhxzgong.exe

        Filesize

        256KB

        MD5

        ece171403864cf36efbae21f6766caac

        SHA1

        2d7c7088eda3762564eb67352df7f6a83cdbe2b0

        SHA256

        ee0c9cdba7f3f9e4b1e013c34a09fcd0cda251e8ab1ff8ed2e07f82448c9508a

        SHA512

        eeca8cddcd0ae6adec48eb8960c3f4c22760b2fc109afbd834f51cfab3ea715cab2d6458a613f75cf55818df312d370d72e387ea38cb5d062b42c97480888f05

      • C:\Windows\SysWOW64\rcykdwulwqarucllfq.exe

        Filesize

        1016KB

        MD5

        8f6670643f92a191cf11f597cdb31810

        SHA1

        023b749012394dbc5223909a78f43f54dc11da79

        SHA256

        6164906dbadeb6038df8acdc4bd7359289a3830591707974542964410e684c62

        SHA512

        82cb5fc2b8a5d0225a55781f428595e71200e27aac90b1fdf1a0fde57985ab4c6d455e0003ab842e0d829214e552b52b21d75e0ff98c86764f61a997a8192bdd

      • C:\Windows\SysWOW64\rcykdwulwqarucllfq.exe

        Filesize

        768KB

        MD5

        edce101e39515691d023d79247384c6e

        SHA1

        8173db78a6cb08c4d99b09d6f7d60fdcf3b0ecdd

        SHA256

        98a2e5ac9c2e2e198750279e1b125a7c6e0793c85b3dd71ae18516c04f020f2f

        SHA512

        5c4ba12386806fefa0ab879fa50719e273dce251d553d53ce0be36bbe912cfb256157ea7d141906b328b305002eb8b257feb5a3a321b86cd67d92944bcccbadb

      • \Users\Admin\AppData\Local\Temp\eclkq.exe

        Filesize

        716KB

        MD5

        6d3af01b904a484fae5484db4da1e8d3

        SHA1

        ba2f4e387e19acd82153b4087c569d1a07074f52

        SHA256

        6bda171d1f1decf41fdad52181f9d12fa9d3db9d1f2d080e10d6a503686c9a70

        SHA512

        833605f1508f47c35432cf4c6d50b20f5beb5190ddc536155c04413902cb8d92077bd723d8eb963dd46e71928aaa31723481b359f0d4d7ca9051251b4b78c5ce

      • \Users\Admin\AppData\Local\Temp\hrnoqjwarbx.exe

        Filesize

        320KB

        MD5

        83e38817548a592599a6ed38357d859c

        SHA1

        3dda28168309ca0ac2782410dd6803da92814b32

        SHA256

        fad88db1dab96adc7c0e46112f88fe5701ebeb44369c79d14252d4ff24bc5f33

        SHA512

        9176f0f614ea3bf704996bd84f9865505b838e9bd762f3c1eb7986ab2f5e1dc043f5ce1cf136abf5bf8090b2fcc6f3f2f1182b31950186e2fd3c2120302c755a