Analysis
-
max time kernel
4s -
max time network
1s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
29/03/2025, 17:53
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8f6670643f92a191cf11f597cdb31810.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8f6670643f92a191cf11f597cdb31810.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_8f6670643f92a191cf11f597cdb31810.exe
-
Size
1016KB
-
MD5
8f6670643f92a191cf11f597cdb31810
-
SHA1
023b749012394dbc5223909a78f43f54dc11da79
-
SHA256
6164906dbadeb6038df8acdc4bd7359289a3830591707974542964410e684c62
-
SHA512
82cb5fc2b8a5d0225a55781f428595e71200e27aac90b1fdf1a0fde57985ab4c6d455e0003ab842e0d829214e552b52b21d75e0ff98c86764f61a997a8192bdd
-
SSDEEP
6144:fNIXsL0tvrSVz1DnemeYbpsnEf78AoXh6KkiD0OofzA+/VygHU:VIXsgtvm1De5YlOx6lzBH46U
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" hrnoqjwarbx.exe -
Pykspa family
-
UAC bypass 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" hrnoqjwarbx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" hrnoqjwarbx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" hrnoqjwarbx.exe -
Detect Pykspa worm 2 IoCs
resource yara_rule behavioral1/files/0x000c000000012243-2.dat family_pykspa behavioral1/files/0x000500000001a07e-61.dat family_pykspa -
Adds policy Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\wapugsjtxkn = "isnyqifvfyhxzgong.exe" hrnoqjwarbx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rsegpymt = "C:\\Users\\Admin\\AppData\\Local\\Temp\\isnyqifvfyhxzgong.exe" hrnoqjwarbx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run hrnoqjwarbx.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" hrnoqjwarbx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" hrnoqjwarbx.exe -
Executes dropped EXE 1 IoCs
pid Process 3008 hrnoqjwarbx.exe -
Loads dropped DLL 2 IoCs
pid Process 2752 JaffaCakes118_8f6670643f92a191cf11f597cdb31810.exe 2752 JaffaCakes118_8f6670643f92a191cf11f597cdb31810.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\sypwkyrdjydpn = "rcykdwulwqarucllfq.exe ." hrnoqjwarbx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wexgwmhvdubppua = "C:\\Users\\Admin\\AppData\\Local\\Temp\\colysmldpkvnraklgsg.exe" hrnoqjwarbx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tasapeylsiobae = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bkeofwshqiqfgmtr.exe ." hrnoqjwarbx.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\ikxakujrt = "C:\\Users\\Admin\\AppData\\Local\\Temp\\isnyqifvfyhxzgong.exe" hrnoqjwarbx.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\beswhsirug = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bkeofwshqiqfgmtr.exe ." hrnoqjwarbx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ikxakujrt = "esrgcyztherlrcorocsgf.exe" hrnoqjwarbx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\beswhsirug = "rcykdwulwqarucllfq.exe ." hrnoqjwarbx.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\tyouhumxcquf = "isnyqifvfyhxzgong.exe" hrnoqjwarbx.exe -
Checks whether UAC is enabled 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" hrnoqjwarbx.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA hrnoqjwarbx.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\bkeofwshqiqfgmtr.exe hrnoqjwarbx.exe File opened for modification C:\Windows\SysWOW64\isnyqifvfyhxzgong.exe hrnoqjwarbx.exe File opened for modification C:\Windows\SysWOW64\rcykdwulwqarucllfq.exe hrnoqjwarbx.exe File opened for modification C:\Windows\SysWOW64\colysmldpkvnraklgsg.exe hrnoqjwarbx.exe File opened for modification C:\Windows\SysWOW64\pcaojeexkgslqalnjwly.exe hrnoqjwarbx.exe File opened for modification C:\Windows\SysWOW64\esrgcyztherlrcorocsgf.exe hrnoqjwarbx.exe File opened for modification C:\Windows\SysWOW64\vkkaxuwrgesnugtxvkbqqg.exe hrnoqjwarbx.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\pcaojeexkgslqalnjwly.exe hrnoqjwarbx.exe File opened for modification C:\Windows\esrgcyztherlrcorocsgf.exe hrnoqjwarbx.exe File opened for modification C:\Windows\vkkaxuwrgesnugtxvkbqqg.exe hrnoqjwarbx.exe File opened for modification C:\Windows\bkeofwshqiqfgmtr.exe hrnoqjwarbx.exe File opened for modification C:\Windows\isnyqifvfyhxzgong.exe hrnoqjwarbx.exe File opened for modification C:\Windows\rcykdwulwqarucllfq.exe hrnoqjwarbx.exe File opened for modification C:\Windows\colysmldpkvnraklgsg.exe hrnoqjwarbx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8f6670643f92a191cf11f597cdb31810.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hrnoqjwarbx.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2752 JaffaCakes118_8f6670643f92a191cf11f597cdb31810.exe 2752 JaffaCakes118_8f6670643f92a191cf11f597cdb31810.exe 2752 JaffaCakes118_8f6670643f92a191cf11f597cdb31810.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2752 wrote to memory of 3008 2752 JaffaCakes118_8f6670643f92a191cf11f597cdb31810.exe 30 PID 2752 wrote to memory of 3008 2752 JaffaCakes118_8f6670643f92a191cf11f597cdb31810.exe 30 PID 2752 wrote to memory of 3008 2752 JaffaCakes118_8f6670643f92a191cf11f597cdb31810.exe 30 PID 2752 wrote to memory of 3008 2752 JaffaCakes118_8f6670643f92a191cf11f597cdb31810.exe 30 -
System policy modification 1 TTPs 5 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" hrnoqjwarbx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" hrnoqjwarbx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" hrnoqjwarbx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" hrnoqjwarbx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System hrnoqjwarbx.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8f6670643f92a191cf11f597cdb31810.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8f6670643f92a191cf11f597cdb31810.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\hrnoqjwarbx.exe"C:\Users\Admin\AppData\Local\Temp\hrnoqjwarbx.exe" "c:\users\admin\appdata\local\temp\jaffacakes118_8f6670643f92a191cf11f597cdb31810.exe*"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- System policy modification
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\eclkq.exe"C:\Users\Admin\AppData\Local\Temp\eclkq.exe" "-C:\Users\Admin\AppData\Local\Temp\bkeofwshqiqfgmtr.exe"3⤵PID:864
-
-
C:\Users\Admin\AppData\Local\Temp\eclkq.exe"C:\Users\Admin\AppData\Local\Temp\eclkq.exe" "-C:\Users\Admin\AppData\Local\Temp\bkeofwshqiqfgmtr.exe"3⤵PID:1968
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD590d5ef3c8e36d81c2b901866930867a6
SHA1013a8cee553b5d781e9b96ae387d8d2f07e8c702
SHA256dd4ec0ea60a5e43f5b86ffd59f4fc3925b37426bd4615470cc2496b2017630a2
SHA51234f57b983287c7975a2d780a27a5afdf0ced70818989c611497def841956041643432a700e29a1e9262ea5cad5f590ff4938b79ec5b5c32dd2a72a05e0796461
-
Filesize
256KB
MD5ece171403864cf36efbae21f6766caac
SHA12d7c7088eda3762564eb67352df7f6a83cdbe2b0
SHA256ee0c9cdba7f3f9e4b1e013c34a09fcd0cda251e8ab1ff8ed2e07f82448c9508a
SHA512eeca8cddcd0ae6adec48eb8960c3f4c22760b2fc109afbd834f51cfab3ea715cab2d6458a613f75cf55818df312d370d72e387ea38cb5d062b42c97480888f05
-
Filesize
1016KB
MD58f6670643f92a191cf11f597cdb31810
SHA1023b749012394dbc5223909a78f43f54dc11da79
SHA2566164906dbadeb6038df8acdc4bd7359289a3830591707974542964410e684c62
SHA51282cb5fc2b8a5d0225a55781f428595e71200e27aac90b1fdf1a0fde57985ab4c6d455e0003ab842e0d829214e552b52b21d75e0ff98c86764f61a997a8192bdd
-
Filesize
768KB
MD5edce101e39515691d023d79247384c6e
SHA18173db78a6cb08c4d99b09d6f7d60fdcf3b0ecdd
SHA25698a2e5ac9c2e2e198750279e1b125a7c6e0793c85b3dd71ae18516c04f020f2f
SHA5125c4ba12386806fefa0ab879fa50719e273dce251d553d53ce0be36bbe912cfb256157ea7d141906b328b305002eb8b257feb5a3a321b86cd67d92944bcccbadb
-
Filesize
716KB
MD56d3af01b904a484fae5484db4da1e8d3
SHA1ba2f4e387e19acd82153b4087c569d1a07074f52
SHA2566bda171d1f1decf41fdad52181f9d12fa9d3db9d1f2d080e10d6a503686c9a70
SHA512833605f1508f47c35432cf4c6d50b20f5beb5190ddc536155c04413902cb8d92077bd723d8eb963dd46e71928aaa31723481b359f0d4d7ca9051251b4b78c5ce
-
Filesize
320KB
MD583e38817548a592599a6ed38357d859c
SHA13dda28168309ca0ac2782410dd6803da92814b32
SHA256fad88db1dab96adc7c0e46112f88fe5701ebeb44369c79d14252d4ff24bc5f33
SHA5129176f0f614ea3bf704996bd84f9865505b838e9bd762f3c1eb7986ab2f5e1dc043f5ce1cf136abf5bf8090b2fcc6f3f2f1182b31950186e2fd3c2120302c755a