Analysis
-
max time kernel
3s -
max time network
0s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
29/03/2025, 18:15
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_90ac8e58b702c30eb1b23a50795b14c5.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_90ac8e58b702c30eb1b23a50795b14c5.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_90ac8e58b702c30eb1b23a50795b14c5.exe
-
Size
476KB
-
MD5
90ac8e58b702c30eb1b23a50795b14c5
-
SHA1
b482e2f8c6895620088c3264da1e5ccf08cab41b
-
SHA256
1b1f772b3fba3cc0537b5346915ffbe9668a239a310d9d37e2d938e604cc4adf
-
SHA512
a7945103dc932cfccf1487bb017a456273bbefd25550ba5dcef276865133cff0ed7ef7064652bb8c9d23606bc4912a5773e115b61d301b2094d15be3185f62f1
-
SSDEEP
6144:vj6/wndfF/gl0LQIk8DR3dEuAI7pEfxsZozAm9TMdGQLUg1nYmefPImdrionjf44:r6onxOp8FySpE5zvIdtU+Ymefr
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" cnrfakasmxb.exe -
Pykspa family
-
UAC bypass 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cnrfakasmxb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" cnrfakasmxb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" cnrfakasmxb.exe -
Detect Pykspa worm 4 IoCs
resource yara_rule behavioral1/files/0x000c00000001202c-2.dat family_pykspa behavioral1/files/0x0005000000019c50-61.dat family_pykspa behavioral1/files/0x0005000000019c50-65.dat family_pykspa behavioral1/files/0x0005000000019c50-76.dat family_pykspa -
Adds policy Run key to start application 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run cnrfakasmxb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\kfqbpzhqcppb = "vztnkdumhdmhvtyssujnh.exe" cnrfakasmxb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\zrzhszekt = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vztnkdumhdmhvtyssujnh.exe" cnrfakasmxb.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cnrfakasmxb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cnrfakasmxb.exe -
Executes dropped EXE 1 IoCs
pid Process 1876 cnrfakasmxb.exe -
Loads dropped DLL 2 IoCs
pid Process 1592 JaffaCakes118_90ac8e58b702c30eb1b23a50795b14c5.exe 1592 JaffaCakes118_90ac8e58b702c30eb1b23a50795b14c5.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\nhrboxemxji = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tvnfargwpjqjvrumkkx.exe ." cnrfakasmxb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\sludpxdkuf = "srgvnbnaqhlbkdds.exe" cnrfakasmxb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nhrboxemxji = "ijarlbpewpvnytvmji.exe ." cnrfakasmxb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\jfrdsdmwjxylr = "ijarlbpewpvnytvmji.exe" cnrfakasmxb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\khuhxjteshjxev = "srgvnbnaqhlbkdds.exe ." cnrfakasmxb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\srgvnbnaqhlbkdds = "C:\\Users\\Admin\\AppData\\Local\\Temp\\srgvnbnaqhlbkdds.exe" cnrfakasmxb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nlznercodtwltlk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vztnkdumhdmhvtyssujnh.exe ." cnrfakasmxb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\sludpxdkuf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\gjcvrjzqkfnhurvonocf.exe" cnrfakasmxb.exe -
Checks whether UAC is enabled 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cnrfakasmxb.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cnrfakasmxb.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\tvnfargwpjqjvrumkkx.exe cnrfakasmxb.exe File opened for modification C:\Windows\SysWOW64\gjcvrjzqkfnhurvonocf.exe cnrfakasmxb.exe File opened for modification C:\Windows\SysWOW64\vztnkdumhdmhvtyssujnh.exe cnrfakasmxb.exe File opened for modification C:\Windows\SysWOW64\mrmhfzrkgdnjyxdyzcsxsn.exe cnrfakasmxb.exe File opened for modification C:\Windows\SysWOW64\srgvnbnaqhlbkdds.exe cnrfakasmxb.exe File opened for modification C:\Windows\SysWOW64\zzpfynaofxctdxyok.exe cnrfakasmxb.exe File opened for modification C:\Windows\SysWOW64\ijarlbpewpvnytvmji.exe cnrfakasmxb.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\vztnkdumhdmhvtyssujnh.exe cnrfakasmxb.exe File opened for modification C:\Windows\mrmhfzrkgdnjyxdyzcsxsn.exe cnrfakasmxb.exe File opened for modification C:\Windows\srgvnbnaqhlbkdds.exe cnrfakasmxb.exe File opened for modification C:\Windows\zzpfynaofxctdxyok.exe cnrfakasmxb.exe File opened for modification C:\Windows\ijarlbpewpvnytvmji.exe cnrfakasmxb.exe File opened for modification C:\Windows\tvnfargwpjqjvrumkkx.exe cnrfakasmxb.exe File opened for modification C:\Windows\gjcvrjzqkfnhurvonocf.exe cnrfakasmxb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_90ac8e58b702c30eb1b23a50795b14c5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cnrfakasmxb.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1592 JaffaCakes118_90ac8e58b702c30eb1b23a50795b14c5.exe 1592 JaffaCakes118_90ac8e58b702c30eb1b23a50795b14c5.exe 1592 JaffaCakes118_90ac8e58b702c30eb1b23a50795b14c5.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1592 wrote to memory of 1876 1592 JaffaCakes118_90ac8e58b702c30eb1b23a50795b14c5.exe 30 PID 1592 wrote to memory of 1876 1592 JaffaCakes118_90ac8e58b702c30eb1b23a50795b14c5.exe 30 PID 1592 wrote to memory of 1876 1592 JaffaCakes118_90ac8e58b702c30eb1b23a50795b14c5.exe 30 PID 1592 wrote to memory of 1876 1592 JaffaCakes118_90ac8e58b702c30eb1b23a50795b14c5.exe 30 -
System policy modification 1 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cnrfakasmxb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cnrfakasmxb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cnrfakasmxb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" cnrfakasmxb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" cnrfakasmxb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_90ac8e58b702c30eb1b23a50795b14c5.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_90ac8e58b702c30eb1b23a50795b14c5.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\cnrfakasmxb.exe"C:\Users\Admin\AppData\Local\Temp\cnrfakasmxb.exe" "c:\users\admin\appdata\local\temp\jaffacakes118_90ac8e58b702c30eb1b23a50795b14c5.exe*"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- System policy modification
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\tjpvejm.exe"C:\Users\Admin\AppData\Local\Temp\tjpvejm.exe" "-C:\Users\Admin\AppData\Local\Temp\srgvnbnaqhlbkdds.exe"3⤵PID:2848
-
-
C:\Users\Admin\AppData\Local\Temp\tjpvejm.exe"C:\Users\Admin\AppData\Local\Temp\tjpvejm.exe" "-C:\Users\Admin\AppData\Local\Temp\srgvnbnaqhlbkdds.exe"3⤵PID:2700
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD59b632fb0830180209076304f81bbe4fc
SHA1a67b1abccf5f860a47589ea7fc7d8e6dc77ec38e
SHA2569b2fe5a0ee0271c160429eae39666ad80a68335c5b7828da47a5dd5107605716
SHA512fa7e86efdb10063f01b5bd036dffa70c266cbb9d3dc0ee3138b2978cc008b6299dfaa6878c74904a0e8459be432c4ca111b543b06f04eb0e1e5e1d14b2338d20
-
Filesize
384KB
MD5bfee231a69dbeda3c65cce5d89275cb9
SHA1542e5fbf2098eaee23e90737b31515d37c1024d5
SHA2565f3352a1b75330a646d7bad0d2765fba5e658ac285a6bea317c351497f296f96
SHA5129d3283d8e8877de37b5049e9801bff568cd54a511e393eb68c1b21326a83a0acda178d8cf0090aa4ff859290b49e4a255b7f82f92f025e0f41f39c079d6a8b30
-
Filesize
128KB
MD5031a45312444daeaa32b161dee2f7932
SHA1e274cb26ad99f41d8ca28eb8c3668ce6ec204260
SHA256bbc36ba7a236865676e826a44883d4826dc2fbb0840fb011499ef599297b8512
SHA5129071abbb380ef16375e26edafdb336dae3ad474cb6982a066711ab2d7221e184bb585601f989f23609c8865377e0f6d966242d0d1855ba199abdaa8e6b13d9b4
-
Filesize
512KB
MD5a80a31bcecb4142db31753216a518678
SHA15bf09367bd6934cff7717a0aed2a2aba9f359e30
SHA256bb4ef174035a934d9cd898cd2e4d477944fad80c542980f0aac04bdf83bb9dfe
SHA5129b8a2abcc9aa13461a045cf3cc26885b82aa67f771046c0a385e06c95864d3f48fd91913decff811cec7b8c5e20ef25578f3a8d1b3e61e30c42ed25d63e4126f
-
Filesize
476KB
MD590ac8e58b702c30eb1b23a50795b14c5
SHA1b482e2f8c6895620088c3264da1e5ccf08cab41b
SHA2561b1f772b3fba3cc0537b5346915ffbe9668a239a310d9d37e2d938e604cc4adf
SHA512a7945103dc932cfccf1487bb017a456273bbefd25550ba5dcef276865133cff0ed7ef7064652bb8c9d23606bc4912a5773e115b61d301b2094d15be3185f62f1
-
Filesize
320KB
MD55203b6ea0901877fbf2d8d6f6d8d338e
SHA1c803e92561921b38abe13239c1fd85605b570936
SHA2560cc02d34d5fd4cf892fed282f98c1ad3e7dd6159a8877ae5c46d3f834ed36060
SHA512d48a41b4fc4c38a6473f789c02918fb7353a4b4199768a3624f3b685d91d38519887a1ccd3616e0d2b079a346afaec5a0f2ef2c46d72d3097ef561cedb476471
-
Filesize
704KB
MD57114129e3d71ff5f1002cabf5d325b64
SHA141634e14accd901f0d199023a229edb4cb1fb4e7
SHA256ed3c78ad86fa7b2ae96a6330209a52946f689b59af4a34f4df1174b458ef645a
SHA512483cc1cdb5f61a494321c340334168d32078bde7907b1d0128610c8ae05ff01f77ef6ea19ee8c7b65c4b55dcc824cbe0914a9ea9c7259757b3bb654927fff0a2
-
Filesize
265KB
MD50f7004d12f03536f117739f396b4244d
SHA124a656ad3dc57c0392ebdc9d0a7734fe6925f7d0
SHA256bdfc37fb877555cb8a83b90003286561b381c4cea5900c80bd3323fc983f3d48
SHA5127c435cbc600fc7fa3c34ec33fe909bd5b0c15c29ee3caebb68cce6e778514a9c7ebf2e3e751f46196f970464355f5a25ab04de2fa5da6f896c37d015eab97f47