Analysis

  • max time kernel
    3s
  • max time network
    0s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    29/03/2025, 18:15

General

  • Target

    JaffaCakes118_90ac8e58b702c30eb1b23a50795b14c5.exe

  • Size

    476KB

  • MD5

    90ac8e58b702c30eb1b23a50795b14c5

  • SHA1

    b482e2f8c6895620088c3264da1e5ccf08cab41b

  • SHA256

    1b1f772b3fba3cc0537b5346915ffbe9668a239a310d9d37e2d938e604cc4adf

  • SHA512

    a7945103dc932cfccf1487bb017a456273bbefd25550ba5dcef276865133cff0ed7ef7064652bb8c9d23606bc4912a5773e115b61d301b2094d15be3185f62f1

  • SSDEEP

    6144:vj6/wndfF/gl0LQIk8DR3dEuAI7pEfxsZozAm9TMdGQLUg1nYmefPImdrionjf44:r6onxOp8FySpE5zvIdtU+Ymefr

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Pykspa

    Pykspa is a worm spreads via Skype uses DGA and it's written in C++.

  • Pykspa family
  • UAC bypass 3 TTPs 3 IoCs
  • Detect Pykspa worm 4 IoCs
  • Adds policy Run key to start application 2 TTPs 3 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Drops file in System32 directory 7 IoCs
  • Drops file in Windows directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • System policy modification 1 TTPs 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_90ac8e58b702c30eb1b23a50795b14c5.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_90ac8e58b702c30eb1b23a50795b14c5.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1592
    • C:\Users\Admin\AppData\Local\Temp\cnrfakasmxb.exe
      "C:\Users\Admin\AppData\Local\Temp\cnrfakasmxb.exe" "c:\users\admin\appdata\local\temp\jaffacakes118_90ac8e58b702c30eb1b23a50795b14c5.exe*"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • System policy modification
      PID:1876
      • C:\Users\Admin\AppData\Local\Temp\tjpvejm.exe
        "C:\Users\Admin\AppData\Local\Temp\tjpvejm.exe" "-C:\Users\Admin\AppData\Local\Temp\srgvnbnaqhlbkdds.exe"
        3⤵
          PID:2848
        • C:\Users\Admin\AppData\Local\Temp\tjpvejm.exe
          "C:\Users\Admin\AppData\Local\Temp\tjpvejm.exe" "-C:\Users\Admin\AppData\Local\Temp\srgvnbnaqhlbkdds.exe"
          3⤵
            PID:2700

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\mrmhfzrkgdnjyxdyzcsxsn.exe

        Filesize

        8KB

        MD5

        9b632fb0830180209076304f81bbe4fc

        SHA1

        a67b1abccf5f860a47589ea7fc7d8e6dc77ec38e

        SHA256

        9b2fe5a0ee0271c160429eae39666ad80a68335c5b7828da47a5dd5107605716

        SHA512

        fa7e86efdb10063f01b5bd036dffa70c266cbb9d3dc0ee3138b2978cc008b6299dfaa6878c74904a0e8459be432c4ca111b543b06f04eb0e1e5e1d14b2338d20

      • C:\Users\Admin\AppData\Local\Temp\tjpvejm.exe

        Filesize

        384KB

        MD5

        bfee231a69dbeda3c65cce5d89275cb9

        SHA1

        542e5fbf2098eaee23e90737b31515d37c1024d5

        SHA256

        5f3352a1b75330a646d7bad0d2765fba5e658ac285a6bea317c351497f296f96

        SHA512

        9d3283d8e8877de37b5049e9801bff568cd54a511e393eb68c1b21326a83a0acda178d8cf0090aa4ff859290b49e4a255b7f82f92f025e0f41f39c079d6a8b30

      • C:\Users\Admin\AppData\Local\Temp\tjpvejm.exe

        Filesize

        128KB

        MD5

        031a45312444daeaa32b161dee2f7932

        SHA1

        e274cb26ad99f41d8ca28eb8c3668ce6ec204260

        SHA256

        bbc36ba7a236865676e826a44883d4826dc2fbb0840fb011499ef599297b8512

        SHA512

        9071abbb380ef16375e26edafdb336dae3ad474cb6982a066711ab2d7221e184bb585601f989f23609c8865377e0f6d966242d0d1855ba199abdaa8e6b13d9b4

      • C:\Users\Admin\AppData\Local\Temp\tjpvejm.exe

        Filesize

        512KB

        MD5

        a80a31bcecb4142db31753216a518678

        SHA1

        5bf09367bd6934cff7717a0aed2a2aba9f359e30

        SHA256

        bb4ef174035a934d9cd898cd2e4d477944fad80c542980f0aac04bdf83bb9dfe

        SHA512

        9b8a2abcc9aa13461a045cf3cc26885b82aa67f771046c0a385e06c95864d3f48fd91913decff811cec7b8c5e20ef25578f3a8d1b3e61e30c42ed25d63e4126f

      • C:\Windows\SysWOW64\ijarlbpewpvnytvmji.exe

        Filesize

        476KB

        MD5

        90ac8e58b702c30eb1b23a50795b14c5

        SHA1

        b482e2f8c6895620088c3264da1e5ccf08cab41b

        SHA256

        1b1f772b3fba3cc0537b5346915ffbe9668a239a310d9d37e2d938e604cc4adf

        SHA512

        a7945103dc932cfccf1487bb017a456273bbefd25550ba5dcef276865133cff0ed7ef7064652bb8c9d23606bc4912a5773e115b61d301b2094d15be3185f62f1

      • \Users\Admin\AppData\Local\Temp\cnrfakasmxb.exe

        Filesize

        320KB

        MD5

        5203b6ea0901877fbf2d8d6f6d8d338e

        SHA1

        c803e92561921b38abe13239c1fd85605b570936

        SHA256

        0cc02d34d5fd4cf892fed282f98c1ad3e7dd6159a8877ae5c46d3f834ed36060

        SHA512

        d48a41b4fc4c38a6473f789c02918fb7353a4b4199768a3624f3b685d91d38519887a1ccd3616e0d2b079a346afaec5a0f2ef2c46d72d3097ef561cedb476471

      • \Users\Admin\AppData\Local\Temp\tjpvejm.exe

        Filesize

        704KB

        MD5

        7114129e3d71ff5f1002cabf5d325b64

        SHA1

        41634e14accd901f0d199023a229edb4cb1fb4e7

        SHA256

        ed3c78ad86fa7b2ae96a6330209a52946f689b59af4a34f4df1174b458ef645a

        SHA512

        483cc1cdb5f61a494321c340334168d32078bde7907b1d0128610c8ae05ff01f77ef6ea19ee8c7b65c4b55dcc824cbe0914a9ea9c7259757b3bb654927fff0a2

      • \Users\Admin\AppData\Local\Temp\tjpvejm.exe

        Filesize

        265KB

        MD5

        0f7004d12f03536f117739f396b4244d

        SHA1

        24a656ad3dc57c0392ebdc9d0a7734fe6925f7d0

        SHA256

        bdfc37fb877555cb8a83b90003286561b381c4cea5900c80bd3323fc983f3d48

        SHA512

        7c435cbc600fc7fa3c34ec33fe909bd5b0c15c29ee3caebb68cce6e778514a9c7ebf2e3e751f46196f970464355f5a25ab04de2fa5da6f896c37d015eab97f47