Analysis
-
max time kernel
3s -
max time network
1s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/03/2025, 18:18
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_90de3ac81eff9a54a44eb7aca77d1737.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_90de3ac81eff9a54a44eb7aca77d1737.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_90de3ac81eff9a54a44eb7aca77d1737.exe
-
Size
1004KB
-
MD5
90de3ac81eff9a54a44eb7aca77d1737
-
SHA1
ac1c543397b0f5f542302adb4103781bd174df21
-
SHA256
886a6b6fdd213f3b992336fccc96d5afdf409a859575e1a689c4cf506bbe074a
-
SHA512
a557c9a5e5844223a45eb2bbfe27a189b7dfb44371fd82103f6c311ca312c2ddba84744e1fcfcac7ed0fed5e65e27088999134ae5cebac21645781a764f40eaa
-
SSDEEP
6144:/8XXRUw9Oz5+iUU03pej1YpTYzOb0kLXhlJFTaLTGu0yvHcr+JB8aU:knRy+ZyYpaCDJFuPyAHcqrU
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" cxtzfhhamhd.exe -
Pykspa family
-
UAC bypass 3 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" cxtzfhhamhd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cxtzfhhamhd.exe -
Detect Pykspa worm 2 IoCs
resource yara_rule behavioral1/files/0x0033000000011c23-2.dat family_pykspa behavioral1/files/0x0008000000015e47-58.dat family_pykspa -
Adds policy Run key to start application 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run cxtzfhhamhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\mylbmypcryyvt = "lcupfwskeqvxanajqq.exe" cxtzfhhamhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\veobjsgqcg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vkathwqgyillmxip.exe" cxtzfhhamhd.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cxtzfhhamhd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cxtzfhhamhd.exe -
Executes dropped EXE 1 IoCs
pid Process 3064 cxtzfhhamhd.exe -
Loads dropped DLL 2 IoCs
pid Process 2396 JaffaCakes118_90de3ac81eff9a54a44eb7aca77d1737.exe 2396 JaffaCakes118_90de3ac81eff9a54a44eb7aca77d1737.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\vkathwqgyillmxip = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vkathwqgyillmxip.exe ." cxtzfhhamhd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\qalzishsfki = "C:\\Users\\Admin\\AppData\\Local\\Temp\\csjdsidunycdfrdlr.exe" cxtzfhhamhd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\nykzjukwkqpl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wohdumjcxkqtxlzjrsa.exe ." cxtzfhhamhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\qalzishsfki = "vkathwqgyillmxip.exe" cxtzfhhamhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nykzjukwkqpl = "lcupfwskeqvxanajqq.exe ." cxtzfhhamhd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\naofrewkaijhgp = "csjdsidunycdfrdlr.exe" cxtzfhhamhd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\qetlymfuluwvvfp = "vkathwqgyillmxip.exe ." cxtzfhhamhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\csjdsidunycdfrdlr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\csjdsidunycdfrdlr.exe" cxtzfhhamhd.exe -
Checks whether UAC is enabled 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cxtzfhhamhd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cxtzfhhamhd.exe -
Drops file in System32 directory 14 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wohdumjcxkqtxlzjrsa.exe cxtzfhhamhd.exe File opened for modification C:\Windows\SysWOW64\jcwtlecwsgnrwlaluwfy.exe cxtzfhhamhd.exe File opened for modification C:\Windows\SysWOW64\ysnleyxspemrxndpzcmgb.exe cxtzfhhamhd.exe File opened for modification C:\Windows\SysWOW64\pkgfzuuqoentarivgkvqml.exe cxtzfhhamhd.exe File opened for modification C:\Windows\SysWOW64\vkathwqgyillmxip.exe cxtzfhhamhd.exe File created C:\Windows\SysWOW64\csjdsidunycdfrdlr.exe cxtzfhhamhd.exe File created C:\Windows\SysWOW64\wohdumjcxkqtxlzjrsa.exe cxtzfhhamhd.exe File created C:\Windows\SysWOW64\jcwtlecwsgnrwlaluwfy.exe cxtzfhhamhd.exe File created C:\Windows\SysWOW64\ysnleyxspemrxndpzcmgb.exe cxtzfhhamhd.exe File created C:\Windows\SysWOW64\pkgfzuuqoentarivgkvqml.exe cxtzfhhamhd.exe File created C:\Windows\SysWOW64\vkathwqgyillmxip.exe cxtzfhhamhd.exe File opened for modification C:\Windows\SysWOW64\csjdsidunycdfrdlr.exe cxtzfhhamhd.exe File opened for modification C:\Windows\SysWOW64\lcupfwskeqvxanajqq.exe cxtzfhhamhd.exe File created C:\Windows\SysWOW64\lcupfwskeqvxanajqq.exe cxtzfhhamhd.exe -
Drops file in Windows directory 14 IoCs
description ioc Process File created C:\Windows\wohdumjcxkqtxlzjrsa.exe cxtzfhhamhd.exe File opened for modification C:\Windows\jcwtlecwsgnrwlaluwfy.exe cxtzfhhamhd.exe File opened for modification C:\Windows\ysnleyxspemrxndpzcmgb.exe cxtzfhhamhd.exe File opened for modification C:\Windows\pkgfzuuqoentarivgkvqml.exe cxtzfhhamhd.exe File created C:\Windows\vkathwqgyillmxip.exe cxtzfhhamhd.exe File opened for modification C:\Windows\csjdsidunycdfrdlr.exe cxtzfhhamhd.exe File created C:\Windows\csjdsidunycdfrdlr.exe cxtzfhhamhd.exe File opened for modification C:\Windows\lcupfwskeqvxanajqq.exe cxtzfhhamhd.exe File created C:\Windows\jcwtlecwsgnrwlaluwfy.exe cxtzfhhamhd.exe File created C:\Windows\ysnleyxspemrxndpzcmgb.exe cxtzfhhamhd.exe File created C:\Windows\pkgfzuuqoentarivgkvqml.exe cxtzfhhamhd.exe File opened for modification C:\Windows\vkathwqgyillmxip.exe cxtzfhhamhd.exe File created C:\Windows\lcupfwskeqvxanajqq.exe cxtzfhhamhd.exe File opened for modification C:\Windows\wohdumjcxkqtxlzjrsa.exe cxtzfhhamhd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_90de3ac81eff9a54a44eb7aca77d1737.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cxtzfhhamhd.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2396 JaffaCakes118_90de3ac81eff9a54a44eb7aca77d1737.exe 2396 JaffaCakes118_90de3ac81eff9a54a44eb7aca77d1737.exe 2396 JaffaCakes118_90de3ac81eff9a54a44eb7aca77d1737.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2396 wrote to memory of 3064 2396 JaffaCakes118_90de3ac81eff9a54a44eb7aca77d1737.exe 30 PID 2396 wrote to memory of 3064 2396 JaffaCakes118_90de3ac81eff9a54a44eb7aca77d1737.exe 30 PID 2396 wrote to memory of 3064 2396 JaffaCakes118_90de3ac81eff9a54a44eb7aca77d1737.exe 30 PID 2396 wrote to memory of 3064 2396 JaffaCakes118_90de3ac81eff9a54a44eb7aca77d1737.exe 30 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cxtzfhhamhd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cxtzfhhamhd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cxtzfhhamhd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" cxtzfhhamhd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_90de3ac81eff9a54a44eb7aca77d1737.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_90de3ac81eff9a54a44eb7aca77d1737.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\cxtzfhhamhd.exe"C:\Users\Admin\AppData\Local\Temp\cxtzfhhamhd.exe" "c:\users\admin\appdata\local\temp\jaffacakes118_90de3ac81eff9a54a44eb7aca77d1737.exe*"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- System policy modification
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\joudhm.exe"C:\Users\Admin\AppData\Local\Temp\joudhm.exe" "-c:\users\admin\appdata\local\temp\jaffacakes118_90de3ac81eff9a54a44eb7aca77d1737.exe"3⤵PID:2664
-
-
C:\Users\Admin\AppData\Local\Temp\joudhm.exe"C:\Users\Admin\AppData\Local\Temp\joudhm.exe" "-c:\users\admin\appdata\local\temp\jaffacakes118_90de3ac81eff9a54a44eb7aca77d1737.exe"3⤵PID:2660
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1004KB
MD590de3ac81eff9a54a44eb7aca77d1737
SHA1ac1c543397b0f5f542302adb4103781bd174df21
SHA256886a6b6fdd213f3b992336fccc96d5afdf409a859575e1a689c4cf506bbe074a
SHA512a557c9a5e5844223a45eb2bbfe27a189b7dfb44371fd82103f6c311ca312c2ddba84744e1fcfcac7ed0fed5e65e27088999134ae5cebac21645781a764f40eaa
-
Filesize
505KB
MD5ab3ff6e132618dab7fde1198f8aeb4db
SHA111ea1c10c020de6b22d73336bf4855cf6ce96301
SHA256ab944a810b0456c5cfb3e7de65f3b8a096a7594b1d37f4050a3e8e2deb71935e
SHA512cf2e63582eacb58b151cddf2a68d2ecc340f6fff318951d42ecc81f53b3ff1caf45e64d5e193943882588d448e93fda390ecf9ada433e67c4f27b2ec1305345c
-
Filesize
960KB
MD518983cd4e15c7d2dbae1a17cb580c366
SHA1a740a1e005b03ee8bab02d67bc5833d67bfc6376
SHA256040a8c3747a2e506394e22c479185644d45eae5844843e7ea05a77e24108b6f0
SHA51254046ba52560eeef6305025bf2c73ef659a1ff1bbcb0d560168c2fabc6239b4897c280da2fc19fe08021193984b53f22f578fd6a5d8ae9c032285a3089525c40
-
Filesize
308KB
MD585cb856b920e7b0b7b75115336fc2af2
SHA11d1a207efec2f5187583b652c35aef74ee4c473f
SHA2566fff20aabe8265b6e811c9dbcb987f9c15cf07d1d8b80ced7b287d96900f5c62
SHA512120ff9c77c19216e5691b6ba812f09f7db7b46685a391027fff56e5b73200f4211b6bac2c2d28cdfe461d1fbf10f1a3204adeedbd0a34a034a862c6278d901e8
-
Filesize
680KB
MD5e3aec1e0637478b10408791393dba6cc
SHA1ac361de3c5b2af3b76572a8eba79394933104bd4
SHA256b1ff3d025e73b01920ddadafcd5859404a418b2e13acaf0fa589d1dd0285ee09
SHA51289085401f5a9a1141047bc810c872c665fd038906e2b35890bf65be603c72ded4ec44121e735d536931c6013170648b4a19cd35ba3edc1592ec541ba92d7058f