Analysis
-
max time kernel
3s -
max time network
1s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/03/2025, 19:22
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_948636ee0882cf1b082de9702cc5e984.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_948636ee0882cf1b082de9702cc5e984.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_948636ee0882cf1b082de9702cc5e984.exe
-
Size
600KB
-
MD5
948636ee0882cf1b082de9702cc5e984
-
SHA1
f4a5aff3ab8520517c11f3f052b5eca72c9ab4d6
-
SHA256
d71b6dc6ae5cb09251e78d67a03302292b63af2cb2b95073b19ec2e08faa86bb
-
SHA512
e76d86e75f2d97d0a018c969e616ee7281fb1efc59133c982be45966ee7f06594b12950d23c6d8c6df47cd6af86d9ee88b269d0eff132cfa6be6d6bd0ac26136
-
SSDEEP
6144:qj6/wndfF/gl0LQIk8DR3dEuAI7pEfxsZozAm9TMdGQLUg1nYmefPImdrion:46onxOp8FySpE5zvIdtU+Ymef
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" cxtzfhhamhd.exe -
Pykspa family
-
UAC bypass 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" cxtzfhhamhd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cxtzfhhamhd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" cxtzfhhamhd.exe -
Detect Pykspa worm 2 IoCs
resource yara_rule behavioral1/files/0x00080000000120ff-2.dat family_pykspa behavioral1/files/0x002f000000016dc7-61.dat family_pykspa -
Adds policy Run key to start application 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run cxtzfhhamhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qvahqdjn = "ofwpkjbrstxcrgracqhy.exe" cxtzfhhamhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\dfhlr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dvnhddwnprwcsiuehwoga.exe" cxtzfhhamhd.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cxtzfhhamhd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cxtzfhhamhd.exe -
Executes dropped EXE 1 IoCs
pid Process 2800 cxtzfhhamhd.exe -
Loads dropped DLL 2 IoCs
pid Process 2472 JaffaCakes118_948636ee0882cf1b082de9702cc5e984.exe 2472 JaffaCakes118_948636ee0882cf1b082de9702cc5e984.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ahoxixflct = "brhztrixxxaesgqyzmc.exe ." cxtzfhhamhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\sbkvizjrkdzw = "C:\\Users\\Admin\\AppData\\Local\\Temp\\qfulebrfedfiviryyk.exe" cxtzfhhamhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\vdlvhxgnfxs = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dvnhddwnprwcsiuehwoga.exe ." cxtzfhhamhd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\oruzgr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\brhztrixxxaesgqyzmc.exe" cxtzfhhamhd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\bfjpxjo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dvnhddwnprwcsiuehwoga.exe ." cxtzfhhamhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\oruzgr = "qfulebrfedfiviryyk.exe" cxtzfhhamhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\bfjpxjo = "brhztrixxxaesgqyzmc.exe ." cxtzfhhamhd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\hntblzglb = "ofwpkjbrstxcrgracqhy.exe" cxtzfhhamhd.exe -
Checks whether UAC is enabled 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cxtzfhhamhd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cxtzfhhamhd.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\anapgbpbyvvwhsze.exe cxtzfhhamhd.exe File opened for modification C:\Windows\SysWOW64\hvjzrncpnlmoamuaz.exe cxtzfhhamhd.exe File opened for modification C:\Windows\SysWOW64\qfulebrfedfiviryyk.exe cxtzfhhamhd.exe File opened for modification C:\Windows\SysWOW64\brhztrixxxaesgqyzmc.exe cxtzfhhamhd.exe File opened for modification C:\Windows\SysWOW64\ofwpkjbrstxcrgracqhy.exe cxtzfhhamhd.exe File opened for modification C:\Windows\SysWOW64\dvnhddwnprwcsiuehwoga.exe cxtzfhhamhd.exe File opened for modification C:\Windows\SysWOW64\ungbyztlorxevmzkoexqli.exe cxtzfhhamhd.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\qfulebrfedfiviryyk.exe cxtzfhhamhd.exe File opened for modification C:\Windows\brhztrixxxaesgqyzmc.exe cxtzfhhamhd.exe File opened for modification C:\Windows\ofwpkjbrstxcrgracqhy.exe cxtzfhhamhd.exe File opened for modification C:\Windows\dvnhddwnprwcsiuehwoga.exe cxtzfhhamhd.exe File opened for modification C:\Windows\ungbyztlorxevmzkoexqli.exe cxtzfhhamhd.exe File opened for modification C:\Windows\anapgbpbyvvwhsze.exe cxtzfhhamhd.exe File opened for modification C:\Windows\hvjzrncpnlmoamuaz.exe cxtzfhhamhd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_948636ee0882cf1b082de9702cc5e984.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cxtzfhhamhd.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2472 JaffaCakes118_948636ee0882cf1b082de9702cc5e984.exe 2472 JaffaCakes118_948636ee0882cf1b082de9702cc5e984.exe 2472 JaffaCakes118_948636ee0882cf1b082de9702cc5e984.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2800 2472 JaffaCakes118_948636ee0882cf1b082de9702cc5e984.exe 30 PID 2472 wrote to memory of 2800 2472 JaffaCakes118_948636ee0882cf1b082de9702cc5e984.exe 30 PID 2472 wrote to memory of 2800 2472 JaffaCakes118_948636ee0882cf1b082de9702cc5e984.exe 30 PID 2472 wrote to memory of 2800 2472 JaffaCakes118_948636ee0882cf1b082de9702cc5e984.exe 30 -
System policy modification 1 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cxtzfhhamhd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cxtzfhhamhd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cxtzfhhamhd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" cxtzfhhamhd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" cxtzfhhamhd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_948636ee0882cf1b082de9702cc5e984.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_948636ee0882cf1b082de9702cc5e984.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\cxtzfhhamhd.exe"C:\Users\Admin\AppData\Local\Temp\cxtzfhhamhd.exe" "c:\users\admin\appdata\local\temp\jaffacakes118_948636ee0882cf1b082de9702cc5e984.exe*"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- System policy modification
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\oruzgr.exe"C:\Users\Admin\AppData\Local\Temp\oruzgr.exe" "-C:\Users\Admin\AppData\Local\Temp\anapgbpbyvvwhsze.exe"3⤵PID:2968
-
-
C:\Users\Admin\AppData\Local\Temp\oruzgr.exe"C:\Users\Admin\AppData\Local\Temp\oruzgr.exe" "-C:\Users\Admin\AppData\Local\Temp\anapgbpbyvvwhsze.exe"3⤵PID:2516
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD5d3f27ed6560ce8454e39e03786dc62ab
SHA158654661b2f2ab619bc3161b683a476d6d947112
SHA256222127d97ad77d8f216924309b7d1c5d16264264230884e677dab3cb3f32a7bb
SHA5127c2c387572c7f8e5ed4f3e1cebdd7f655272b17ca8f32149a3bd6f4cd68bc572c564af620db90fabde019bb4951c9b7b210164beacdab6949ea4aaa7ee94fcdd
-
Filesize
600KB
MD5948636ee0882cf1b082de9702cc5e984
SHA1f4a5aff3ab8520517c11f3f052b5eca72c9ab4d6
SHA256d71b6dc6ae5cb09251e78d67a03302292b63af2cb2b95073b19ec2e08faa86bb
SHA512e76d86e75f2d97d0a018c969e616ee7281fb1efc59133c982be45966ee7f06594b12950d23c6d8c6df47cd6af86d9ee88b269d0eff132cfa6be6d6bd0ac26136
-
Filesize
64KB
MD5c5404618402204f1bd9013b7d5e3d64c
SHA1ee20a5a20d0081b66502846bb090744918280250
SHA25608cf510d6b1728faa92785f9ccc6b230df17be9c49720b180ad4438a94be51c0
SHA512ceabed005a36a2979324d4e1b3a7a5b2b8edfc4f6af551c8404efaaae3b2c96bf96d3d0a530a59f5c5cdf6448656f7ec17ae96e280ed7f704b336863fae7460a
-
Filesize
320KB
MD55203b6ea0901877fbf2d8d6f6d8d338e
SHA1c803e92561921b38abe13239c1fd85605b570936
SHA2560cc02d34d5fd4cf892fed282f98c1ad3e7dd6159a8877ae5c46d3f834ed36060
SHA512d48a41b4fc4c38a6473f789c02918fb7353a4b4199768a3624f3b685d91d38519887a1ccd3616e0d2b079a346afaec5a0f2ef2c46d72d3097ef561cedb476471
-
Filesize
728KB
MD5a6747b3db9f3575f1c00586f0bd80168
SHA1d1cd29f60a2dbf744ecdf66cea91b19157ebd9d8
SHA2566acd67d46022b081e11af08172995b3d6c95670097a0c2c688bb09d2b9dffde7
SHA5128feaca03e7cccae8de6b142c0e4841381a7e5da3f7387b0018c5e19a8c2c02d9a92531eedb9482a077e73126596efa5cf7e81a7b635a31a81f63456456953205