Analysis
-
max time kernel
3s -
max time network
2s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/03/2025, 18:45
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_92a234749af196d45a4eb656aceb4994.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_92a234749af196d45a4eb656aceb4994.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_92a234749af196d45a4eb656aceb4994.exe
-
Size
488KB
-
MD5
92a234749af196d45a4eb656aceb4994
-
SHA1
017c35265cf5fb0c3232a9cc55ecf90af165cc39
-
SHA256
3a96625a5ed856e88d45f0ebd21c87b4096c3f2ef3e8fa151b6279f69075e179
-
SHA512
622d9542220d62f0a3cb16b3b292abc3758e3a46c3162d9b2cac9817194781089e67296f1a6eb28a636fbecd89f1a436e45a93a9a57406f6f310e04e4e0ee4d2
-
SSDEEP
6144:Rto07dgp0+5+ylPtRIQdS6VjKQ8tQYtagbr4rPYyUQTB2I/51pftDKHpDbU69SWI:vo07g+aP5KR5EJUQTB2OfDKC7Wcco
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" cxtzfhhamhd.exe -
Pykspa family
-
UAC bypass 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" cxtzfhhamhd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" cxtzfhhamhd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cxtzfhhamhd.exe -
Detect Pykspa worm 2 IoCs
resource yara_rule behavioral1/files/0x00080000000120ff-2.dat family_pykspa behavioral1/files/0x003400000001487e-61.dat family_pykspa -
Adds policy Run key to start application 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run cxtzfhhamhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\mylylxrdsyyvt = "lcumevulfqvxanajqq.exe" cxtzfhhamhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\veoyirirdg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\csjarhfvoycdfrdlr.exe" cxtzfhhamhd.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cxtzfhhamhd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cxtzfhhamhd.exe -
Executes dropped EXE 1 IoCs
pid Process 3056 cxtzfhhamhd.exe -
Loads dropped DLL 2 IoCs
pid Process 2228 JaffaCakes118_92a234749af196d45a4eb656aceb4994.exe 2228 JaffaCakes118_92a234749af196d45a4eb656aceb4994.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\qalwhrjtgki = "lcumevulfqvxanajqq.exe" cxtzfhhamhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nykwitmxlqpl = "ysnidxztqemrxndpzcmgb.exe ." cxtzfhhamhd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\naocqdylbijhgp = "vkaqgvshzillmxip.exe" cxtzfhhamhd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\qetixlhvmuwvvfp = "wohatlldykqtxlzjrsa.exe ." cxtzfhhamhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\csjarhfvoycdfrdlr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wohatlldykqtxlzjrsa.exe" cxtzfhhamhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\vkaqgvshzillmxip = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lcumevulfqvxanajqq.exe ." cxtzfhhamhd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\qalwhrjtgki = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lcumevulfqvxanajqq.exe" cxtzfhhamhd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\nykwitmxlqpl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ysnidxztqemrxndpzcmgb.exe ." cxtzfhhamhd.exe -
Checks whether UAC is enabled 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cxtzfhhamhd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cxtzfhhamhd.exe -
Drops file in System32 directory 14 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ysnidxztqemrxndpzcmgb.exe cxtzfhhamhd.exe File created C:\Windows\SysWOW64\ysnidxztqemrxndpzcmgb.exe cxtzfhhamhd.exe File created C:\Windows\SysWOW64\pkgcytwrpentarivgkvqmi.exe cxtzfhhamhd.exe File opened for modification C:\Windows\SysWOW64\vkaqgvshzillmxip.exe cxtzfhhamhd.exe File opened for modification C:\Windows\SysWOW64\csjarhfvoycdfrdlr.exe cxtzfhhamhd.exe File opened for modification C:\Windows\SysWOW64\lcumevulfqvxanajqq.exe cxtzfhhamhd.exe File created C:\Windows\SysWOW64\lcumevulfqvxanajqq.exe cxtzfhhamhd.exe File opened for modification C:\Windows\SysWOW64\wohatlldykqtxlzjrsa.exe cxtzfhhamhd.exe File created C:\Windows\SysWOW64\wohatlldykqtxlzjrsa.exe cxtzfhhamhd.exe File opened for modification C:\Windows\SysWOW64\pkgcytwrpentarivgkvqmi.exe cxtzfhhamhd.exe File created C:\Windows\SysWOW64\vkaqgvshzillmxip.exe cxtzfhhamhd.exe File created C:\Windows\SysWOW64\csjarhfvoycdfrdlr.exe cxtzfhhamhd.exe File opened for modification C:\Windows\SysWOW64\jcwqkdextgnrwlaluwfy.exe cxtzfhhamhd.exe File created C:\Windows\SysWOW64\jcwqkdextgnrwlaluwfy.exe cxtzfhhamhd.exe -
Drops file in Windows directory 14 IoCs
description ioc Process File created C:\Windows\csjarhfvoycdfrdlr.exe cxtzfhhamhd.exe File opened for modification C:\Windows\lcumevulfqvxanajqq.exe cxtzfhhamhd.exe File created C:\Windows\wohatlldykqtxlzjrsa.exe cxtzfhhamhd.exe File created C:\Windows\pkgcytwrpentarivgkvqmi.exe cxtzfhhamhd.exe File opened for modification C:\Windows\vkaqgvshzillmxip.exe cxtzfhhamhd.exe File created C:\Windows\lcumevulfqvxanajqq.exe cxtzfhhamhd.exe File opened for modification C:\Windows\wohatlldykqtxlzjrsa.exe cxtzfhhamhd.exe File opened for modification C:\Windows\jcwqkdextgnrwlaluwfy.exe cxtzfhhamhd.exe File created C:\Windows\jcwqkdextgnrwlaluwfy.exe cxtzfhhamhd.exe File opened for modification C:\Windows\ysnidxztqemrxndpzcmgb.exe cxtzfhhamhd.exe File created C:\Windows\ysnidxztqemrxndpzcmgb.exe cxtzfhhamhd.exe File opened for modification C:\Windows\pkgcytwrpentarivgkvqmi.exe cxtzfhhamhd.exe File created C:\Windows\vkaqgvshzillmxip.exe cxtzfhhamhd.exe File opened for modification C:\Windows\csjarhfvoycdfrdlr.exe cxtzfhhamhd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cxtzfhhamhd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_92a234749af196d45a4eb656aceb4994.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2228 JaffaCakes118_92a234749af196d45a4eb656aceb4994.exe 2228 JaffaCakes118_92a234749af196d45a4eb656aceb4994.exe 2228 JaffaCakes118_92a234749af196d45a4eb656aceb4994.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2228 wrote to memory of 3056 2228 JaffaCakes118_92a234749af196d45a4eb656aceb4994.exe 28 PID 2228 wrote to memory of 3056 2228 JaffaCakes118_92a234749af196d45a4eb656aceb4994.exe 28 PID 2228 wrote to memory of 3056 2228 JaffaCakes118_92a234749af196d45a4eb656aceb4994.exe 28 PID 2228 wrote to memory of 3056 2228 JaffaCakes118_92a234749af196d45a4eb656aceb4994.exe 28 -
System policy modification 1 TTPs 5 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" cxtzfhhamhd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" cxtzfhhamhd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cxtzfhhamhd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cxtzfhhamhd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cxtzfhhamhd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_92a234749af196d45a4eb656aceb4994.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_92a234749af196d45a4eb656aceb4994.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\cxtzfhhamhd.exe"C:\Users\Admin\AppData\Local\Temp\cxtzfhhamhd.exe" "c:\users\admin\appdata\local\temp\jaffacakes118_92a234749af196d45a4eb656aceb4994.exe*"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- System policy modification
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\wcjqxdr.exe"C:\Users\Admin\AppData\Local\Temp\wcjqxdr.exe" "-C:\Users\Admin\AppData\Local\Temp\vkaqgvshzillmxip.exe"3⤵PID:3000
-
-
C:\Users\Admin\AppData\Local\Temp\wcjqxdr.exe"C:\Users\Admin\AppData\Local\Temp\wcjqxdr.exe" "-C:\Users\Admin\AppData\Local\Temp\vkaqgvshzillmxip.exe"3⤵PID:2364
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
488KB
MD592a234749af196d45a4eb656aceb4994
SHA1017c35265cf5fb0c3232a9cc55ecf90af165cc39
SHA2563a96625a5ed856e88d45f0ebd21c87b4096c3f2ef3e8fa151b6279f69075e179
SHA512622d9542220d62f0a3cb16b3b292abc3758e3a46c3162d9b2cac9817194781089e67296f1a6eb28a636fbecd89f1a436e45a93a9a57406f6f310e04e4e0ee4d2
-
Filesize
320KB
MD588a3d7432ff5d5cee011047d7a3acb16
SHA19c5b95142911b292dc75e120545949a1dca72d12
SHA256fa10ed2990ca760fb82fc16facf3d805f1a12ee3a8e5a723844cc1a0e3b88fcb
SHA5123d0ff8fe2113ddb3f94bb4f041d7005e11681e4c912ce55f486722adef62df1bd36332fb489a2d61632980ba1f5a60dd8ef71697b21f199611b6010da3ca2147
-
Filesize
708KB
MD5ed551fce754a50f8643d49f17f745c33
SHA110306ac23a33087bbccaefad5e7d39e9a5bb6c1a
SHA2564f837bb8f089d9f74da4a056e6bb7c6c5ffd266577f70374a6bd5595fbe19ffb
SHA512c4199f905a3bfe0c970f92939f5eb809614c42c4c398a8b092f2795067863c0c4a36387be065cf5abf6dd1fbf77e6987de4a372a5066e701221476f6c707c968