Analysis
-
max time kernel
3s -
max time network
6s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
29/03/2025, 19:06
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_93c93c4012acf31e3af800ff24104c6c.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_93c93c4012acf31e3af800ff24104c6c.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_93c93c4012acf31e3af800ff24104c6c.exe
-
Size
476KB
-
MD5
93c93c4012acf31e3af800ff24104c6c
-
SHA1
7606d5953cc8c59c488b4aa67944ebbd52f40553
-
SHA256
82152e68c39ffa853a1c37a91298921e7707bf0ce29fb0e18668a08d95a7f166
-
SHA512
2a247d180b099d0d5f7779d92867798e42b87a39f05937afc42f47d3f0976755f5423858813cba06c7801d914e45c475897f75173321771b9730dfde1d9f4e79
-
SSDEEP
6144:Jj6/wndfF/gl0LQIk8DR3dEuAI7pEfxsZozAm9TMdGQLUg1nYmefPImdrionK0P9:56onxOp8FySpE5zvIdtU+Ymefgo
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" izfuneuesjp.exe -
Pykspa family
-
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" izfuneuesjp.exe -
Detect Pykspa worm 1 IoCs
resource yara_rule behavioral1/files/0x000e000000012267-2.dat family_pykspa -
Executes dropped EXE 1 IoCs
pid Process 2580 izfuneuesjp.exe -
Loads dropped DLL 2 IoCs
pid Process 2188 JaffaCakes118_93c93c4012acf31e3af800ff24104c6c.exe 2188 JaffaCakes118_93c93c4012acf31e3af800ff24104c6c.exe -
Checks whether UAC is enabled 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" izfuneuesjp.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA izfuneuesjp.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\omhbwyxlhdtvmmqstousnh.exe izfuneuesjp.exe File opened for modification C:\Windows\SysWOW64\umbpeatbrhrnysqm.exe izfuneuesjp.exe File opened for modification C:\Windows\SysWOW64\bukzpmgpgxifrmlie.exe izfuneuesjp.exe File opened for modification C:\Windows\SysWOW64\kevlcavfxpbzmiigdu.exe izfuneuesjp.exe File opened for modification C:\Windows\SysWOW64\vqizrqmxqjwvjghgewz.exe izfuneuesjp.exe File opened for modification C:\Windows\SysWOW64\iexpiifrlfttigiihaea.exe izfuneuesjp.exe File opened for modification C:\Windows\SysWOW64\xuohbcanidstjilmmglic.exe izfuneuesjp.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\omhbwyxlhdtvmmqstousnh.exe izfuneuesjp.exe File opened for modification C:\Windows\umbpeatbrhrnysqm.exe izfuneuesjp.exe File opened for modification C:\Windows\bukzpmgpgxifrmlie.exe izfuneuesjp.exe File opened for modification C:\Windows\kevlcavfxpbzmiigdu.exe izfuneuesjp.exe File opened for modification C:\Windows\vqizrqmxqjwvjghgewz.exe izfuneuesjp.exe File opened for modification C:\Windows\iexpiifrlfttigiihaea.exe izfuneuesjp.exe File opened for modification C:\Windows\xuohbcanidstjilmmglic.exe izfuneuesjp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_93c93c4012acf31e3af800ff24104c6c.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2188 JaffaCakes118_93c93c4012acf31e3af800ff24104c6c.exe 2188 JaffaCakes118_93c93c4012acf31e3af800ff24104c6c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2580 2188 JaffaCakes118_93c93c4012acf31e3af800ff24104c6c.exe 30 PID 2188 wrote to memory of 2580 2188 JaffaCakes118_93c93c4012acf31e3af800ff24104c6c.exe 30 PID 2188 wrote to memory of 2580 2188 JaffaCakes118_93c93c4012acf31e3af800ff24104c6c.exe 30 PID 2188 wrote to memory of 2580 2188 JaffaCakes118_93c93c4012acf31e3af800ff24104c6c.exe 30 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" izfuneuesjp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System izfuneuesjp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_93c93c4012acf31e3af800ff24104c6c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_93c93c4012acf31e3af800ff24104c6c.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\izfuneuesjp.exe"C:\Users\Admin\AppData\Local\Temp\izfuneuesjp.exe" "c:\users\admin\appdata\local\temp\jaffacakes118_93c93c4012acf31e3af800ff24104c6c.exe*"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System policy modification
PID:2580
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
476KB
MD593c93c4012acf31e3af800ff24104c6c
SHA17606d5953cc8c59c488b4aa67944ebbd52f40553
SHA25682152e68c39ffa853a1c37a91298921e7707bf0ce29fb0e18668a08d95a7f166
SHA5122a247d180b099d0d5f7779d92867798e42b87a39f05937afc42f47d3f0976755f5423858813cba06c7801d914e45c475897f75173321771b9730dfde1d9f4e79
-
Filesize
320KB
MD55203b6ea0901877fbf2d8d6f6d8d338e
SHA1c803e92561921b38abe13239c1fd85605b570936
SHA2560cc02d34d5fd4cf892fed282f98c1ad3e7dd6159a8877ae5c46d3f834ed36060
SHA512d48a41b4fc4c38a6473f789c02918fb7353a4b4199768a3624f3b685d91d38519887a1ccd3616e0d2b079a346afaec5a0f2ef2c46d72d3097ef561cedb476471