Analysis
-
max time kernel
3s -
max time network
4s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/03/2025, 19:17
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_944c04108f4354481b1639c08a0e7170.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_944c04108f4354481b1639c08a0e7170.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_944c04108f4354481b1639c08a0e7170.exe
-
Size
548KB
-
MD5
944c04108f4354481b1639c08a0e7170
-
SHA1
1a6b86bc4dc6dd7df89c848f181227e5068e56fc
-
SHA256
d6acb0f91b03293b7d03c2c258dd13e644c2dcf63df190580fb0c2b32c69510b
-
SHA512
d6a9214f5c5f86ea68ea51bb76f1a8d5a1980e852ac98beae303c0206e1fbcff20e3cd86b38fa4e88a49b89a7e6fbd78e799af30c198f709eca49eacb1287bda
-
SSDEEP
6144:YmXqNhOPOUFLccF/nHkcPLRFB/fhLeiNruEnOldMrhJ11PUM1nF1WHysWD:YmaNhOPnxBnHkapLjTn/rhlUy1WSB
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" ilpzxhicsvz.exe -
Pykspa family
-
UAC bypass 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ilpzxhicsvz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" ilpzxhicsvz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ilpzxhicsvz.exe -
Detect Pykspa worm 2 IoCs
resource yara_rule behavioral1/files/0x0007000000012119-2.dat family_pykspa behavioral1/files/0x0005000000019426-61.dat family_pykspa -
Adds policy Run key to start application 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ilpzxhicsvz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\gsyaln = "vwriizuqifsftnvpaejkf.exe" ilpzxhicsvz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\for = "C:\\Users\\Admin\\AppData\\Local\\Temp\\igymjxpixrblwnsjrs.exe" ilpzxhicsvz.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ilpzxhicsvz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ilpzxhicsvz.exe -
Executes dropped EXE 1 IoCs
pid Process 1604 ilpzxhicsvz.exe -
Loads dropped DLL 2 IoCs
pid Process 2516 JaffaCakes118_944c04108f4354481b1639c08a0e7170.exe 2516 JaffaCakes118_944c04108f4354481b1639c08a0e7170.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\mwaa = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vwriizuqifsftnvpaejkf.exe" ilpzxhicsvz.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\vglmw = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zwnawjasgzirbrvls.exe ." ilpzxhicsvz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mwaa = "tslayngaqlwhtlrjsux.exe" ilpzxhicsvz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\vglmw = "vwriizuqifsftnvpaejkf.exe ." ilpzxhicsvz.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\tgnqcfm = "zwnawjasgzirbrvls.exe" ilpzxhicsvz.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\iweivzhq = "tslayngaqlwhtlrjsux.exe ." ilpzxhicsvz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\sisyntdovh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ggaqpfzulhtfslslvycc.exe" ilpzxhicsvz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\zoxcqveou = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tslayngaqlwhtlrjsux.exe ." ilpzxhicsvz.exe -
Checks whether UAC is enabled 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ilpzxhicsvz.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ilpzxhicsvz.exe -
Hijack Execution Flow: Executable Installer File Permissions Weakness 1 TTPs 1 IoCs
Possible Turn off User Account Control's privilege elevation for standard users.
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" ilpzxhicsvz.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\mokcdvrohfthwravhmsuqi.exe ilpzxhicsvz.exe File opened for modification C:\Windows\SysWOW64\soeqlxnerjrzixap.exe ilpzxhicsvz.exe File opened for modification C:\Windows\SysWOW64\zwnawjasgzirbrvls.exe ilpzxhicsvz.exe File opened for modification C:\Windows\SysWOW64\igymjxpixrblwnsjrs.exe ilpzxhicsvz.exe File opened for modification C:\Windows\SysWOW64\tslayngaqlwhtlrjsux.exe ilpzxhicsvz.exe File opened for modification C:\Windows\SysWOW64\ggaqpfzulhtfslslvycc.exe ilpzxhicsvz.exe File opened for modification C:\Windows\SysWOW64\vwriizuqifsftnvpaejkf.exe ilpzxhicsvz.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\zwnawjasgzirbrvls.exe ilpzxhicsvz.exe File opened for modification C:\Windows\igymjxpixrblwnsjrs.exe ilpzxhicsvz.exe File opened for modification C:\Windows\tslayngaqlwhtlrjsux.exe ilpzxhicsvz.exe File opened for modification C:\Windows\ggaqpfzulhtfslslvycc.exe ilpzxhicsvz.exe File opened for modification C:\Windows\vwriizuqifsftnvpaejkf.exe ilpzxhicsvz.exe File opened for modification C:\Windows\mokcdvrohfthwravhmsuqi.exe ilpzxhicsvz.exe File opened for modification C:\Windows\soeqlxnerjrzixap.exe ilpzxhicsvz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_944c04108f4354481b1639c08a0e7170.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ilpzxhicsvz.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2516 JaffaCakes118_944c04108f4354481b1639c08a0e7170.exe 2516 JaffaCakes118_944c04108f4354481b1639c08a0e7170.exe 2516 JaffaCakes118_944c04108f4354481b1639c08a0e7170.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2516 wrote to memory of 1604 2516 JaffaCakes118_944c04108f4354481b1639c08a0e7170.exe 30 PID 2516 wrote to memory of 1604 2516 JaffaCakes118_944c04108f4354481b1639c08a0e7170.exe 30 PID 2516 wrote to memory of 1604 2516 JaffaCakes118_944c04108f4354481b1639c08a0e7170.exe 30 PID 2516 wrote to memory of 1604 2516 JaffaCakes118_944c04108f4354481b1639c08a0e7170.exe 30 -
System policy modification 1 TTPs 5 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ilpzxhicsvz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" ilpzxhicsvz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ilpzxhicsvz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ilpzxhicsvz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ilpzxhicsvz.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_944c04108f4354481b1639c08a0e7170.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_944c04108f4354481b1639c08a0e7170.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\ilpzxhicsvz.exe"C:\Users\Admin\AppData\Local\Temp\ilpzxhicsvz.exe" "c:\users\admin\appdata\local\temp\jaffacakes118_944c04108f4354481b1639c08a0e7170.exe*"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Hijack Execution Flow: Executable Installer File Permissions Weakness
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- System policy modification
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\gsyaln.exe"C:\Users\Admin\AppData\Local\Temp\gsyaln.exe" "-C:\Users\Admin\AppData\Local\Temp\soeqlxnerjrzixap.exe"3⤵PID:788
-
-
C:\Users\Admin\AppData\Local\Temp\gsyaln.exe"C:\Users\Admin\AppData\Local\Temp\gsyaln.exe" "-C:\Users\Admin\AppData\Local\Temp\soeqlxnerjrzixap.exe"3⤵PID:2608
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
109KB
MD578fcf82aa70611cc3ffa03ddb137e4a1
SHA16c878df5e7818920d27efb2aac344dab4c4120af
SHA256a9dd3d885bbfa1accb8c0fbc9127038387d4aee2cd321e463e93e3320289dae2
SHA512701421780606c8bc3dd1d8a7f80cb5a098462a29eae81879fc28db03a6cdfe2ceea2a1f1f0faf0b7894262349e24b171feb42f805c6c6049e9d2184399cf7c7a
-
Filesize
128KB
MD5f5a02841251dae9284bcad79d94d6cd9
SHA18c8b6b0c3cf590a70768691954d7e4123cbaa123
SHA256c80955bdc35f1d838078957eda160ac36a9ef7492efe5d61bf9d29ee10ab55ab
SHA5126cb915b06529902d2e68343496b1c40721b407f82bcd82d7a0f92879ff45be934df5fe7e06c0608d9d5341e7a79b2c9eac66099b5f9f5cdb291f6bed1a64f136
-
Filesize
548KB
MD5944c04108f4354481b1639c08a0e7170
SHA11a6b86bc4dc6dd7df89c848f181227e5068e56fc
SHA256d6acb0f91b03293b7d03c2c258dd13e644c2dcf63df190580fb0c2b32c69510b
SHA512d6a9214f5c5f86ea68ea51bb76f1a8d5a1980e852ac98beae303c0206e1fbcff20e3cd86b38fa4e88a49b89a7e6fbd78e799af30c198f709eca49eacb1287bda
-
Filesize
448KB
MD5e82aa845ded0b324c9be7be214950090
SHA18251b124ee73ec4b2bebe6f00b5a96cd6ac58a67
SHA25691f2b746263f8bfe487d3ec394017cabd1f0ba7c565c3d83c29a22c19de4c549
SHA51242df98e59022284ac043cd5b663c05b2894e92e516000e42af25e1578e2b4f6cd696bced6b2864c07c9a00b99a42b112109e36d0efd052877ca587e52fc7b0f7
-
Filesize
704KB
MD52b8cef52910d8cecd9d72e213c8f0c3d
SHA1196d1ca63190eb4e35dbb4a7c86536bb263e39cf
SHA25651ca2a2fc1689ad466a17c31bf4cb5501e4b2592662992fff84fc70fc270f047
SHA51251ad1eb31e2ad61ecde757cad443996ddc3cb0f227cf6ff2883d50caf611320da77adb736db7231d0816b92baf936770bad89b06d959028839826f30c0fcea8c
-
Filesize
320KB
MD5913bf8a31d169d6cb6a7e3a25a28ce5d
SHA1534eae9c207daa4a29f4bd4bb7642b0882ad636b
SHA25661d75d24466ac9a3e105a321bda06d99f671077fcb4dcdf79451df36b6fbdfd3
SHA5127cbd7de86f7dd31acb8b7ba34c4c2c99690b3d2cea6e14fa5b70b0127cac05f76e69fb97c8a2cf83fc70f6070bfc518d25ccdaa66f9c51cfe60abe8767a083b0