Analysis

  • max time kernel
    3s
  • max time network
    4s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29/03/2025, 19:17

General

  • Target

    JaffaCakes118_944c04108f4354481b1639c08a0e7170.exe

  • Size

    548KB

  • MD5

    944c04108f4354481b1639c08a0e7170

  • SHA1

    1a6b86bc4dc6dd7df89c848f181227e5068e56fc

  • SHA256

    d6acb0f91b03293b7d03c2c258dd13e644c2dcf63df190580fb0c2b32c69510b

  • SHA512

    d6a9214f5c5f86ea68ea51bb76f1a8d5a1980e852ac98beae303c0206e1fbcff20e3cd86b38fa4e88a49b89a7e6fbd78e799af30c198f709eca49eacb1287bda

  • SSDEEP

    6144:YmXqNhOPOUFLccF/nHkcPLRFB/fhLeiNruEnOldMrhJ11PUM1nF1WHysWD:YmaNhOPnxBnHkapLjTn/rhlUy1WSB

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Pykspa

    Pykspa is a worm spreads via Skype uses DGA and it's written in C++.

  • Pykspa family
  • UAC bypass 3 TTPs 3 IoCs
  • Detect Pykspa worm 2 IoCs
  • Adds policy Run key to start application 2 TTPs 3 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Hijack Execution Flow: Executable Installer File Permissions Weakness 1 TTPs 1 IoCs

    Possible Turn off User Account Control's privilege elevation for standard users.

  • Drops file in System32 directory 7 IoCs
  • Drops file in Windows directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • System policy modification 1 TTPs 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_944c04108f4354481b1639c08a0e7170.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_944c04108f4354481b1639c08a0e7170.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2516
    • C:\Users\Admin\AppData\Local\Temp\ilpzxhicsvz.exe
      "C:\Users\Admin\AppData\Local\Temp\ilpzxhicsvz.exe" "c:\users\admin\appdata\local\temp\jaffacakes118_944c04108f4354481b1639c08a0e7170.exe*"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Hijack Execution Flow: Executable Installer File Permissions Weakness
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • System policy modification
      PID:1604
      • C:\Users\Admin\AppData\Local\Temp\gsyaln.exe
        "C:\Users\Admin\AppData\Local\Temp\gsyaln.exe" "-C:\Users\Admin\AppData\Local\Temp\soeqlxnerjrzixap.exe"
        3⤵
          PID:788
        • C:\Users\Admin\AppData\Local\Temp\gsyaln.exe
          "C:\Users\Admin\AppData\Local\Temp\gsyaln.exe" "-C:\Users\Admin\AppData\Local\Temp\soeqlxnerjrzixap.exe"
          3⤵
            PID:2608

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\mokcdvrohfthwravhmsuqi.exe

        Filesize

        109KB

        MD5

        78fcf82aa70611cc3ffa03ddb137e4a1

        SHA1

        6c878df5e7818920d27efb2aac344dab4c4120af

        SHA256

        a9dd3d885bbfa1accb8c0fbc9127038387d4aee2cd321e463e93e3320289dae2

        SHA512

        701421780606c8bc3dd1d8a7f80cb5a098462a29eae81879fc28db03a6cdfe2ceea2a1f1f0faf0b7894262349e24b171feb42f805c6c6049e9d2184399cf7c7a

      • C:\Users\Admin\AppData\Local\Temp\vwriizuqifsftnvpaejkf.exe

        Filesize

        128KB

        MD5

        f5a02841251dae9284bcad79d94d6cd9

        SHA1

        8c8b6b0c3cf590a70768691954d7e4123cbaa123

        SHA256

        c80955bdc35f1d838078957eda160ac36a9ef7492efe5d61bf9d29ee10ab55ab

        SHA512

        6cb915b06529902d2e68343496b1c40721b407f82bcd82d7a0f92879ff45be934df5fe7e06c0608d9d5341e7a79b2c9eac66099b5f9f5cdb291f6bed1a64f136

      • C:\Windows\SysWOW64\igymjxpixrblwnsjrs.exe

        Filesize

        548KB

        MD5

        944c04108f4354481b1639c08a0e7170

        SHA1

        1a6b86bc4dc6dd7df89c848f181227e5068e56fc

        SHA256

        d6acb0f91b03293b7d03c2c258dd13e644c2dcf63df190580fb0c2b32c69510b

        SHA512

        d6a9214f5c5f86ea68ea51bb76f1a8d5a1980e852ac98beae303c0206e1fbcff20e3cd86b38fa4e88a49b89a7e6fbd78e799af30c198f709eca49eacb1287bda

      • C:\Windows\mokcdvrohfthwravhmsuqi.exe

        Filesize

        448KB

        MD5

        e82aa845ded0b324c9be7be214950090

        SHA1

        8251b124ee73ec4b2bebe6f00b5a96cd6ac58a67

        SHA256

        91f2b746263f8bfe487d3ec394017cabd1f0ba7c565c3d83c29a22c19de4c549

        SHA512

        42df98e59022284ac043cd5b663c05b2894e92e516000e42af25e1578e2b4f6cd696bced6b2864c07c9a00b99a42b112109e36d0efd052877ca587e52fc7b0f7

      • \Users\Admin\AppData\Local\Temp\gsyaln.exe

        Filesize

        704KB

        MD5

        2b8cef52910d8cecd9d72e213c8f0c3d

        SHA1

        196d1ca63190eb4e35dbb4a7c86536bb263e39cf

        SHA256

        51ca2a2fc1689ad466a17c31bf4cb5501e4b2592662992fff84fc70fc270f047

        SHA512

        51ad1eb31e2ad61ecde757cad443996ddc3cb0f227cf6ff2883d50caf611320da77adb736db7231d0816b92baf936770bad89b06d959028839826f30c0fcea8c

      • \Users\Admin\AppData\Local\Temp\ilpzxhicsvz.exe

        Filesize

        320KB

        MD5

        913bf8a31d169d6cb6a7e3a25a28ce5d

        SHA1

        534eae9c207daa4a29f4bd4bb7642b0882ad636b

        SHA256

        61d75d24466ac9a3e105a321bda06d99f671077fcb4dcdf79451df36b6fbdfd3

        SHA512

        7cbd7de86f7dd31acb8b7ba34c4c2c99690b3d2cea6e14fa5b70b0127cac05f76e69fb97c8a2cf83fc70f6070bfc518d25ccdaa66f9c51cfe60abe8767a083b0