Analysis
-
max time kernel
3s -
max time network
1s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/03/2025, 20:18
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_97a06d4c34869003ce06d22cf844ee41.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_97a06d4c34869003ce06d22cf844ee41.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_97a06d4c34869003ce06d22cf844ee41.exe
-
Size
600KB
-
MD5
97a06d4c34869003ce06d22cf844ee41
-
SHA1
1ec4347b82f3cc1b9624f4e6a68047a8045a7fc0
-
SHA256
839e4463d38910e7b4b6548985a95711dc11371a6a94f36716b0d222260ae275
-
SHA512
3f2251920964cb7e86e1ccbbb06ec138a770493b9ce1a0c0fc37fba4e55023e774db75ad83c140bd816248934822b6c20b7527bc3058462c173999c72e149930
-
SSDEEP
12288:e2iwn/ND7S3xI66S/H3UyKxWn2hJ+MRmhhhAR:e213Sed0Xjh4
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" uvtgxqufefd.exe -
Pykspa family
-
UAC bypass 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" uvtgxqufefd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" uvtgxqufefd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" uvtgxqufefd.exe -
Detect Pykspa worm 2 IoCs
resource yara_rule behavioral1/files/0x00090000000120f1-2.dat family_pykspa behavioral1/files/0x00050000000198f0-61.dat family_pykspa -
Adds policy Run key to start application 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run uvtgxqufefd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\uchpchr = "wslhibztjeepxuvymhkgz.exe" uvtgxqufefd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\nsuz = "C:\\Users\\Admin\\AppData\\Local\\Temp\\uofzypldrkirxsrsexy.exe" uvtgxqufefd.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" uvtgxqufefd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" uvtgxqufefd.exe -
Executes dropped EXE 1 IoCs
pid Process 2992 uvtgxqufefd.exe -
Loads dropped DLL 2 IoCs
pid Process 2552 JaffaCakes118_97a06d4c34869003ce06d22cf844ee41.exe 2552 JaffaCakes118_97a06d4c34869003ce06d22cf844ee41.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\akrbqxjrv = "hcupphexmgfpwssuhbdy.exe ." uvtgxqufefd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\oajvmvjtzka = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ashzwlfvhyubfyvue.exe" uvtgxqufefd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\temxnvirwg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ashzwlfvhyubfyvue.exe ." uvtgxqufefd.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcflw = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tkyplzshsidjmeay.exe" uvtgxqufefd.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\hoszlp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ashzwlfvhyubfyvue.exe ." uvtgxqufefd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wcflw = "uofzypldrkirxsrsexy.exe" uvtgxqufefd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\hoszlp = "tkyplzshsidjmeay.exe ." uvtgxqufefd.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\jsyhvbmt = "uofzypldrkirxsrsexy.exe" uvtgxqufefd.exe -
Checks whether UAC is enabled 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" uvtgxqufefd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA uvtgxqufefd.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\tkyplzshsidjmeay.exe uvtgxqufefd.exe File opened for modification C:\Windows\SysWOW64\ashzwlfvhyubfyvue.exe uvtgxqufefd.exe File opened for modification C:\Windows\SysWOW64\jcsljzulyqnvaussdv.exe uvtgxqufefd.exe File opened for modification C:\Windows\SysWOW64\uofzypldrkirxsrsexy.exe uvtgxqufefd.exe File opened for modification C:\Windows\SysWOW64\hcupphexmgfpwssuhbdy.exe uvtgxqufefd.exe File opened for modification C:\Windows\SysWOW64\wslhibztjeepxuvymhkgz.exe uvtgxqufefd.exe File opened for modification C:\Windows\SysWOW64\nkebdxwriefrayaetptqkh.exe uvtgxqufefd.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\wslhibztjeepxuvymhkgz.exe uvtgxqufefd.exe File opened for modification C:\Windows\nkebdxwriefrayaetptqkh.exe uvtgxqufefd.exe File opened for modification C:\Windows\tkyplzshsidjmeay.exe uvtgxqufefd.exe File opened for modification C:\Windows\ashzwlfvhyubfyvue.exe uvtgxqufefd.exe File opened for modification C:\Windows\jcsljzulyqnvaussdv.exe uvtgxqufefd.exe File opened for modification C:\Windows\uofzypldrkirxsrsexy.exe uvtgxqufefd.exe File opened for modification C:\Windows\hcupphexmgfpwssuhbdy.exe uvtgxqufefd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_97a06d4c34869003ce06d22cf844ee41.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uvtgxqufefd.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2552 JaffaCakes118_97a06d4c34869003ce06d22cf844ee41.exe 2552 JaffaCakes118_97a06d4c34869003ce06d22cf844ee41.exe 2552 JaffaCakes118_97a06d4c34869003ce06d22cf844ee41.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2992 2552 JaffaCakes118_97a06d4c34869003ce06d22cf844ee41.exe 30 PID 2552 wrote to memory of 2992 2552 JaffaCakes118_97a06d4c34869003ce06d22cf844ee41.exe 30 PID 2552 wrote to memory of 2992 2552 JaffaCakes118_97a06d4c34869003ce06d22cf844ee41.exe 30 PID 2552 wrote to memory of 2992 2552 JaffaCakes118_97a06d4c34869003ce06d22cf844ee41.exe 30 -
System policy modification 1 TTPs 5 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" uvtgxqufefd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" uvtgxqufefd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" uvtgxqufefd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" uvtgxqufefd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System uvtgxqufefd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_97a06d4c34869003ce06d22cf844ee41.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_97a06d4c34869003ce06d22cf844ee41.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\uvtgxqufefd.exe"C:\Users\Admin\AppData\Local\Temp\uvtgxqufefd.exe" "c:\users\admin\appdata\local\temp\jaffacakes118_97a06d4c34869003ce06d22cf844ee41.exe*"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- System policy modification
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\hoszlp.exe"C:\Users\Admin\AppData\Local\Temp\hoszlp.exe" "-C:\Users\Admin\AppData\Local\Temp\tkyplzshsidjmeay.exe"3⤵PID:2784
-
-
C:\Users\Admin\AppData\Local\Temp\hoszlp.exe"C:\Users\Admin\AppData\Local\Temp\hoszlp.exe" "-C:\Users\Admin\AppData\Local\Temp\tkyplzshsidjmeay.exe"3⤵PID:2628
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600KB
MD597a06d4c34869003ce06d22cf844ee41
SHA11ec4347b82f3cc1b9624f4e6a68047a8045a7fc0
SHA256839e4463d38910e7b4b6548985a95711dc11371a6a94f36716b0d222260ae275
SHA5123f2251920964cb7e86e1ccbbb06ec138a770493b9ce1a0c0fc37fba4e55023e774db75ad83c140bd816248934822b6c20b7527bc3058462c173999c72e149930
-
Filesize
192KB
MD572c3415ee1c7e61605ed886d3ff49487
SHA19a2c29ec8ec47d989e55ae7e9d3af87c8ae19158
SHA25619ce75c61085acaccb19ad5c6a1d181025b722ccbd5443c8bf01d3fbbd123919
SHA5129f45d252c82bcce18dc9a70e6f6c055577bc4974668b77504c0abf26900d890865c0abf633aebe8e3245becb8c3490c4ccd05f77178a61bce8c769438097ace8
-
Filesize
716KB
MD55803ba94e6131332ef8b3e101ba9f77b
SHA14a10a3d9b0cb2e7e65222d7c767ec91c222ebe05
SHA256694a707952bb5c163b1bd58c5449fb0e1ee55061ed3833ead4114b738d7af87b
SHA512710904b61486654660377ff4340655718027e700f3c3d915243dd354197c75a5be973b4bd2d1f018276201341d01850bc81eced4c1eff2d75e46a1e7ea5d3ffd
-
Filesize
320KB
MD510389638c4d000b0c923c2c22af256ff
SHA174692b104e6b980d6773f500b15d033c0c55e48b
SHA25679d0e27e8a034c0bbbdffaacb5ee64f1569b0139ef277def4e3db1d6cd3034c5
SHA5121bcf3f0b3a069b9e4d554397720c3c89f4e3ef0cd3bc9425d2051c73672a7c4c4e738b891b63b024a6536d8784ca21315ed65c628d8ceaa169f0234641c30e14