Analysis
-
max time kernel
4s -
max time network
8s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
29/03/2025, 20:19
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_97a54819f342bcc3d614c86f790743c0.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_97a54819f342bcc3d614c86f790743c0.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_97a54819f342bcc3d614c86f790743c0.exe
-
Size
1016KB
-
MD5
97a54819f342bcc3d614c86f790743c0
-
SHA1
20a889572aa31106426a58a6580293980d049c9b
-
SHA256
dbd996d068c1cc16b0061d1bae1a735160b9642a197e67a2396e6a94add2dc53
-
SHA512
8db09b16722c38ec652eb7879fc7b8ac0973e6c3a03014da64431484698c360e91ac4e7711c6533cd4a9ffbba23e8c3ccd791456acdda231b194e72dc9e34f2e
-
SSDEEP
6144:B7IXsL0tvrSVz1DnemeYbpsnEf78AoXh6KkiD0OofzA+/VygHU:B7IXsgtvm1De5YlOx6lzBH46U
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" izfuneuesjp.exe -
Pykspa family
-
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" izfuneuesjp.exe -
Detect Pykspa worm 1 IoCs
resource yara_rule behavioral1/files/0x000c000000012262-2.dat family_pykspa -
Executes dropped EXE 1 IoCs
pid Process 2864 izfuneuesjp.exe -
Loads dropped DLL 2 IoCs
pid Process 2760 JaffaCakes118_97a54819f342bcc3d614c86f790743c0.exe 2760 JaffaCakes118_97a54819f342bcc3d614c86f790743c0.exe -
Checks whether UAC is enabled 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" izfuneuesjp.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA izfuneuesjp.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\iqpewgdtnroavurnd.exe izfuneuesjp.exe File opened for modification C:\Windows\SysWOW64\raaqjusjejhuqqolcl.exe izfuneuesjp.exe File opened for modification C:\Windows\SysWOW64\cmneykjbxdcqnonldnx.exe izfuneuesjp.exe File opened for modification C:\Windows\SysWOW64\pacupccvszzomoongrce.exe izfuneuesjp.exe File opened for modification C:\Windows\SysWOW64\eqtmiwxrpxyonqrrlxjmf.exe izfuneuesjp.exe File opened for modification C:\Windows\SysWOW64\vimgdsupoxzqquwxsfswqn.exe izfuneuesjp.exe File opened for modification C:\Windows\SysWOW64\biguluqfybxicawr.exe izfuneuesjp.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\biguluqfybxicawr.exe izfuneuesjp.exe File opened for modification C:\Windows\iqpewgdtnroavurnd.exe izfuneuesjp.exe File opened for modification C:\Windows\raaqjusjejhuqqolcl.exe izfuneuesjp.exe File opened for modification C:\Windows\cmneykjbxdcqnonldnx.exe izfuneuesjp.exe File opened for modification C:\Windows\pacupccvszzomoongrce.exe izfuneuesjp.exe File opened for modification C:\Windows\eqtmiwxrpxyonqrrlxjmf.exe izfuneuesjp.exe File opened for modification C:\Windows\vimgdsupoxzqquwxsfswqn.exe izfuneuesjp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_97a54819f342bcc3d614c86f790743c0.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2760 JaffaCakes118_97a54819f342bcc3d614c86f790743c0.exe 2760 JaffaCakes118_97a54819f342bcc3d614c86f790743c0.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2760 wrote to memory of 2864 2760 JaffaCakes118_97a54819f342bcc3d614c86f790743c0.exe 30 PID 2760 wrote to memory of 2864 2760 JaffaCakes118_97a54819f342bcc3d614c86f790743c0.exe 30 PID 2760 wrote to memory of 2864 2760 JaffaCakes118_97a54819f342bcc3d614c86f790743c0.exe 30 PID 2760 wrote to memory of 2864 2760 JaffaCakes118_97a54819f342bcc3d614c86f790743c0.exe 30 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System izfuneuesjp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" izfuneuesjp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_97a54819f342bcc3d614c86f790743c0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_97a54819f342bcc3d614c86f790743c0.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\izfuneuesjp.exe"C:\Users\Admin\AppData\Local\Temp\izfuneuesjp.exe" "c:\users\admin\appdata\local\temp\jaffacakes118_97a54819f342bcc3d614c86f790743c0.exe*"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System policy modification
PID:2864
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1016KB
MD597a54819f342bcc3d614c86f790743c0
SHA120a889572aa31106426a58a6580293980d049c9b
SHA256dbd996d068c1cc16b0061d1bae1a735160b9642a197e67a2396e6a94add2dc53
SHA5128db09b16722c38ec652eb7879fc7b8ac0973e6c3a03014da64431484698c360e91ac4e7711c6533cd4a9ffbba23e8c3ccd791456acdda231b194e72dc9e34f2e
-
Filesize
320KB
MD5442d09d4324ca751abd44a3b4f8f5d01
SHA125e91e14b9c4e53c150d17ae5cafa60ebe8bac6f
SHA256ce4c437a111f8412f8c5cd61bbefe7698850b9ba01f327212701042431897bec
SHA512426b4029d78840d63d311d24823467545da31a6b840c27c5d5de5cd5621af5fe6b2780d8f53f6db217ab6867b8915457720628699e4b70e012eed96e6a91224d