Analysis
-
max time kernel
3s -
max time network
3s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/03/2025, 20:13
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_9759f528df016abbf34917f4c3f0bce8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_9759f528df016abbf34917f4c3f0bce8.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_9759f528df016abbf34917f4c3f0bce8.exe
-
Size
561KB
-
MD5
9759f528df016abbf34917f4c3f0bce8
-
SHA1
68defa8e0c7d9585ebaf2aa40f63d05c64c35fde
-
SHA256
652e9328a0cf9053848fb72390ca8381e6c543a109932763caf4e60422779836
-
SHA512
18735927306635ef9b552a79b1bb4e964cc9bd7f6f56a5cfef635b659276c2923d50dee19ae938291165abac389caad660c99e18367333ec945b51cb91e87286
-
SSDEEP
6144:GKEGlVcJboOtGY8q75yKC2qJDrNRlpwPBYgZ9fVU93eJwN6QFbSpO4XcA2n4aA8E:GKr3QboC9qLGKgZKe4HYpHvcbT
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" xencqtkmhox.exe -
Pykspa family
-
UAC bypass 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xencqtkmhox.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" xencqtkmhox.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" xencqtkmhox.exe -
Detect Pykspa worm 3 IoCs
resource yara_rule behavioral1/files/0x00080000000120f9-8.dat family_pykspa behavioral1/files/0x00090000000165a7-87.dat family_pykspa behavioral1/files/0x00090000000165a7-93.dat family_pykspa -
Adds policy Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rxnbiyhvdsks = "crqndcurighyrqobcoqfe.exe" xencqtkmhox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\gjwhlyepu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pbxreapjxsqeuqlvtc.exe" xencqtkmhox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run xencqtkmhox.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" xencqtkmhox.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" xencqtkmhox.exe -
Executes dropped EXE 1 IoCs
pid Process 2088 xencqtkmhox.exe -
Loads dropped DLL 2 IoCs
pid Process 2020 JaffaCakes118_9759f528df016abbf34917f4c3f0bce8.exe 2020 JaffaCakes118_9759f528df016abbf34917f4c3f0bce8.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\zdrdiwdpvi = "C:\\Users\\Admin\\AppData\\Local\\Temp\\grmfrmatgaxkzuoxu.exe" xencqtkmhox.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\uzobhwerymd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zjdvganfrkgsgatb.exe ." xencqtkmhox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\zdrdiwdpvi = "crqndcurighyrqobcoqfe.exe" xencqtkmhox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\uzobhwerymd = "grmfrmatgaxkzuoxu.exe ." xencqtkmhox.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\qxodlcmbkatcn = "ankftqgbqmlarokvuee.exe" xencqtkmhox.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\rzrhqitjtkeoas = "zjdvganfrkgsgatb.exe ." xencqtkmhox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\zjdvganfrkgsgatb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ankftqgbqmlarokvuee.exe" xencqtkmhox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\udwnxqctewrcpia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\crqndcurighyrqobcoqfe.exe ." xencqtkmhox.exe -
Checks whether UAC is enabled 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xencqtkmhox.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA xencqtkmhox.exe -
Hijack Execution Flow: Executable Installer File Permissions Weakness 1 TTPs 1 IoCs
Possible Turn off User Account Control's privilege elevation for standard users.
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" xencqtkmhox.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\zjdvganfrkgsgatb.exe xencqtkmhox.exe File opened for modification C:\Windows\SysWOW64\grmfrmatgaxkzuoxu.exe xencqtkmhox.exe File opened for modification C:\Windows\SysWOW64\pbxreapjxsqeuqlvtc.exe xencqtkmhox.exe File opened for modification C:\Windows\SysWOW64\ankftqgbqmlarokvuee.exe xencqtkmhox.exe File opened for modification C:\Windows\SysWOW64\nbzvkizvliiyqolxxijx.exe xencqtkmhox.exe File opened for modification C:\Windows\SysWOW64\crqndcurighyrqobcoqfe.exe xencqtkmhox.exe File opened for modification C:\Windows\SysWOW64\tjjhyyrphgiauuthjwzppn.exe xencqtkmhox.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\crqndcurighyrqobcoqfe.exe xencqtkmhox.exe File opened for modification C:\Windows\tjjhyyrphgiauuthjwzppn.exe xencqtkmhox.exe File opened for modification C:\Windows\zjdvganfrkgsgatb.exe xencqtkmhox.exe File opened for modification C:\Windows\grmfrmatgaxkzuoxu.exe xencqtkmhox.exe File opened for modification C:\Windows\pbxreapjxsqeuqlvtc.exe xencqtkmhox.exe File opened for modification C:\Windows\ankftqgbqmlarokvuee.exe xencqtkmhox.exe File opened for modification C:\Windows\nbzvkizvliiyqolxxijx.exe xencqtkmhox.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_9759f528df016abbf34917f4c3f0bce8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xencqtkmhox.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2020 JaffaCakes118_9759f528df016abbf34917f4c3f0bce8.exe 2020 JaffaCakes118_9759f528df016abbf34917f4c3f0bce8.exe 2020 JaffaCakes118_9759f528df016abbf34917f4c3f0bce8.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2020 wrote to memory of 2088 2020 JaffaCakes118_9759f528df016abbf34917f4c3f0bce8.exe 31 PID 2020 wrote to memory of 2088 2020 JaffaCakes118_9759f528df016abbf34917f4c3f0bce8.exe 31 PID 2020 wrote to memory of 2088 2020 JaffaCakes118_9759f528df016abbf34917f4c3f0bce8.exe 31 PID 2020 wrote to memory of 2088 2020 JaffaCakes118_9759f528df016abbf34917f4c3f0bce8.exe 31 -
System policy modification 1 TTPs 5 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xencqtkmhox.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" xencqtkmhox.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" xencqtkmhox.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" xencqtkmhox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System xencqtkmhox.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9759f528df016abbf34917f4c3f0bce8.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9759f528df016abbf34917f4c3f0bce8.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\xencqtkmhox.exe"C:\Users\Admin\AppData\Local\Temp\xencqtkmhox.exe" "c:\users\admin\appdata\local\temp\jaffacakes118_9759f528df016abbf34917f4c3f0bce8.exe*"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Hijack Execution Flow: Executable Installer File Permissions Weakness
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- System policy modification
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\nnxfgq.exe"C:\Users\Admin\AppData\Local\Temp\nnxfgq.exe" "-c:\users\admin\appdata\local\temp\jaffacakes118_9759f528df016abbf34917f4c3f0bce8.exe"3⤵PID:2860
-
-
C:\Users\Admin\AppData\Local\Temp\nnxfgq.exe"C:\Users\Admin\AppData\Local\Temp\nnxfgq.exe" "-c:\users\admin\appdata\local\temp\jaffacakes118_9759f528df016abbf34917f4c3f0bce8.exe"3⤵PID:1792
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD55bd2865298d02926fd9fe7215e2282aa
SHA1145e379cf5f96f6b67067b6aeb425dbc1b83f3ca
SHA2566992fec5af6c31cc32a18a7b9ac87c0f0ad99efb3d0c1ccd25279c2cd469a582
SHA51236105c8fdf134729530f37ccf7b2f52521d7f96e5ecef138db72ad84aa3a7018b8a80f4b78cbe457f6d8d8d390eac4a938090c2c49a9807a8d91e9d298263f58
-
Filesize
99KB
MD59a810c02eedf0c5a7471914ab15744f8
SHA16ae0aed63cac4411856283095a4b1c6cc5d3665c
SHA2560987f4ec52ae64a47148da2a934284553607a4bb07c80de98fbcd3636629b42d
SHA5129cab22f8b4788479b2fc9c5beb690826a7962ba9dbdfd19312540cdef8b7910416dee2b1b609055ca58f783ecaef5947dca3f513b5e8a59f5105b145025c17f5
-
Filesize
640KB
MD5df76437b378c9057bd67f9b856041717
SHA1a69291d3f8b700145adfcea3f363dcebdfecf81e
SHA2569527941c90079148738f757789037f1f2c1dfdc99ea4343a377eb09eadf5dfe5
SHA5127bc9df6a4bca8a9d0a3cf9cdf0b7c092f01581d1c52912fa3479321733711c0e0eb9bacd85655d094698f109fc5e65be3e6ab956b478ed734b1698dcfa50cad0
-
Filesize
256KB
MD534ae9264ee64831ccda5a751c2ebcb35
SHA12d642e3ed755c362b55f378e8e471605b1026e37
SHA25671817a8c4cffc036b650fcb72bb48eb952097992bf222f96bddcd2ebb016c2ae
SHA512816cd4e79aedc3b74d7e90b229a918b1cbf47a3dfcb538c16e3dbdb430ad171d85e3279cd1a94c14b62c88a9975c19f4dfb308c899f41492761050b0485cc885
-
Filesize
320KB
MD51a1f85b9d526c05e3137e6a5b6fba5cc
SHA1cb40c224a2fc63413816434eea00b4317f41828e
SHA256413835d7083d408533d4e79bfb2c0e88b8e4f2ae6388af0beda752fb4a68158e
SHA5123e6b315d07cb2aa1864b7b749381a70c4a7393a9ddf67698cd23698e0d173c28e80047beb2b105624f01ce172cb14c8aefb59acb7a026a63066ada6087f88d0b
-
Filesize
561KB
MD59759f528df016abbf34917f4c3f0bce8
SHA168defa8e0c7d9585ebaf2aa40f63d05c64c35fde
SHA256652e9328a0cf9053848fb72390ca8381e6c543a109932763caf4e60422779836
SHA51218735927306635ef9b552a79b1bb4e964cc9bd7f6f56a5cfef635b659276c2923d50dee19ae938291165abac389caad660c99e18367333ec945b51cb91e87286
-
Filesize
128KB
MD56022527189655664e77156505582c428
SHA1fb40b79cd23b570a309f89e2f7c826e5f8cd390a
SHA256732655bb8e3debfdf0447eaaf65f11c90df1a60c908d504ff221a45caa37780f
SHA5122bb15df9e48a00d473593243c2e0476e954d6f19058b0413c73a4c849716745522882e7347255c9c1e8be6e31e7680ad78d95e147f18b377366807256a8a408a
-
Filesize
704KB
MD5831aa76c51a3df4f31c5150644e63b2c
SHA12ba3a56da97ea0d65f26ee573a523ca521b5b068
SHA2561d6dc50289ad688267008126d1ee77f300e286d6ff60f1958f529a9e38daa808
SHA512d1efb0ec114beb9558cdab16689653de28e8369338ea1d9bc21e4ad5408b1e72010b8250458add5ed4f6bb79d0e9b66478ed35468fb3219531fdde47f7e88371