Analysis
-
max time kernel
63s -
max time network
64s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
29-07-2024 08:36
Static task
static1
Behavioral task
behavioral1
Sample
3d8277eae29afe5fa91180fc938f4b3c_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
3d8277eae29afe5fa91180fc938f4b3c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Errors
General
-
Target
3d8277eae29afe5fa91180fc938f4b3c_JaffaCakes118.exe
-
Size
758KB
-
MD5
3d8277eae29afe5fa91180fc938f4b3c
-
SHA1
02770a9b83cd8c82c70814d5b72041e240d3bed1
-
SHA256
f2f03b4d660d6c9ea2aa67e9be35f6ab4c4e5daf9673622b645e29fb85c7faf4
-
SHA512
bbd37e220d0d6c350e9fc3c38c33dce4aa8af4c5be7708a375b80f821ca0eb9c8248335b964f734793bbd10a0cf32462f955d531920cc747f7816fbb93333c0f
-
SSDEEP
12288:5dtnqYk9TmLe+TBshw02+xodZ2iSjD5cdrLbVrBpFpQcBJBgqZDE0OF:5d1qYESNTBI1xoPrPVrBpFpDXgqZi
Malware Config
Signatures
-
Modifies boot configuration data using bcdedit 1 TTPs 10 IoCs
Processes:
bcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exepid process 2736 bcdedit.exe 2700 bcdedit.exe 2556 bcdedit.exe 2228 bcdedit.exe 2436 bcdedit.exe 2684 bcdedit.exe 2240 bcdedit.exe 3028 bcdedit.exe 2372 bcdedit.exe 2296 bcdedit.exe -
Drops file in Drivers directory 1 IoCs
Processes:
mayzoz.exedescription ioc process File created C:\Windows\system32\drivers\f7883c0.sys mayzoz.exe -
Enables test signing to bypass driver trust controls 1 TTPs 10 IoCs
Allows any signed driver to load without validation against a trusted certificate authority.
Processes:
bcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exepid process 2684 bcdedit.exe 2240 bcdedit.exe 2296 bcdedit.exe 2700 bcdedit.exe 2556 bcdedit.exe 2228 bcdedit.exe 2436 bcdedit.exe 3028 bcdedit.exe 2372 bcdedit.exe 2736 bcdedit.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1724 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
mayzoz.exepid process 2520 mayzoz.exe -
Loads dropped DLL 1 IoCs
Processes:
3d8277eae29afe5fa91180fc938f4b3c_JaffaCakes118.exepid process 2448 3d8277eae29afe5fa91180fc938f4b3c_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
mayzoz.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mayzoz = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Edhe\\mayzoz.exe" mayzoz.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
3d8277eae29afe5fa91180fc938f4b3c_JaffaCakes118.exedescription pid process target process PID 2448 set thread context of 1724 2448 3d8277eae29afe5fa91180fc938f4b3c_JaffaCakes118.exe cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
3d8277eae29afe5fa91180fc938f4b3c_JaffaCakes118.exemayzoz.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3d8277eae29afe5fa91180fc938f4b3c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mayzoz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
Processes:
3d8277eae29afe5fa91180fc938f4b3c_JaffaCakes118.exemayzoz.exepid process 2448 3d8277eae29afe5fa91180fc938f4b3c_JaffaCakes118.exe 2520 mayzoz.exe 2520 mayzoz.exe 2520 mayzoz.exe 2520 mayzoz.exe 2520 mayzoz.exe 2520 mayzoz.exe 2520 mayzoz.exe 2520 mayzoz.exe 2520 mayzoz.exe 2520 mayzoz.exe 2520 mayzoz.exe 2520 mayzoz.exe 2520 mayzoz.exe 2520 mayzoz.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 468 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
mayzoz.exedescription pid process Token: SeShutdownPrivilege 2520 mayzoz.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
3d8277eae29afe5fa91180fc938f4b3c_JaffaCakes118.exemayzoz.exedescription pid process target process PID 2448 wrote to memory of 2520 2448 3d8277eae29afe5fa91180fc938f4b3c_JaffaCakes118.exe mayzoz.exe PID 2448 wrote to memory of 2520 2448 3d8277eae29afe5fa91180fc938f4b3c_JaffaCakes118.exe mayzoz.exe PID 2448 wrote to memory of 2520 2448 3d8277eae29afe5fa91180fc938f4b3c_JaffaCakes118.exe mayzoz.exe PID 2448 wrote to memory of 2520 2448 3d8277eae29afe5fa91180fc938f4b3c_JaffaCakes118.exe mayzoz.exe PID 2520 wrote to memory of 2296 2520 mayzoz.exe bcdedit.exe PID 2520 wrote to memory of 2296 2520 mayzoz.exe bcdedit.exe PID 2520 wrote to memory of 2296 2520 mayzoz.exe bcdedit.exe PID 2520 wrote to memory of 2296 2520 mayzoz.exe bcdedit.exe PID 2520 wrote to memory of 2372 2520 mayzoz.exe bcdedit.exe PID 2520 wrote to memory of 2372 2520 mayzoz.exe bcdedit.exe PID 2520 wrote to memory of 2372 2520 mayzoz.exe bcdedit.exe PID 2520 wrote to memory of 2372 2520 mayzoz.exe bcdedit.exe PID 2520 wrote to memory of 3028 2520 mayzoz.exe bcdedit.exe PID 2520 wrote to memory of 3028 2520 mayzoz.exe bcdedit.exe PID 2520 wrote to memory of 3028 2520 mayzoz.exe bcdedit.exe PID 2520 wrote to memory of 3028 2520 mayzoz.exe bcdedit.exe PID 2520 wrote to memory of 2240 2520 mayzoz.exe bcdedit.exe PID 2520 wrote to memory of 2240 2520 mayzoz.exe bcdedit.exe PID 2520 wrote to memory of 2240 2520 mayzoz.exe bcdedit.exe PID 2520 wrote to memory of 2240 2520 mayzoz.exe bcdedit.exe PID 2520 wrote to memory of 2684 2520 mayzoz.exe bcdedit.exe PID 2520 wrote to memory of 2684 2520 mayzoz.exe bcdedit.exe PID 2520 wrote to memory of 2684 2520 mayzoz.exe bcdedit.exe PID 2520 wrote to memory of 2684 2520 mayzoz.exe bcdedit.exe PID 2520 wrote to memory of 2436 2520 mayzoz.exe bcdedit.exe PID 2520 wrote to memory of 2436 2520 mayzoz.exe bcdedit.exe PID 2520 wrote to memory of 2436 2520 mayzoz.exe bcdedit.exe PID 2520 wrote to memory of 2436 2520 mayzoz.exe bcdedit.exe PID 2520 wrote to memory of 2228 2520 mayzoz.exe bcdedit.exe PID 2520 wrote to memory of 2228 2520 mayzoz.exe bcdedit.exe PID 2520 wrote to memory of 2228 2520 mayzoz.exe bcdedit.exe PID 2520 wrote to memory of 2228 2520 mayzoz.exe bcdedit.exe PID 2520 wrote to memory of 2556 2520 mayzoz.exe bcdedit.exe PID 2520 wrote to memory of 2556 2520 mayzoz.exe bcdedit.exe PID 2520 wrote to memory of 2556 2520 mayzoz.exe bcdedit.exe PID 2520 wrote to memory of 2556 2520 mayzoz.exe bcdedit.exe PID 2520 wrote to memory of 2700 2520 mayzoz.exe bcdedit.exe PID 2520 wrote to memory of 2700 2520 mayzoz.exe bcdedit.exe PID 2520 wrote to memory of 2700 2520 mayzoz.exe bcdedit.exe PID 2520 wrote to memory of 2700 2520 mayzoz.exe bcdedit.exe PID 2520 wrote to memory of 2736 2520 mayzoz.exe bcdedit.exe PID 2520 wrote to memory of 2736 2520 mayzoz.exe bcdedit.exe PID 2520 wrote to memory of 2736 2520 mayzoz.exe bcdedit.exe PID 2520 wrote to memory of 2736 2520 mayzoz.exe bcdedit.exe PID 2520 wrote to memory of 1208 2520 mayzoz.exe taskhost.exe PID 2520 wrote to memory of 1208 2520 mayzoz.exe taskhost.exe PID 2520 wrote to memory of 1208 2520 mayzoz.exe taskhost.exe PID 2520 wrote to memory of 1208 2520 mayzoz.exe taskhost.exe PID 2520 wrote to memory of 1208 2520 mayzoz.exe taskhost.exe PID 2520 wrote to memory of 1328 2520 mayzoz.exe Dwm.exe PID 2520 wrote to memory of 1328 2520 mayzoz.exe Dwm.exe PID 2520 wrote to memory of 1328 2520 mayzoz.exe Dwm.exe PID 2520 wrote to memory of 1328 2520 mayzoz.exe Dwm.exe PID 2520 wrote to memory of 1328 2520 mayzoz.exe Dwm.exe PID 2520 wrote to memory of 1356 2520 mayzoz.exe Explorer.EXE PID 2520 wrote to memory of 1356 2520 mayzoz.exe Explorer.EXE PID 2520 wrote to memory of 1356 2520 mayzoz.exe Explorer.EXE PID 2520 wrote to memory of 1356 2520 mayzoz.exe Explorer.EXE PID 2520 wrote to memory of 1356 2520 mayzoz.exe Explorer.EXE PID 2520 wrote to memory of 1408 2520 mayzoz.exe DllHost.exe PID 2520 wrote to memory of 1408 2520 mayzoz.exe DllHost.exe PID 2520 wrote to memory of 1408 2520 mayzoz.exe DllHost.exe PID 2520 wrote to memory of 1408 2520 mayzoz.exe DllHost.exe PID 2520 wrote to memory of 1408 2520 mayzoz.exe DllHost.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1208
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1328
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\3d8277eae29afe5fa91180fc938f4b3c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3d8277eae29afe5fa91180fc938f4b3c_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\Edhe\mayzoz.exe"C:\Users\Admin\AppData\Local\Temp\Edhe\mayzoz.exe"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
- Enables test signing to bypass driver trust controls
PID:2296
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
- Enables test signing to bypass driver trust controls
PID:2372
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
- Enables test signing to bypass driver trust controls
PID:3028
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
- Enables test signing to bypass driver trust controls
PID:2240
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
- Enables test signing to bypass driver trust controls
PID:2684
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
- Enables test signing to bypass driver trust controls
PID:2436
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
- Enables test signing to bypass driver trust controls
PID:2228
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
- Enables test signing to bypass driver trust controls
PID:2556
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
- Enables test signing to bypass driver trust controls
PID:2700
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
- Enables test signing to bypass driver trust controls
PID:2736
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\PQO6442.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1724
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1408
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2408
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
758KB
MD5db8707942639999ca6aeeca722282e0e
SHA1e8b3fbf2520c532ada94d211d53d5772bba20c9f
SHA25650e073a5d23fd1b733554c121ec41bc8189a44075eb53848f6a255856d0bf849
SHA512455c6a1219a8861cb65b15e231660b004f102de44c8ab8dff6e7f675202a396d0ebd8e43c903b2967d937a73e5f4ebfa4f73a189dbe5641b857fb9139e6361ab
-
Filesize
238B
MD54ac4ccd365aa33d43b96bef6176d7ccd
SHA161a9ba74bc3b7fa6a635b80ea1d0e09d131c12ce
SHA256d4777f624665123938fbe25a80b7e1e5cf918902efb63dd4836e1b6f08449564
SHA5122d8dc98847011f7fdb8209a26bf6c449eb997f81b82bf7df130119f06c457e177b3f4c454ce83745c95379f06888e67021a6fe5ffda0a26e5ddb1caea45ceab5