Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
11-05-2024 15:33
Static task
static1
Behavioral task
behavioral1
Sample
354afc029f507bb8574cf1fcc56deea9_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
354afc029f507bb8574cf1fcc56deea9_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
354afc029f507bb8574cf1fcc56deea9_JaffaCakes118.exe
-
Size
532KB
-
MD5
354afc029f507bb8574cf1fcc56deea9
-
SHA1
3790949a1ed97581f5198a9ca0b8e76455e58e76
-
SHA256
1af90c27e4e26ec85d6c574a301660cedbe5b58f3cbefb8f0bdbe797d8b988cb
-
SHA512
9fa7b9900fb35ff00fb8f1d34892c92502286245b4f40844d8c340319299fa06efd33b017d836222f8f38336c2edc54837446d32b42e93dfd49eea0a13c5d9c4
-
SSDEEP
12288:gObctOE9mONxfSiCjtFYS9ief6JsYVtajaxIABxnjG8oi8WrT:YORONpSJtFTNYV4jZABlG8h1/
Malware Config
Extracted
gozi
-
build
215798
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
cmifsole.execmifsole.exepid process 2604 cmifsole.exe 1808 cmifsole.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exepid process 2868 cmd.exe 2868 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
354afc029f507bb8574cf1fcc56deea9_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\Apphscli = "C:\\Users\\Admin\\AppData\\Roaming\\catssvcs\\cmifsole.exe" 354afc029f507bb8574cf1fcc56deea9_JaffaCakes118.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
354afc029f507bb8574cf1fcc56deea9_JaffaCakes118.execmifsole.execmifsole.exesvchost.exedescription pid process target process PID 2220 set thread context of 2760 2220 354afc029f507bb8574cf1fcc56deea9_JaffaCakes118.exe 354afc029f507bb8574cf1fcc56deea9_JaffaCakes118.exe PID 2604 set thread context of 1808 2604 cmifsole.exe cmifsole.exe PID 1808 set thread context of 2464 1808 cmifsole.exe svchost.exe PID 2464 set thread context of 1376 2464 svchost.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
cmifsole.exeExplorer.EXEpid process 1808 cmifsole.exe 1376 Explorer.EXE -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
cmifsole.exesvchost.exepid process 1808 cmifsole.exe 2464 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Explorer.EXEpid process 1376 Explorer.EXE -
Suspicious use of WriteProcessMemory 44 IoCs
Processes:
354afc029f507bb8574cf1fcc56deea9_JaffaCakes118.exe354afc029f507bb8574cf1fcc56deea9_JaffaCakes118.execmd.execmd.execmifsole.execmifsole.exesvchost.exedescription pid process target process PID 2220 wrote to memory of 2760 2220 354afc029f507bb8574cf1fcc56deea9_JaffaCakes118.exe 354afc029f507bb8574cf1fcc56deea9_JaffaCakes118.exe PID 2220 wrote to memory of 2760 2220 354afc029f507bb8574cf1fcc56deea9_JaffaCakes118.exe 354afc029f507bb8574cf1fcc56deea9_JaffaCakes118.exe PID 2220 wrote to memory of 2760 2220 354afc029f507bb8574cf1fcc56deea9_JaffaCakes118.exe 354afc029f507bb8574cf1fcc56deea9_JaffaCakes118.exe PID 2220 wrote to memory of 2760 2220 354afc029f507bb8574cf1fcc56deea9_JaffaCakes118.exe 354afc029f507bb8574cf1fcc56deea9_JaffaCakes118.exe PID 2220 wrote to memory of 2760 2220 354afc029f507bb8574cf1fcc56deea9_JaffaCakes118.exe 354afc029f507bb8574cf1fcc56deea9_JaffaCakes118.exe PID 2220 wrote to memory of 2760 2220 354afc029f507bb8574cf1fcc56deea9_JaffaCakes118.exe 354afc029f507bb8574cf1fcc56deea9_JaffaCakes118.exe PID 2220 wrote to memory of 2760 2220 354afc029f507bb8574cf1fcc56deea9_JaffaCakes118.exe 354afc029f507bb8574cf1fcc56deea9_JaffaCakes118.exe PID 2220 wrote to memory of 2760 2220 354afc029f507bb8574cf1fcc56deea9_JaffaCakes118.exe 354afc029f507bb8574cf1fcc56deea9_JaffaCakes118.exe PID 2220 wrote to memory of 2760 2220 354afc029f507bb8574cf1fcc56deea9_JaffaCakes118.exe 354afc029f507bb8574cf1fcc56deea9_JaffaCakes118.exe PID 2220 wrote to memory of 2760 2220 354afc029f507bb8574cf1fcc56deea9_JaffaCakes118.exe 354afc029f507bb8574cf1fcc56deea9_JaffaCakes118.exe PID 2220 wrote to memory of 2760 2220 354afc029f507bb8574cf1fcc56deea9_JaffaCakes118.exe 354afc029f507bb8574cf1fcc56deea9_JaffaCakes118.exe PID 2760 wrote to memory of 2640 2760 354afc029f507bb8574cf1fcc56deea9_JaffaCakes118.exe cmd.exe PID 2760 wrote to memory of 2640 2760 354afc029f507bb8574cf1fcc56deea9_JaffaCakes118.exe cmd.exe PID 2760 wrote to memory of 2640 2760 354afc029f507bb8574cf1fcc56deea9_JaffaCakes118.exe cmd.exe PID 2760 wrote to memory of 2640 2760 354afc029f507bb8574cf1fcc56deea9_JaffaCakes118.exe cmd.exe PID 2640 wrote to memory of 2868 2640 cmd.exe cmd.exe PID 2640 wrote to memory of 2868 2640 cmd.exe cmd.exe PID 2640 wrote to memory of 2868 2640 cmd.exe cmd.exe PID 2640 wrote to memory of 2868 2640 cmd.exe cmd.exe PID 2868 wrote to memory of 2604 2868 cmd.exe cmifsole.exe PID 2868 wrote to memory of 2604 2868 cmd.exe cmifsole.exe PID 2868 wrote to memory of 2604 2868 cmd.exe cmifsole.exe PID 2868 wrote to memory of 2604 2868 cmd.exe cmifsole.exe PID 2604 wrote to memory of 1808 2604 cmifsole.exe cmifsole.exe PID 2604 wrote to memory of 1808 2604 cmifsole.exe cmifsole.exe PID 2604 wrote to memory of 1808 2604 cmifsole.exe cmifsole.exe PID 2604 wrote to memory of 1808 2604 cmifsole.exe cmifsole.exe PID 2604 wrote to memory of 1808 2604 cmifsole.exe cmifsole.exe PID 2604 wrote to memory of 1808 2604 cmifsole.exe cmifsole.exe PID 2604 wrote to memory of 1808 2604 cmifsole.exe cmifsole.exe PID 2604 wrote to memory of 1808 2604 cmifsole.exe cmifsole.exe PID 2604 wrote to memory of 1808 2604 cmifsole.exe cmifsole.exe PID 2604 wrote to memory of 1808 2604 cmifsole.exe cmifsole.exe PID 2604 wrote to memory of 1808 2604 cmifsole.exe cmifsole.exe PID 1808 wrote to memory of 2464 1808 cmifsole.exe svchost.exe PID 1808 wrote to memory of 2464 1808 cmifsole.exe svchost.exe PID 1808 wrote to memory of 2464 1808 cmifsole.exe svchost.exe PID 1808 wrote to memory of 2464 1808 cmifsole.exe svchost.exe PID 1808 wrote to memory of 2464 1808 cmifsole.exe svchost.exe PID 1808 wrote to memory of 2464 1808 cmifsole.exe svchost.exe PID 1808 wrote to memory of 2464 1808 cmifsole.exe svchost.exe PID 2464 wrote to memory of 1376 2464 svchost.exe Explorer.EXE PID 2464 wrote to memory of 1376 2464 svchost.exe Explorer.EXE PID 2464 wrote to memory of 1376 2464 svchost.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\354afc029f507bb8574cf1fcc56deea9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\354afc029f507bb8574cf1fcc56deea9_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\354afc029f507bb8574cf1fcc56deea9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\354afc029f507bb8574cf1fcc56deea9_JaffaCakes118.exe"3⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7926\30.bat" "C:\Users\Admin\AppData\Roaming\catssvcs\cmifsole.exe" "C:\Users\Admin\AppData\Local\Temp\354AFC~1.EXE""4⤵
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\catssvcs\cmifsole.exe" "C:\Users\Admin\AppData\Local\Temp\354AFC~1.EXE""5⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Roaming\catssvcs\cmifsole.exe"C:\Users\Admin\AppData\Roaming\catssvcs\cmifsole.exe" "C:\Users\Admin\AppData\Local\Temp\354AFC~1.EXE"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Roaming\catssvcs\cmifsole.exe"C:\Users\Admin\AppData\Roaming\catssvcs\cmifsole.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe8⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112B
MD59fdc8e9047b5fc87f14f819464765f5b
SHA1d98be960fd9b79159f0ac647ff226d72ee73e262
SHA256e03eb5a5a5c4326f933693194538a464c7a84b7087575631009de3197d8ce14a
SHA5120d28692e9cbb548177eb5b6bc014abca75b56d131d51ff47aae5aa974475bc12311e8f8ac9830c62477612073c4ea3be9e8951025b09202419db04881663b414
-
Filesize
532KB
MD5354afc029f507bb8574cf1fcc56deea9
SHA13790949a1ed97581f5198a9ca0b8e76455e58e76
SHA2561af90c27e4e26ec85d6c574a301660cedbe5b58f3cbefb8f0bdbe797d8b988cb
SHA5129fa7b9900fb35ff00fb8f1d34892c92502286245b4f40844d8c340319299fa06efd33b017d836222f8f38336c2edc54837446d32b42e93dfd49eea0a13c5d9c4