Analysis
-
max time kernel
147s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 08:07
Static task
static1
Behavioral task
behavioral1
Sample
6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe
Resource
win7-20240419-en
General
-
Target
6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe
-
Size
245KB
-
MD5
6695e787f16834aba9284a71dbb79820
-
SHA1
e6e8ec98c4461a9b30ef88a8ef62912558ecb79a
-
SHA256
9b615cbd7e76bd7ba8eb200282d80eeb80acf6d7093b91eb539b61fe5f56f94d
-
SHA512
54d70f84b4f5380afd7e06ae9fd159bb31b6eae426ab36e362b41621b96c8759cf8282b8e9f44c494d06de2406a915d9cb886e053f0d30b33715f5145aa41f1e
-
SSDEEP
6144:9UE++GgnpJVavnLXjcKvgNclkJh5aY3+mr1:9zZGgdavnVvc5aYumr
Malware Config
Extracted
gozi
Extracted
gozi
1000
goliathuz.com
musicvideoporntip3s.ru
-
exe_type
worker
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2672 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
6695e787f16834aba9284a71dbb79820_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\FXSCXT32 = "C:\\Windows\\system32\\cnvfore6.exe" 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
Processes:
6695e787f16834aba9284a71dbb79820_JaffaCakes118.exedescription ioc process File opened for modification C:\Windows\system32\cnvfore6.exe 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe File created C:\Windows\system32\cnvfore6.exe 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe6695e787f16834aba9284a71dbb79820_JaffaCakes118.exedescription pid process target process PID 1752 set thread context of 2456 1752 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe PID 2456 set thread context of 2744 2456 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 5 IoCs
Processes:
explorer.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
6695e787f16834aba9284a71dbb79820_JaffaCakes118.exepid process 2456 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid process 2744 explorer.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
6695e787f16834aba9284a71dbb79820_JaffaCakes118.exepid process 2456 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
explorer.exedescription pid process Token: SeShutdownPrivilege 2744 explorer.exe Token: SeShutdownPrivilege 2744 explorer.exe Token: SeShutdownPrivilege 2744 explorer.exe Token: SeShutdownPrivilege 2744 explorer.exe Token: SeShutdownPrivilege 2744 explorer.exe Token: SeShutdownPrivilege 2744 explorer.exe Token: SeShutdownPrivilege 2744 explorer.exe Token: SeShutdownPrivilege 2744 explorer.exe Token: SeShutdownPrivilege 2744 explorer.exe Token: SeShutdownPrivilege 2744 explorer.exe Token: SeShutdownPrivilege 2744 explorer.exe Token: SeShutdownPrivilege 2744 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
Processes:
explorer.exepid process 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
explorer.exepid process 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
explorer.exepid process 2744 explorer.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe6695e787f16834aba9284a71dbb79820_JaffaCakes118.execmd.exedescription pid process target process PID 1752 wrote to memory of 2440 1752 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe PID 1752 wrote to memory of 2440 1752 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe PID 1752 wrote to memory of 2440 1752 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe PID 1752 wrote to memory of 2440 1752 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe PID 1752 wrote to memory of 2456 1752 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe PID 1752 wrote to memory of 2456 1752 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe PID 1752 wrote to memory of 2456 1752 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe PID 1752 wrote to memory of 2456 1752 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe PID 1752 wrote to memory of 2456 1752 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe PID 1752 wrote to memory of 2456 1752 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe PID 1752 wrote to memory of 2456 1752 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe PID 1752 wrote to memory of 2456 1752 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe PID 1752 wrote to memory of 2456 1752 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe PID 1752 wrote to memory of 2456 1752 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe PID 1752 wrote to memory of 2456 1752 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe PID 2456 wrote to memory of 2744 2456 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe explorer.exe PID 2456 wrote to memory of 2744 2456 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe explorer.exe PID 2456 wrote to memory of 2744 2456 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe explorer.exe PID 2456 wrote to memory of 2744 2456 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe explorer.exe PID 2456 wrote to memory of 2744 2456 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe explorer.exe PID 2456 wrote to memory of 2744 2456 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe explorer.exe PID 2456 wrote to memory of 2744 2456 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe explorer.exe PID 2456 wrote to memory of 2672 2456 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe cmd.exe PID 2456 wrote to memory of 2672 2456 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe cmd.exe PID 2456 wrote to memory of 2672 2456 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe cmd.exe PID 2456 wrote to memory of 2672 2456 6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe cmd.exe PID 2672 wrote to memory of 2544 2672 cmd.exe attrib.exe PID 2672 wrote to memory of 2544 2672 cmd.exe attrib.exe PID 2672 wrote to memory of 2544 2672 cmd.exe attrib.exe PID 2672 wrote to memory of 2544 2672 cmd.exe attrib.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\259399024.bat" "C:\Users\Admin\AppData\Local\Temp\6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe""3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\6695e787f16834aba9284a71dbb79820_JaffaCakes118.exe"4⤵
- Views/modifies file attributes
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\259399024.batFilesize
76B
MD55f42423c0e6a05599643785d0f565530
SHA1fe601297daa97a18075c68acf6967a4e6ccb83d7
SHA256759e56cd4b1e7faf1b423fc2663b44c55f65d539b1ec6aafabaa26030de57e8a
SHA5123b79d053ec99832f251fadfbf2b5f7ccce72526bf5a9c03406f0cf90a105d4c59f87009dc447972ecc9280dec7a5321c2ff81758cefc800493e5f73ce8325458
-
memory/1752-15-0x0000000074360000-0x000000007490B000-memory.dmpFilesize
5.7MB
-
memory/1752-1-0x0000000074360000-0x000000007490B000-memory.dmpFilesize
5.7MB
-
memory/1752-2-0x0000000074360000-0x000000007490B000-memory.dmpFilesize
5.7MB
-
memory/1752-0-0x0000000074361000-0x0000000074362000-memory.dmpFilesize
4KB
-
memory/1752-20-0x0000000074360000-0x000000007490B000-memory.dmpFilesize
5.7MB
-
memory/2456-19-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/2456-43-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/2456-11-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/2456-9-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/2456-7-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/2456-18-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/2456-21-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/2456-13-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/2456-3-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/2456-16-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2456-5-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/2744-30-0x0000000001FC0000-0x0000000002032000-memory.dmpFilesize
456KB
-
memory/2744-25-0x0000000001FC0000-0x0000000002032000-memory.dmpFilesize
456KB
-
memory/2744-34-0x0000000001FC0000-0x0000000002032000-memory.dmpFilesize
456KB
-
memory/2744-33-0x0000000001FC0000-0x0000000002032000-memory.dmpFilesize
456KB
-
memory/2744-32-0x0000000001FC0000-0x0000000002032000-memory.dmpFilesize
456KB
-
memory/2744-31-0x0000000001FC0000-0x0000000002032000-memory.dmpFilesize
456KB
-
memory/2744-29-0x0000000001ED0000-0x0000000001ED1000-memory.dmpFilesize
4KB
-
memory/2744-23-0x0000000001ED0000-0x0000000001ED1000-memory.dmpFilesize
4KB
-
memory/2744-46-0x0000000001FC0000-0x0000000002032000-memory.dmpFilesize
456KB
-
memory/2744-45-0x0000000001FC0000-0x0000000002032000-memory.dmpFilesize
456KB
-
memory/2744-24-0x000007FFFFFDF000-0x000007FFFFFE0000-memory.dmpFilesize
4KB
-
memory/2744-52-0x0000000001FC0000-0x0000000002032000-memory.dmpFilesize
456KB
-
memory/2744-55-0x0000000002990000-0x00000000029A0000-memory.dmpFilesize
64KB
-
memory/2744-56-0x0000000001FC0000-0x0000000002032000-memory.dmpFilesize
456KB