Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 06:06
Static task
static1
Behavioral task
behavioral1
Sample
69fb0b7092d4f247ac065abc6b06042b_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
69fb0b7092d4f247ac065abc6b06042b_JaffaCakes118.exe
-
Size
586KB
-
MD5
69fb0b7092d4f247ac065abc6b06042b
-
SHA1
8d8d9b846e2f4624063806291c5875953d67457c
-
SHA256
3eec66b77b94ef402c0b11c496df2f27867d0406dc59540d0bfaff4b271ecc2b
-
SHA512
4f06d42fed4c033b1d835f0b7fc79450a8432c1168f4232d5534f26ec9bc07f5ed6df0a33736f41849b37be3279d23b0fa2b77dfb68ab92caaab9d3ec33a6b78
-
SSDEEP
12288:osiOZO5I+h2gOoIMUUtN5y1iyqTU/zWjdp9fs:+eO5I22lMUUEiyqM+dp9f
Malware Config
Extracted
gozi
Extracted
gozi
1100
cyajon.at/krp3cmg
outaplaceshave.cn/krp3cmg
nozakin.at/krp3cmg
hothegivforsuffer.cn/krp3cmg
austrinok.at/krp3cmg
comerail.su/krp3cmg
ambieko.at/krp3cmg
justiceseasfriends.cn/krp3cmg
semitrol.at/krp3cmg
goinumder.su/krp3cmg
arexan.at/krp3cmg
trepeatedandequal.cn/krp3cmg
golovor.at/krp3cmg
therepalon.su/krp3cmg
creatortherefore.cn/krp3cmg
-
build
214798
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
exe_type
worker
-
server_id
110
Signatures
-
Deletes itself 1 IoCs
Processes:
adpranui.exepid process 2288 adpranui.exe -
Executes dropped EXE 1 IoCs
Processes:
adpranui.exepid process 2288 adpranui.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 3060 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
69fb0b7092d4f247ac065abc6b06042b_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\bitstLib = "C:\\Users\\Admin\\AppData\\Roaming\\BioCxRes\\adpranui.exe" 69fb0b7092d4f247ac065abc6b06042b_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
adpranui.exesvchost.exedescription pid process target process PID 2288 set thread context of 2568 2288 adpranui.exe svchost.exe PID 2568 set thread context of 1200 2568 svchost.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
adpranui.exeExplorer.EXEpid process 2288 adpranui.exe 1200 Explorer.EXE -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
adpranui.exesvchost.exepid process 2288 adpranui.exe 2568 svchost.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
69fb0b7092d4f247ac065abc6b06042b_JaffaCakes118.execmd.execmd.exeadpranui.exesvchost.exedescription pid process target process PID 2956 wrote to memory of 2984 2956 69fb0b7092d4f247ac065abc6b06042b_JaffaCakes118.exe cmd.exe PID 2956 wrote to memory of 2984 2956 69fb0b7092d4f247ac065abc6b06042b_JaffaCakes118.exe cmd.exe PID 2956 wrote to memory of 2984 2956 69fb0b7092d4f247ac065abc6b06042b_JaffaCakes118.exe cmd.exe PID 2956 wrote to memory of 2984 2956 69fb0b7092d4f247ac065abc6b06042b_JaffaCakes118.exe cmd.exe PID 2984 wrote to memory of 3060 2984 cmd.exe cmd.exe PID 2984 wrote to memory of 3060 2984 cmd.exe cmd.exe PID 2984 wrote to memory of 3060 2984 cmd.exe cmd.exe PID 2984 wrote to memory of 3060 2984 cmd.exe cmd.exe PID 3060 wrote to memory of 2288 3060 cmd.exe adpranui.exe PID 3060 wrote to memory of 2288 3060 cmd.exe adpranui.exe PID 3060 wrote to memory of 2288 3060 cmd.exe adpranui.exe PID 3060 wrote to memory of 2288 3060 cmd.exe adpranui.exe PID 2288 wrote to memory of 2568 2288 adpranui.exe svchost.exe PID 2288 wrote to memory of 2568 2288 adpranui.exe svchost.exe PID 2288 wrote to memory of 2568 2288 adpranui.exe svchost.exe PID 2288 wrote to memory of 2568 2288 adpranui.exe svchost.exe PID 2288 wrote to memory of 2568 2288 adpranui.exe svchost.exe PID 2288 wrote to memory of 2568 2288 adpranui.exe svchost.exe PID 2288 wrote to memory of 2568 2288 adpranui.exe svchost.exe PID 2568 wrote to memory of 1200 2568 svchost.exe Explorer.EXE PID 2568 wrote to memory of 1200 2568 svchost.exe Explorer.EXE PID 2568 wrote to memory of 1200 2568 svchost.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\69fb0b7092d4f247ac065abc6b06042b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\69fb0b7092d4f247ac065abc6b06042b_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\64EC\3276.bat" "C:\Users\Admin\AppData\Roaming\BioCxRes\adpranui.exe" "C:\Users\Admin\AppData\Local\Temp\69FB0B~1.EXE""3⤵
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\BioCxRes\adpranui.exe" "C:\Users\Admin\AppData\Local\Temp\69FB0B~1.EXE""4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Roaming\BioCxRes\adpranui.exe"C:\Users\Admin\AppData\Roaming\BioCxRes\adpranui.exe" "C:\Users\Admin\AppData\Local\Temp\69FB0B~1.EXE"5⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2568
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112B
MD580aff54145da7f612f6cfcc1afa76d25
SHA1ebbfdf0d1268e6cdacbb189d89df053530bbc4c2
SHA25620fde547600247d0882918933f282ddcfd96173b8fef6d5c93487edd96b2303a
SHA51267280590794b6736d9876dbec869d9e9b5c7d34820266bfdd785e72477840a9721c235af7c8ace6970f1c700b099ff47a49ef4f91d76ba53710aa5f9faa3c63f
-
Filesize
586KB
MD569fb0b7092d4f247ac065abc6b06042b
SHA18d8d9b846e2f4624063806291c5875953d67457c
SHA2563eec66b77b94ef402c0b11c496df2f27867d0406dc59540d0bfaff4b271ecc2b
SHA5124f06d42fed4c033b1d835f0b7fc79450a8432c1168f4232d5534f26ec9bc07f5ed6df0a33736f41849b37be3279d23b0fa2b77dfb68ab92caaab9d3ec33a6b78