Behavioral task
behavioral1
Sample
6fbf4c6d0d683670acf970213d598fd4_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6fbf4c6d0d683670acf970213d598fd4_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
6fbf4c6d0d683670acf970213d598fd4_JaffaCakes118
-
Size
81KB
-
MD5
6fbf4c6d0d683670acf970213d598fd4
-
SHA1
8301244356a221bc139846e09429ac4384a7c64c
-
SHA256
f611b0da56da42faaac1308d3bced4704b2d1cbd4fd373221b9ca9e700f85218
-
SHA512
0721ebbb308ff9301913a20335d7d641af4ec655a4e92b6217832d50d92db99d2084aca0d4f7adc10106347d1bbda90ad375419bc9a9df723da25a473b8eb1a9
-
SSDEEP
1536:P3FeiXaXH/V0u9sQvqM17Jqbhi/ndcManMu6BgX5lz59N07C40O:9n6/V0u9sQvquEMw5l19N07C
Malware Config
Extracted
gozi
Extracted
gozi
30030
62.75.195.103
62.75.195.117
-
exe_type
loader
-
server_id
12
Signatures
-
Gozi family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6fbf4c6d0d683670acf970213d598fd4_JaffaCakes118
Files
-
6fbf4c6d0d683670acf970213d598fd4_JaffaCakes118.exe windows:4 windows x86 arch:x86
22f5c90994c32056c96eab44f126e121
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
RtlNtStatusToDosError
mbstowcs
ZwOpenProcess
ZwQueryInformationToken
ZwOpenProcessToken
memcpy
memset
ZwQueryInformationProcess
ZwClose
NtCreateSection
NtUnmapViewOfSection
RtlUpcaseUnicodeString
RtlFreeUnicodeString
NtMapViewOfSection
NtQuerySystemInformation
RtlImageNtHeader
RtlUnwind
NtQueryVirtualMemory
shlwapi
StrChrA
StrRChrA
StrChrW
StrTrimW
kernel32
DeleteFileW
ResetEvent
CreateWaitableTimerA
CloseHandle
UnmapViewOfFile
CreateFileMappingA
SetFileAttributesW
CreateProcessA
HeapAlloc
SetWaitableTimer
GetExitCodeProcess
lstrlenA
GetProcAddress
CreateEventA
SetEvent
GetLastError
lstrcatW
Sleep
lstrlenW
HeapFree
GetCommandLineW
ExitProcess
GetModuleHandleA
HeapCreate
HeapDestroy
WaitForSingleObject
MapViewOfFile
VirtualProtectEx
ResumeThread
SuspendThread
lstrcmpA
ExpandEnvironmentStringsA
lstrcpynA
GetModuleFileNameW
GetLongPathNameW
OpenProcess
GetVersion
GetCurrentProcessId
FindNextFileA
ReadFile
CompareFileTime
lstrcatA
GetFileTime
lstrcpyA
FindFirstFileA
FindClose
CreateFileA
LocalFree
GetModuleFileNameA
SetLastError
lstrcmpiA
VirtualFree
VirtualAlloc
SetFilePointer
user32
GetCursorInfo
wsprintfA
FindWindowA
advapi32
ConvertStringSecurityDescriptorToSecurityDescriptorA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ