Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21-07-2024 20:29
Behavioral task
behavioral1
Sample
61489b8f0c9db0196f6f7bef3a866e12_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
61489b8f0c9db0196f6f7bef3a866e12_JaffaCakes118.exe
-
Size
20KB
-
MD5
61489b8f0c9db0196f6f7bef3a866e12
-
SHA1
60c4dd496c44ceb3dfe589c97638e46a7c396f13
-
SHA256
ddd342053fc1b2a05e2e541b1a5caa33e2693e40a0a2b1c086e225f284e4a6cc
-
SHA512
5b884e500b629ab2019d10ed6552a7c080bd0595c11259148e3324ab3d342507bf9ca49b3021caa3abf2aeeceb77b6c4e4343320faaac8d931f67c95ca445b32
-
SSDEEP
384:s1qoism0AbTGmissSGZv/siacUT0gaNJawcudoD7U4WyD5ldZAeKD0:sniRGmGHZXoQnbcuyD7U2DndZAeKD
Malware Config
Extracted
gozi
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
2452.tmppid process 2952 2452.tmp -
Loads dropped DLL 2 IoCs
Processes:
61489b8f0c9db0196f6f7bef3a866e12_JaffaCakes118.exepid process 2356 61489b8f0c9db0196f6f7bef3a866e12_JaffaCakes118.exe 2356 61489b8f0c9db0196f6f7bef3a866e12_JaffaCakes118.exe -
Processes:
resource yara_rule behavioral1/memory/2356-1-0x0000000000400000-0x0000000000410000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
61489b8f0c9db0196f6f7bef3a866e12_JaffaCakes118.exe2452.tmpdescription pid process target process PID 2356 wrote to memory of 2952 2356 61489b8f0c9db0196f6f7bef3a866e12_JaffaCakes118.exe 2452.tmp PID 2356 wrote to memory of 2952 2356 61489b8f0c9db0196f6f7bef3a866e12_JaffaCakes118.exe 2452.tmp PID 2356 wrote to memory of 2952 2356 61489b8f0c9db0196f6f7bef3a866e12_JaffaCakes118.exe 2452.tmp PID 2356 wrote to memory of 2952 2356 61489b8f0c9db0196f6f7bef3a866e12_JaffaCakes118.exe 2452.tmp PID 2952 wrote to memory of 2032 2952 2452.tmp cmd.exe PID 2952 wrote to memory of 2032 2952 2452.tmp cmd.exe PID 2952 wrote to memory of 2032 2952 2452.tmp cmd.exe PID 2952 wrote to memory of 2032 2952 2452.tmp cmd.exe PID 2952 wrote to memory of 2648 2952 2452.tmp cmd.exe PID 2952 wrote to memory of 2648 2952 2452.tmp cmd.exe PID 2952 wrote to memory of 2648 2952 2452.tmp cmd.exe PID 2952 wrote to memory of 2648 2952 2452.tmp cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\61489b8f0c9db0196f6f7bef3a866e12_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\61489b8f0c9db0196f6f7bef3a866e12_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\2452.tmpC:\Users\Admin\AppData\Local\Temp\2452.tmp C:\Users\Admin\AppData\Local\Temp2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpfile0.bat" "3⤵PID:2032
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpfile0.bat" "3⤵PID:2648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
75B
MD5a9f2bc5c96cca7f1f83569d6b8b9f84a
SHA1322b82b1443ae547105fb4878bdeeabb63424926
SHA256160ff09c793512c13fc0f5afa4a4eb84c5f77dc3ab944c160eec764baeba5452
SHA5128ce29d3ded06785deba78ce9b0b1f7485b0ef727d3646eae9e8a696c4dd3713fd341358c6bee5f91bf9eae1a0a13f65df0b9a585f325cddccf33be6f4481394d
-
Filesize
104B
MD5fb00f3b8751c172c30b9f6cd92ba67e2
SHA18bcfb778d455339ad5025f7a3528cf3c469e338d
SHA2566f1cbfc12039af73253b754a99a176fa729e25b137c1ca54cc683776a45bbca0
SHA512d892a4ed6497776910f114dec40da44ef740f18f3081a74f15c9b43c191d18c87be8914440f9fda0dcc93a5c018dcbb00f08f6c7f6d7f20567bf99fc55a370ff
-
Filesize
13B
MD538de427224a5082a04fe82e2bd4ea9ec
SHA17e4a53de1f83762dd2febd39b818e2258bc83bc1
SHA25612f99f53144294750fe8713d580eda286f4bd95cd9c840db8ab957def8040028
SHA512ec3f3c324eeaad91ab0efd47b3084493d863f969344fa1ba87ace1974908053d396673b44c33b4dceeef792a74ad9278e06acc27c83459af1153de52f83afcbf
-
Filesize
13KB
MD5bc5e88e83744bca66feed188f3bd40c9
SHA154b5ca9045f07650639d916adaa571b02d063e9f
SHA25623ebe2ea93ae58b4ececc492a4cfadf7ebece5024d281bef37831695645496d3
SHA512cd86bc7fb9c507e14675f1316fe9918108811d6863449d33c5f34e5a6806abce11c1d7943ee895c820e9e7235b873499429e831966c87e4ade2e7bea80d337a2