Analysis
-
max time kernel
139s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
21-07-2024 20:29
Behavioral task
behavioral1
Sample
61489b8f0c9db0196f6f7bef3a866e12_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
61489b8f0c9db0196f6f7bef3a866e12_JaffaCakes118.exe
-
Size
20KB
-
MD5
61489b8f0c9db0196f6f7bef3a866e12
-
SHA1
60c4dd496c44ceb3dfe589c97638e46a7c396f13
-
SHA256
ddd342053fc1b2a05e2e541b1a5caa33e2693e40a0a2b1c086e225f284e4a6cc
-
SHA512
5b884e500b629ab2019d10ed6552a7c080bd0595c11259148e3324ab3d342507bf9ca49b3021caa3abf2aeeceb77b6c4e4343320faaac8d931f67c95ca445b32
-
SSDEEP
384:s1qoism0AbTGmissSGZv/siacUT0gaNJawcudoD7U4WyD5ldZAeKD0:sniRGmGHZXoQnbcuyD7U2DndZAeKD
Malware Config
Extracted
gozi
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
7927.tmpdescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation 7927.tmp -
Executes dropped EXE 1 IoCs
Processes:
7927.tmppid process 216 7927.tmp -
Processes:
resource yara_rule behavioral2/memory/1448-0-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/1448-8-0x0000000000400000-0x0000000000410000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
61489b8f0c9db0196f6f7bef3a866e12_JaffaCakes118.exe7927.tmpdescription pid process target process PID 1448 wrote to memory of 216 1448 61489b8f0c9db0196f6f7bef3a866e12_JaffaCakes118.exe 7927.tmp PID 1448 wrote to memory of 216 1448 61489b8f0c9db0196f6f7bef3a866e12_JaffaCakes118.exe 7927.tmp PID 1448 wrote to memory of 216 1448 61489b8f0c9db0196f6f7bef3a866e12_JaffaCakes118.exe 7927.tmp PID 216 wrote to memory of 3720 216 7927.tmp cmd.exe PID 216 wrote to memory of 3720 216 7927.tmp cmd.exe PID 216 wrote to memory of 3720 216 7927.tmp cmd.exe PID 216 wrote to memory of 4448 216 7927.tmp cmd.exe PID 216 wrote to memory of 4448 216 7927.tmp cmd.exe PID 216 wrote to memory of 4448 216 7927.tmp cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\61489b8f0c9db0196f6f7bef3a866e12_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\61489b8f0c9db0196f6f7bef3a866e12_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\7927.tmpC:\Users\Admin\AppData\Local\Temp\7927.tmp C:\Users\Admin\AppData\Local\Temp2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpfile0.bat" "3⤵PID:3720
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpfile0.bat" "3⤵PID:4448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD5bc5e88e83744bca66feed188f3bd40c9
SHA154b5ca9045f07650639d916adaa571b02d063e9f
SHA25623ebe2ea93ae58b4ececc492a4cfadf7ebece5024d281bef37831695645496d3
SHA512cd86bc7fb9c507e14675f1316fe9918108811d6863449d33c5f34e5a6806abce11c1d7943ee895c820e9e7235b873499429e831966c87e4ade2e7bea80d337a2
-
Filesize
75B
MD5a9f2bc5c96cca7f1f83569d6b8b9f84a
SHA1322b82b1443ae547105fb4878bdeeabb63424926
SHA256160ff09c793512c13fc0f5afa4a4eb84c5f77dc3ab944c160eec764baeba5452
SHA5128ce29d3ded06785deba78ce9b0b1f7485b0ef727d3646eae9e8a696c4dd3713fd341358c6bee5f91bf9eae1a0a13f65df0b9a585f325cddccf33be6f4481394d
-
Filesize
104B
MD5ff2d1cab0d0a5baef355018454998492
SHA178f9c734afa9392e5722290efc6bf587b599814c
SHA256af1c06c15a12194c3ffa0cf053c1208db4a3ab61cb23eb78a96fa97cb137a1bd
SHA512e6be98ad9bb77de39270817267cc1c2194829514cabc9eb1d368b048ecaff97bb5fc0983aa3198d68ab87cb51876d7f1ae8f22419f407fd2dc22b784600e0d6f
-
Filesize
13B
MD538de427224a5082a04fe82e2bd4ea9ec
SHA17e4a53de1f83762dd2febd39b818e2258bc83bc1
SHA25612f99f53144294750fe8713d580eda286f4bd95cd9c840db8ab957def8040028
SHA512ec3f3c324eeaad91ab0efd47b3084493d863f969344fa1ba87ace1974908053d396673b44c33b4dceeef792a74ad9278e06acc27c83459af1153de52f83afcbf