Analysis

  • max time kernel
    141s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    15-09-2024 00:10

General

  • Target

    e1509c589fde2272c0d20072dfe09722_JaffaCakes118.dll

  • Size

    5.1MB

  • MD5

    e1509c589fde2272c0d20072dfe09722

  • SHA1

    81a3044e92d14f6abf9bc813e1e030f6baaed4f2

  • SHA256

    e43ae92ee7ac5cc76535867872ba06b1b96135babafedddccd3d58f38c2b882b

  • SHA512

    a83b77e326225401e0d5ff450d0563909741a42274daffcfa2ccdc736b1e244825a0024756506877e0591599c2ae57094c0edbc3bcf3bb1fdabe1a8ea4baca55

  • SSDEEP

    98304:7xlrOi7+ogZnV34M3B2uXSfjbIWPQCr1tXYJZmaqD/v1:7xB7+PqAIFfjbIWPQCr1tXYJYaqr1

Malware Config

Extracted

Family

zebrocy

C2

http://37.120.140.215/develop/resources.php

Signatures

  • Zebrocy

    Zebrocy is a backdoor created by Sofacy threat group and has multiple variants developed in different languages.

  • Zebrocy Go Variant 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\e1509c589fde2272c0d20072dfe09722_JaffaCakes118.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2300
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\e1509c589fde2272c0d20072dfe09722_JaffaCakes118.dll
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2336

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2336-0-0x0000000061300000-0x0000000061833000-memory.dmp

    Filesize

    5.2MB

  • memory/2336-10-0x0000000061300000-0x0000000061833000-memory.dmp

    Filesize

    5.2MB