Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-09-2024 21:01

General

  • Target

    ee6a0423ca9a7940c286a470d2db0a43_JaffaCakes118.exe

  • Size

    120KB

  • MD5

    ee6a0423ca9a7940c286a470d2db0a43

  • SHA1

    5e9e110597d77b2e40e9e4b8a253eb5fb20a085d

  • SHA256

    14d150a2ea315ad6ebe5b0f6cf2093d474636c3ed7af97f5f322f56194077bf9

  • SHA512

    b71979e80ba0efc858712e2b5cf17568b5b57d7a6dc34435eedb344eaee1194fb01e7647fe6679c4c7e4c45096c3d3a3c19ba9476ecfd7fa5b93e522dab9b1ca

  • SSDEEP

    3072:Z9mQrWSB/WM+dCB+IF1G6sT11I0E9TAUQ+iU2r2:Z9USBOMNBNF1cxy0E9TAUQ+iU2r2

Malware Config

Extracted

Family

gootkit

Botnet

308

C2

waabitii.com

buyyou.org

pep.hheadz4life.com

trktrk.org

fields.mobi

Attributes
  • vendor_id

    308

Signatures

  • Gootkit

    Gootkit is a banking trojan, where large parts are written in node.JS.

  • Deletes itself 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee6a0423ca9a7940c286a470d2db0a43_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ee6a0423ca9a7940c286a470d2db0a43_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:2692
    • C:\Windows\SysWOW64\mstsc.exe
      C:\Windows\System32\mstsc.exe "C:\Users\Admin\AppData\Local\Temp\ee6a0423ca9a7940c286a470d2db0a43_JaffaCakes118.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2760
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\259470456.bat" "C:\Users\Admin\AppData\Local\Temp\ee6a0423ca9a7940c286a470d2db0a43_JaffaCakes118.exe""
        3⤵
        • Deletes itself
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3012
        • C:\Windows\SysWOW64\attrib.exe
          attrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\ee6a0423ca9a7940c286a470d2db0a43_JaffaCakes118.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:2388

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\259470456.bat

    Filesize

    76B

    MD5

    a91773772764d033215df75c3f60ee30

    SHA1

    a38e5c5bc984a7145b0e461f2016a65ad29aab81

    SHA256

    32c9358aac843fbf8dd98950b4cfcf7e97028672bd59109d00f67e4da8e16bf0

    SHA512

    fd8ddb44df6b5a4f9c320527e2957e5232c18c0c1004b8d3453586d145378a2815bca0b6b4c38a87ab0652ba8437176205a62ef0f036a32dfdc9aeeb7f0a87da

  • memory/2760-0-0x0000000000080000-0x00000000000A0000-memory.dmp

    Filesize

    128KB

  • memory/2760-9-0x0000000000080000-0x00000000000A0000-memory.dmp

    Filesize

    128KB