Analysis
-
max time kernel
140s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-10-2024 11:37
Behavioral task
behavioral1
Sample
1d3cd5942c096f8d35e17f80da41ef60_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
1d3cd5942c096f8d35e17f80da41ef60_JaffaCakes118.exe
-
Size
393KB
-
MD5
1d3cd5942c096f8d35e17f80da41ef60
-
SHA1
a36851dc46e061cb6063b0fe7b9111ef2ba968c1
-
SHA256
9d8ddfac510186612e769321f66c104b72f54c514457c10537a94523e331b502
-
SHA512
85f7c2bbd72550c9424d7ee0df5199ecfac9fe47e5a64290b09e425936f22bf452f987767a48dd86617bf7ded8ac1174e716b323135a642a30ca5e8a6405d790
-
SSDEEP
6144:TrDJa7rspPBcndOjm+qzLzIke3cssoofBT+ArtkQ77QTveZAS16+Eb04PL38jfuZ:3DJaOBAj+qLD5lBVttIv+AUVEomL8KZP
Malware Config
Extracted
gozi
Signatures
-
resource yara_rule behavioral2/memory/4448-0-0x0000000000400000-0x000000000057D000-memory.dmp upx behavioral2/memory/4448-1-0x0000000000400000-0x000000000057D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1d3cd5942c096f8d35e17f80da41ef60_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4448 1d3cd5942c096f8d35e17f80da41ef60_JaffaCakes118.exe 4448 1d3cd5942c096f8d35e17f80da41ef60_JaffaCakes118.exe