Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 02:12
Static task
static1
Behavioral task
behavioral1
Sample
28fbd3fc99308421a8af62da8b3dda15_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
28fbd3fc99308421a8af62da8b3dda15_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
lioncels.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
lioncels.dll
Resource
win10v2004-20241007-en
General
-
Target
28fbd3fc99308421a8af62da8b3dda15_JaffaCakes118.exe
-
Size
385KB
-
MD5
28fbd3fc99308421a8af62da8b3dda15
-
SHA1
4ad2ee7a1d57ccbf234776f4de1e0794333ae87e
-
SHA256
9a83965820f95e2ef43f07816d1dc949a00f44743a3d221a45533588090853e9
-
SHA512
c01f6cbcf527e212d07a9f732914f8822ef82bfe8feaa1dff8054062b665f1475600f88a3e071160662307f468cfc06b21d0800d4ac4e7c732f0097ac1eb9011
-
SSDEEP
6144:N8wU0T8AVLbWkgZyTSFWnGC463wBNfEbEBJry11XANEygLCjeZuLupwVroY0E0Oi:608AVLb0ESFWnGC2sEBaOT6un5oE0pp
Malware Config
Extracted
gozi
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 392 28fbd3fc99308421a8af62da8b3dda15_JaffaCakes118.exe 392 28fbd3fc99308421a8af62da8b3dda15_JaffaCakes118.exe 392 28fbd3fc99308421a8af62da8b3dda15_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 392 set thread context of 3496 392 28fbd3fc99308421a8af62da8b3dda15_JaffaCakes118.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28fbd3fc99308421a8af62da8b3dda15_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 392 wrote to memory of 3496 392 28fbd3fc99308421a8af62da8b3dda15_JaffaCakes118.exe 86 PID 392 wrote to memory of 3496 392 28fbd3fc99308421a8af62da8b3dda15_JaffaCakes118.exe 86 PID 392 wrote to memory of 3496 392 28fbd3fc99308421a8af62da8b3dda15_JaffaCakes118.exe 86 PID 392 wrote to memory of 3496 392 28fbd3fc99308421a8af62da8b3dda15_JaffaCakes118.exe 86 PID 392 wrote to memory of 3496 392 28fbd3fc99308421a8af62da8b3dda15_JaffaCakes118.exe 86 PID 392 wrote to memory of 3496 392 28fbd3fc99308421a8af62da8b3dda15_JaffaCakes118.exe 86 PID 392 wrote to memory of 3496 392 28fbd3fc99308421a8af62da8b3dda15_JaffaCakes118.exe 86 PID 392 wrote to memory of 3496 392 28fbd3fc99308421a8af62da8b3dda15_JaffaCakes118.exe 86 PID 392 wrote to memory of 3496 392 28fbd3fc99308421a8af62da8b3dda15_JaffaCakes118.exe 86 PID 392 wrote to memory of 3496 392 28fbd3fc99308421a8af62da8b3dda15_JaffaCakes118.exe 86 PID 392 wrote to memory of 3496 392 28fbd3fc99308421a8af62da8b3dda15_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\28fbd3fc99308421a8af62da8b3dda15_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\28fbd3fc99308421a8af62da8b3dda15_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\28fbd3fc99308421a8af62da8b3dda15_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\28fbd3fc99308421a8af62da8b3dda15_JaffaCakes118.exe"2⤵PID:3496
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5877928bb6863631a29aa72bfb42f45c3
SHA1836842655340ebac488f43a6408211dd36422e69
SHA25631a45c9a62b9c2392ab7b5bbdfae800c3d5433e5301683188100a7ca3b1ed864
SHA512efa0b7220285b5c22fc6afb6f6c00da897a5647cdb38023bbf6e0d51868746e39354944457c7ef6dbda01a4e3a5fef53659e4f746c88ef2887f9c94168955d85
-
Filesize
11KB
MD53e6bf00b3ac976122f982ae2aadb1c51
SHA1caab188f7fdc84d3fdcb2922edeeb5ed576bd31d
SHA2564ff9b2678d698677c5d9732678f9cf53f17290e09d053691aac4cc6e6f595cbe
SHA5121286f05e6a7e6b691f6e479638e7179897598e171b52eb3a3dc0e830415251069d29416b6d1ffc6d7dce8da5625e1479be06db9b7179e7776659c5c1ad6aa706