Analysis Overview
SHA256
4cef6e60b966b6096985dc9cf9c5b16e4618d4ec8167163c35cbb7b7926988c6
Threat Level: Known bad
The file 2db7dc6d308382c95a066b798a8f83bc_JaffaCakes118 was found to be: Known bad.
Malicious Activity Summary
Gozi
Executes dropped EXE
Deletes itself
Loads dropped DLL
UPX packed file
Unsigned PE
System Location Discovery: System Language Discovery
Suspicious behavior: RenamesItself
Suspicious use of WriteProcessMemory
Suspicious use of UnmapMainImage
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-10-09 08:12
Signatures
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-10-09 08:12
Reported
2024-10-09 20:04
Platform
win7-20240903-en
Max time kernel
122s
Max time network
124s
Command Line
Signatures
Deletes itself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2db7dc6d308382c95a066b798a8f83bc_JaffaCakes118.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2db7dc6d308382c95a066b798a8f83bc_JaffaCakes118.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2db7dc6d308382c95a066b798a8f83bc_JaffaCakes118.exe | N/A |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\2db7dc6d308382c95a066b798a8f83bc_JaffaCakes118.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\2db7dc6d308382c95a066b798a8f83bc_JaffaCakes118.exe | N/A |
Suspicious behavior: RenamesItself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2db7dc6d308382c95a066b798a8f83bc_JaffaCakes118.exe | N/A |
Suspicious use of UnmapMainImage
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2db7dc6d308382c95a066b798a8f83bc_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2db7dc6d308382c95a066b798a8f83bc_JaffaCakes118.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 876 wrote to memory of 2348 | N/A | C:\Users\Admin\AppData\Local\Temp\2db7dc6d308382c95a066b798a8f83bc_JaffaCakes118.exe | C:\Users\Admin\AppData\Local\Temp\2db7dc6d308382c95a066b798a8f83bc_JaffaCakes118.exe |
| PID 876 wrote to memory of 2348 | N/A | C:\Users\Admin\AppData\Local\Temp\2db7dc6d308382c95a066b798a8f83bc_JaffaCakes118.exe | C:\Users\Admin\AppData\Local\Temp\2db7dc6d308382c95a066b798a8f83bc_JaffaCakes118.exe |
| PID 876 wrote to memory of 2348 | N/A | C:\Users\Admin\AppData\Local\Temp\2db7dc6d308382c95a066b798a8f83bc_JaffaCakes118.exe | C:\Users\Admin\AppData\Local\Temp\2db7dc6d308382c95a066b798a8f83bc_JaffaCakes118.exe |
| PID 876 wrote to memory of 2348 | N/A | C:\Users\Admin\AppData\Local\Temp\2db7dc6d308382c95a066b798a8f83bc_JaffaCakes118.exe | C:\Users\Admin\AppData\Local\Temp\2db7dc6d308382c95a066b798a8f83bc_JaffaCakes118.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\2db7dc6d308382c95a066b798a8f83bc_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\2db7dc6d308382c95a066b798a8f83bc_JaffaCakes118.exe"
C:\Users\Admin\AppData\Local\Temp\2db7dc6d308382c95a066b798a8f83bc_JaffaCakes118.exe
C:\Users\Admin\AppData\Local\Temp\2db7dc6d308382c95a066b798a8f83bc_JaffaCakes118.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | zipansion.com | udp |
| US | 104.21.73.114:80 | zipansion.com | tcp |
| US | 8.8.8.8:53 | publisher.linkvertise.com | udp |
| US | 104.22.22.72:443 | publisher.linkvertise.com | tcp |
| US | 8.8.8.8:53 | c.pki.goog | udp |
| GB | 142.250.187.195:80 | c.pki.goog | tcp |
| US | 8.8.8.8:53 | linkvertise.com | udp |
| US | 104.22.23.72:443 | linkvertise.com | tcp |
| US | 8.8.8.8:53 | crl.microsoft.com | udp |
| GB | 2.19.117.22:80 | crl.microsoft.com | tcp |
Files
memory/876-0-0x0000000000400000-0x000000000086A000-memory.dmp
memory/876-2-0x0000000001A60000-0x0000000001B72000-memory.dmp
memory/876-1-0x0000000000400000-0x00000000005F2000-memory.dmp
\Users\Admin\AppData\Local\Temp\2db7dc6d308382c95a066b798a8f83bc_JaffaCakes118.exe
| MD5 | a1848b57cd6d68888533490ebd0c00a1 |
| SHA1 | 6a8125e5a2aba9ddf7c6b876ba0f879488975ce8 |
| SHA256 | 8afab5170d17645b4c23d7acdc5feadb5a5148eb92cbbbcadcb5407a81c6e658 |
| SHA512 | 81ba1562e161fc7c9e324d7208bcaf2064df72a21a6c114c7acd8c68e8a024079462d6b7b7b8da85bd2a9d39ef9c982117fb281946ec54b147377bb21254bed3 |
memory/876-15-0x00000000034F0000-0x000000000395A000-memory.dmp
memory/2348-23-0x0000000000400000-0x000000000086A000-memory.dmp
memory/2348-24-0x0000000001A60000-0x0000000001B72000-memory.dmp
memory/2348-17-0x0000000000400000-0x00000000005F2000-memory.dmp
memory/876-14-0x0000000000400000-0x00000000005F2000-memory.dmp
memory/876-41-0x00000000034F0000-0x000000000395A000-memory.dmp
memory/2348-42-0x0000000000400000-0x000000000086A000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-10-09 08:12
Reported
2024-10-09 20:04
Platform
win10v2004-20241007-en
Max time kernel
95s
Max time network
114s
Command Line
Signatures
Gozi
Deletes itself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2db7dc6d308382c95a066b798a8f83bc_JaffaCakes118.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2db7dc6d308382c95a066b798a8f83bc_JaffaCakes118.exe | N/A |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\2db7dc6d308382c95a066b798a8f83bc_JaffaCakes118.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\2db7dc6d308382c95a066b798a8f83bc_JaffaCakes118.exe | N/A |
Suspicious behavior: RenamesItself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2db7dc6d308382c95a066b798a8f83bc_JaffaCakes118.exe | N/A |
Suspicious use of UnmapMainImage
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2db7dc6d308382c95a066b798a8f83bc_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2db7dc6d308382c95a066b798a8f83bc_JaffaCakes118.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 3100 wrote to memory of 3232 | N/A | C:\Users\Admin\AppData\Local\Temp\2db7dc6d308382c95a066b798a8f83bc_JaffaCakes118.exe | C:\Users\Admin\AppData\Local\Temp\2db7dc6d308382c95a066b798a8f83bc_JaffaCakes118.exe |
| PID 3100 wrote to memory of 3232 | N/A | C:\Users\Admin\AppData\Local\Temp\2db7dc6d308382c95a066b798a8f83bc_JaffaCakes118.exe | C:\Users\Admin\AppData\Local\Temp\2db7dc6d308382c95a066b798a8f83bc_JaffaCakes118.exe |
| PID 3100 wrote to memory of 3232 | N/A | C:\Users\Admin\AppData\Local\Temp\2db7dc6d308382c95a066b798a8f83bc_JaffaCakes118.exe | C:\Users\Admin\AppData\Local\Temp\2db7dc6d308382c95a066b798a8f83bc_JaffaCakes118.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\2db7dc6d308382c95a066b798a8f83bc_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\2db7dc6d308382c95a066b798a8f83bc_JaffaCakes118.exe"
C:\Users\Admin\AppData\Local\Temp\2db7dc6d308382c95a066b798a8f83bc_JaffaCakes118.exe
C:\Users\Admin\AppData\Local\Temp\2db7dc6d308382c95a066b798a8f83bc_JaffaCakes118.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | zipansion.com | udp |
| US | 104.21.73.114:80 | zipansion.com | tcp |
| US | 8.8.8.8:53 | publisher.linkvertise.com | udp |
| US | 104.22.22.72:443 | publisher.linkvertise.com | tcp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 114.73.21.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 72.22.22.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 150.171.27.10:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | c.pki.goog | udp |
| GB | 142.250.187.195:80 | c.pki.goog | tcp |
| US | 8.8.8.8:53 | linkvertise.com | udp |
| US | 104.22.22.72:443 | linkvertise.com | tcp |
| US | 8.8.8.8:53 | 134.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 195.187.250.142.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.31.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 53.210.109.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 100.209.201.84.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 83.210.23.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 19.229.111.52.in-addr.arpa | udp |
Files
memory/3100-0-0x0000000000400000-0x000000000086A000-memory.dmp
memory/3100-1-0x0000000001C50000-0x0000000001D62000-memory.dmp
memory/3100-3-0x0000000000400000-0x00000000005F2000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\2db7dc6d308382c95a066b798a8f83bc_JaffaCakes118.exe
| MD5 | b0fe8d174d1e8e1f50e717abee09da10 |
| SHA1 | 389a5829ddff20107d2d04ccf8b6dd5c520f5f61 |
| SHA256 | 4f4036dc77a530eedcb08a267dd71c41ccc7f061b8a7861397b36aeff864bdf1 |
| SHA512 | adacc307962eb6ae4a0c9ffbf164b136a5605c38f2a650de168e1a6c187db619e3dcc2dfbbe540ccbb37531082b95ee78b4e08dad4877ebfea2f4a279210504a |
memory/3100-13-0x0000000000400000-0x00000000005F2000-memory.dmp
memory/3232-14-0x0000000000400000-0x00000000005F2000-memory.dmp
memory/3232-21-0x0000000001870000-0x0000000001982000-memory.dmp
memory/3232-20-0x0000000000400000-0x000000000086A000-memory.dmp
memory/3232-31-0x0000000000400000-0x000000000086A000-memory.dmp