Analysis
-
max time kernel
90s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
22-10-2024 06:37
Static task
static1
Behavioral task
behavioral1
Sample
695579360bdbdab40a0df450af10628d_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
695579360bdbdab40a0df450af10628d_JaffaCakes118.exe
-
Size
474KB
-
MD5
695579360bdbdab40a0df450af10628d
-
SHA1
254c8f577b9f44727de32aa440328ef00955db59
-
SHA256
29ac9f2b359f91e5403bd422e55fa24ce3f890adc58b59bee29d7b0e3a8259e6
-
SHA512
9314b8dc206a798e05db9796e64da2ed177b8d23777ffb23ca7ebdec63f438a516be6b01c9e65b7c76355bc96e220124200d3e1400d34e4fc094314d50e098ed
-
SSDEEP
6144:uB4cfIB+6+AVbYXkbv7xxfC0Gwxbr6hYYJg:uehB+YVbYUbjxx60b
Malware Config
Extracted
gozi
Extracted
gozi
1010
diuolirt.at
deopliazae.at
nifredao.com
filokiyurt.at
-
exe_type
worker
-
server_id
12
Signatures
-
Deletes itself 1 IoCs
pid Process 2948 comrdemx.exe -
Executes dropped EXE 1 IoCs
pid Process 2948 comrdemx.exe -
Loads dropped DLL 1 IoCs
pid Process 2900 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\appmters = "C:\\Users\\Admin\\AppData\\Roaming\\AltTeSvr\\comrdemx.exe" 695579360bdbdab40a0df450af10628d_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2948 set thread context of 2788 2948 comrdemx.exe 34 PID 2788 set thread context of 1360 2788 svchost.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 695579360bdbdab40a0df450af10628d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language comrdemx.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2948 comrdemx.exe 1360 Explorer.EXE -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2948 comrdemx.exe 2788 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1360 Explorer.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2744 wrote to memory of 2804 2744 695579360bdbdab40a0df450af10628d_JaffaCakes118.exe 30 PID 2744 wrote to memory of 2804 2744 695579360bdbdab40a0df450af10628d_JaffaCakes118.exe 30 PID 2744 wrote to memory of 2804 2744 695579360bdbdab40a0df450af10628d_JaffaCakes118.exe 30 PID 2744 wrote to memory of 2804 2744 695579360bdbdab40a0df450af10628d_JaffaCakes118.exe 30 PID 2804 wrote to memory of 2900 2804 cmd.exe 32 PID 2804 wrote to memory of 2900 2804 cmd.exe 32 PID 2804 wrote to memory of 2900 2804 cmd.exe 32 PID 2804 wrote to memory of 2900 2804 cmd.exe 32 PID 2900 wrote to memory of 2948 2900 cmd.exe 33 PID 2900 wrote to memory of 2948 2900 cmd.exe 33 PID 2900 wrote to memory of 2948 2900 cmd.exe 33 PID 2900 wrote to memory of 2948 2900 cmd.exe 33 PID 2948 wrote to memory of 2788 2948 comrdemx.exe 34 PID 2948 wrote to memory of 2788 2948 comrdemx.exe 34 PID 2948 wrote to memory of 2788 2948 comrdemx.exe 34 PID 2948 wrote to memory of 2788 2948 comrdemx.exe 34 PID 2948 wrote to memory of 2788 2948 comrdemx.exe 34 PID 2948 wrote to memory of 2788 2948 comrdemx.exe 34 PID 2948 wrote to memory of 2788 2948 comrdemx.exe 34 PID 2788 wrote to memory of 1360 2788 svchost.exe 21 PID 2788 wrote to memory of 1360 2788 svchost.exe 21 PID 2788 wrote to memory of 1360 2788 svchost.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\695579360bdbdab40a0df450af10628d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\695579360bdbdab40a0df450af10628d_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\81C\840E.bat" "C:\Users\Admin\AppData\Roaming\AltTeSvr\comrdemx.exe" "C:\Users\Admin\AppData\Local\Temp\695579~1.EXE""3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\AltTeSvr\comrdemx.exe" "C:\Users\Admin\AppData\Local\Temp\695579~1.EXE""4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Roaming\AltTeSvr\comrdemx.exe"C:\Users\Admin\AppData\Roaming\AltTeSvr\comrdemx.exe" "C:\Users\Admin\AppData\Local\Temp\695579~1.EXE"5⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2788
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112B
MD5f07100985dbef60c059c54030dd8630c
SHA138ac2dfac5ec1122d0c106d8de3d8d47e645a53f
SHA256b5fb9e15ee1bd26e38546fce527e4eaf081c088af35bc5b1c6e147d036959587
SHA512722fc0e342b3bcabc81eec9d65c11c1c3c2eef720a6945671ba6ef9250148c1201ed9929d785958355c71d2ba60aeb8165683f2d057c349ff262acf34c9bb60b
-
Filesize
474KB
MD5695579360bdbdab40a0df450af10628d
SHA1254c8f577b9f44727de32aa440328ef00955db59
SHA25629ac9f2b359f91e5403bd422e55fa24ce3f890adc58b59bee29d7b0e3a8259e6
SHA5129314b8dc206a798e05db9796e64da2ed177b8d23777ffb23ca7ebdec63f438a516be6b01c9e65b7c76355bc96e220124200d3e1400d34e4fc094314d50e098ed