Analysis
-
max time kernel
55s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
23-10-2024 09:38
Static task
static1
Behavioral task
behavioral1
Sample
6e352a6e96db293f487d1c1996f7ca60_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
6e352a6e96db293f487d1c1996f7ca60_JaffaCakes118.exe
-
Size
507KB
-
MD5
6e352a6e96db293f487d1c1996f7ca60
-
SHA1
887a357a96b9dbb428b6b776a3ec8ca8de746f18
-
SHA256
49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6
-
SHA512
bad3b109707b7ba714ccfd41109d6defe9aa2c651cd7dd8c91f536622fa52394071e858a81a2844421a56219527737d395580ea73e250f6cb44c4c1c4959351d
-
SSDEEP
12288:IEi3NId2zO8PW418jZZUozZuzYgwz3r14Y07KCJ:GrdZ+tZlVUYBzB0KC
Malware Config
Extracted
gozi
-
build
215798
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2700 comrdemx.exe 1128 comrdemx.exe -
Loads dropped DLL 2 IoCs
pid Process 2752 cmd.exe 2752 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\appmters = "C:\\Users\\Admin\\AppData\\Roaming\\AltTeSvr\\comrdemx.exe" 6e352a6e96db293f487d1c1996f7ca60_JaffaCakes118.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2524 set thread context of 2716 2524 6e352a6e96db293f487d1c1996f7ca60_JaffaCakes118.exe 29 PID 2700 set thread context of 1128 2700 comrdemx.exe 34 PID 1128 set thread context of 1316 1128 comrdemx.exe 35 PID 1316 set thread context of 1396 1316 svchost.exe 20 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language comrdemx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language comrdemx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6e352a6e96db293f487d1c1996f7ca60_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6e352a6e96db293f487d1c1996f7ca60_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1128 comrdemx.exe 1396 Explorer.EXE -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1128 comrdemx.exe 1316 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1396 Explorer.EXE -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2716 2524 6e352a6e96db293f487d1c1996f7ca60_JaffaCakes118.exe 29 PID 2524 wrote to memory of 2716 2524 6e352a6e96db293f487d1c1996f7ca60_JaffaCakes118.exe 29 PID 2524 wrote to memory of 2716 2524 6e352a6e96db293f487d1c1996f7ca60_JaffaCakes118.exe 29 PID 2524 wrote to memory of 2716 2524 6e352a6e96db293f487d1c1996f7ca60_JaffaCakes118.exe 29 PID 2524 wrote to memory of 2716 2524 6e352a6e96db293f487d1c1996f7ca60_JaffaCakes118.exe 29 PID 2524 wrote to memory of 2716 2524 6e352a6e96db293f487d1c1996f7ca60_JaffaCakes118.exe 29 PID 2524 wrote to memory of 2716 2524 6e352a6e96db293f487d1c1996f7ca60_JaffaCakes118.exe 29 PID 2524 wrote to memory of 2716 2524 6e352a6e96db293f487d1c1996f7ca60_JaffaCakes118.exe 29 PID 2524 wrote to memory of 2716 2524 6e352a6e96db293f487d1c1996f7ca60_JaffaCakes118.exe 29 PID 2524 wrote to memory of 2716 2524 6e352a6e96db293f487d1c1996f7ca60_JaffaCakes118.exe 29 PID 2524 wrote to memory of 2716 2524 6e352a6e96db293f487d1c1996f7ca60_JaffaCakes118.exe 29 PID 2716 wrote to memory of 2840 2716 6e352a6e96db293f487d1c1996f7ca60_JaffaCakes118.exe 30 PID 2716 wrote to memory of 2840 2716 6e352a6e96db293f487d1c1996f7ca60_JaffaCakes118.exe 30 PID 2716 wrote to memory of 2840 2716 6e352a6e96db293f487d1c1996f7ca60_JaffaCakes118.exe 30 PID 2716 wrote to memory of 2840 2716 6e352a6e96db293f487d1c1996f7ca60_JaffaCakes118.exe 30 PID 2840 wrote to memory of 2752 2840 cmd.exe 32 PID 2840 wrote to memory of 2752 2840 cmd.exe 32 PID 2840 wrote to memory of 2752 2840 cmd.exe 32 PID 2840 wrote to memory of 2752 2840 cmd.exe 32 PID 2752 wrote to memory of 2700 2752 cmd.exe 33 PID 2752 wrote to memory of 2700 2752 cmd.exe 33 PID 2752 wrote to memory of 2700 2752 cmd.exe 33 PID 2752 wrote to memory of 2700 2752 cmd.exe 33 PID 2700 wrote to memory of 1128 2700 comrdemx.exe 34 PID 2700 wrote to memory of 1128 2700 comrdemx.exe 34 PID 2700 wrote to memory of 1128 2700 comrdemx.exe 34 PID 2700 wrote to memory of 1128 2700 comrdemx.exe 34 PID 2700 wrote to memory of 1128 2700 comrdemx.exe 34 PID 2700 wrote to memory of 1128 2700 comrdemx.exe 34 PID 2700 wrote to memory of 1128 2700 comrdemx.exe 34 PID 2700 wrote to memory of 1128 2700 comrdemx.exe 34 PID 2700 wrote to memory of 1128 2700 comrdemx.exe 34 PID 2700 wrote to memory of 1128 2700 comrdemx.exe 34 PID 2700 wrote to memory of 1128 2700 comrdemx.exe 34 PID 1128 wrote to memory of 1316 1128 comrdemx.exe 35 PID 1128 wrote to memory of 1316 1128 comrdemx.exe 35 PID 1128 wrote to memory of 1316 1128 comrdemx.exe 35 PID 1128 wrote to memory of 1316 1128 comrdemx.exe 35 PID 1128 wrote to memory of 1316 1128 comrdemx.exe 35 PID 1128 wrote to memory of 1316 1128 comrdemx.exe 35 PID 1128 wrote to memory of 1316 1128 comrdemx.exe 35 PID 1316 wrote to memory of 1396 1316 svchost.exe 20 PID 1316 wrote to memory of 1396 1316 svchost.exe 20 PID 1316 wrote to memory of 1396 1316 svchost.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\6e352a6e96db293f487d1c1996f7ca60_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6e352a6e96db293f487d1c1996f7ca60_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\6e352a6e96db293f487d1c1996f7ca60_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6e352a6e96db293f487d1c1996f7ca60_JaffaCakes118.exe"3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\CE86\E743.bat" "C:\Users\Admin\AppData\Roaming\AltTeSvr\comrdemx.exe" "C:\Users\Admin\AppData\Local\Temp\6E352A~1.EXE""4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\AltTeSvr\comrdemx.exe" "C:\Users\Admin\AppData\Local\Temp\6E352A~1.EXE""5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Roaming\AltTeSvr\comrdemx.exe"C:\Users\Admin\AppData\Roaming\AltTeSvr\comrdemx.exe" "C:\Users\Admin\AppData\Local\Temp\6E352A~1.EXE"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Roaming\AltTeSvr\comrdemx.exe"C:\Users\Admin\AppData\Roaming\AltTeSvr\comrdemx.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe8⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1316
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112B
MD5cabc4aa7175a0c13a72116dbf32e6b5a
SHA1f0f17ace0e2959330cc0f00d1578208443fad6cd
SHA256aa280b630bc4a2af76b3fdb884ee0863b7004db2afdce6d459b62ade6d43197f
SHA512118ddcd5e0d4611e02b9e611a3b1c253970fbd67e884d8ae5bf9a6b4192cddf641090f400182cdefe78d758e8a26d18f787c75c1674c902764e4e64973916f09
-
Filesize
507KB
MD56e352a6e96db293f487d1c1996f7ca60
SHA1887a357a96b9dbb428b6b776a3ec8ca8de746f18
SHA25649b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6
SHA512bad3b109707b7ba714ccfd41109d6defe9aa2c651cd7dd8c91f536622fa52394071e858a81a2844421a56219527737d395580ea73e250f6cb44c4c1c4959351d