Analysis
-
max time kernel
135s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-10-2024 10:55
Behavioral task
behavioral1
Sample
6e8670df26d315d0a4237f0e30059607_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
6e8670df26d315d0a4237f0e30059607_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
6e8670df26d315d0a4237f0e30059607
-
SHA1
98659ad61685fef590d21b8c7cde2ef39616ff6b
-
SHA256
8764cb1626b18c9f17c77f29013f29a838ff19c5ffdcfa2bf1d15fc0d145ba1a
-
SHA512
fc0e19352d8a8cab90f5e73557a64df22ff973a5592ee7a3b2becb13a99ce335a8a9aecf9022b9dd3eba3448a8ab7d183398c9e5c47a00d31e48ff32b12b4b7d
-
SSDEEP
24576:No4XyqBxu2jFr5AUVOzRHFfnbNnurlb2RooGGVhGoGZSvrNL/iYW+IZIyUxU9/9j:S/2jFGFRlfntSlb2mtqxy+5L/iY6ZITe
Malware Config
Extracted
gozi
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4220 6e8670df26d315d0a4237f0e30059607_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/2108-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral2/files/0x000b000000023bfc-12.dat upx behavioral2/memory/4220-14-0x0000000000400000-0x00000000008E7000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6e8670df26d315d0a4237f0e30059607_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6e8670df26d315d0a4237f0e30059607_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2108 6e8670df26d315d0a4237f0e30059607_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2108 6e8670df26d315d0a4237f0e30059607_JaffaCakes118.exe 4220 6e8670df26d315d0a4237f0e30059607_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2108 wrote to memory of 4220 2108 6e8670df26d315d0a4237f0e30059607_JaffaCakes118.exe 84 PID 2108 wrote to memory of 4220 2108 6e8670df26d315d0a4237f0e30059607_JaffaCakes118.exe 84 PID 2108 wrote to memory of 4220 2108 6e8670df26d315d0a4237f0e30059607_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e8670df26d315d0a4237f0e30059607_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6e8670df26d315d0a4237f0e30059607_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\6e8670df26d315d0a4237f0e30059607_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\6e8670df26d315d0a4237f0e30059607_JaffaCakes118.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:4220
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5c465d788dddf6c7c5e95eed53cee255a
SHA1d5e9b14d517904e02a343e443a23dc0d01de7414
SHA256ef983f885544034e7e725d510028ba8a97c0067a149abed00f5f63311ac3658a
SHA512a26022b4d47d12c435de803ffd4b458b796206dfa3563343cc2a0669dc98d589bace4662e47b618ea4977933eb346b6ca77d38c668af9400e17a161adaf8de36