Analysis
-
max time kernel
128s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-11-2024 12:11
Static task
static1
Behavioral task
behavioral1
Sample
8b6c087ce23acbe5540e2e799e215010_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8b6c087ce23acbe5540e2e799e215010_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
8b6c087ce23acbe5540e2e799e215010_JaffaCakes118.exe
-
Size
346KB
-
MD5
8b6c087ce23acbe5540e2e799e215010
-
SHA1
6f4d9a8e3fb4dcc9e71ac88a2042f86873ba9593
-
SHA256
26b61a616d9ff0fc7e76c5c5d5058b6a05eec82c16b8206b0a3f057e82e23e71
-
SHA512
31a76bf4230f2683d768917c172a12f898f309cef4dae9087aecf6f70b66a32c6de2b79c66564db0661901306d0cef029446be0f337479a756d9ff656512228d
-
SSDEEP
6144:ltdN0c+xadEDmU5JXN4/6/1B4fAd9r+KJQlStcZeNtC/ZfyBeNPTfW:rD0c+0EjX4/6/1B4fAd9KKJ6fIORqkNy
Malware Config
Extracted
gozi
Extracted
gozi
1002
lolila.net
vndjtu968488.ru
moriyurw368798.ru
-
build
213425
-
exe_type
worker
Signatures
-
Gozi family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Deletes itself 1 IoCs
pid Process 2912 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\atlrypt = "C:\\Windows\\system32\\AppIdmrc.exe" 8b6c087ce23acbe5540e2e799e215010_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\AppIdmrc.exe 8b6c087ce23acbe5540e2e799e215010_JaffaCakes118.exe File created C:\Windows\system32\AppIdmrc.exe 8b6c087ce23acbe5540e2e799e215010_JaffaCakes118.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\92C3.tmp" 8b6c087ce23acbe5540e2e799e215010_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Pictures\\My Wallpaper.jpg" 8b6c087ce23acbe5540e2e799e215010_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1076 set thread context of 1680 1076 8b6c087ce23acbe5540e2e799e215010_JaffaCakes118.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b6c087ce23acbe5540e2e799e215010_JaffaCakes118.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1076 8b6c087ce23acbe5540e2e799e215010_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1680 explorer.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1076 8b6c087ce23acbe5540e2e799e215010_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 1680 explorer.exe Token: SeShutdownPrivilege 1680 explorer.exe Token: SeShutdownPrivilege 1680 explorer.exe Token: SeShutdownPrivilege 1680 explorer.exe Token: SeShutdownPrivilege 1680 explorer.exe Token: SeShutdownPrivilege 1680 explorer.exe Token: SeShutdownPrivilege 1680 explorer.exe Token: SeShutdownPrivilege 1680 explorer.exe Token: SeShutdownPrivilege 1680 explorer.exe Token: SeShutdownPrivilege 1680 explorer.exe Token: SeShutdownPrivilege 1680 explorer.exe Token: SeShutdownPrivilege 1680 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe -
Suspicious use of SendNotifyMessage 17 IoCs
pid Process 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1680 explorer.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1076 wrote to memory of 1680 1076 8b6c087ce23acbe5540e2e799e215010_JaffaCakes118.exe 30 PID 1076 wrote to memory of 1680 1076 8b6c087ce23acbe5540e2e799e215010_JaffaCakes118.exe 30 PID 1076 wrote to memory of 1680 1076 8b6c087ce23acbe5540e2e799e215010_JaffaCakes118.exe 30 PID 1076 wrote to memory of 1680 1076 8b6c087ce23acbe5540e2e799e215010_JaffaCakes118.exe 30 PID 1076 wrote to memory of 1680 1076 8b6c087ce23acbe5540e2e799e215010_JaffaCakes118.exe 30 PID 1076 wrote to memory of 1680 1076 8b6c087ce23acbe5540e2e799e215010_JaffaCakes118.exe 30 PID 1076 wrote to memory of 1680 1076 8b6c087ce23acbe5540e2e799e215010_JaffaCakes118.exe 30 PID 1076 wrote to memory of 2912 1076 8b6c087ce23acbe5540e2e799e215010_JaffaCakes118.exe 31 PID 1076 wrote to memory of 2912 1076 8b6c087ce23acbe5540e2e799e215010_JaffaCakes118.exe 31 PID 1076 wrote to memory of 2912 1076 8b6c087ce23acbe5540e2e799e215010_JaffaCakes118.exe 31 PID 1076 wrote to memory of 2912 1076 8b6c087ce23acbe5540e2e799e215010_JaffaCakes118.exe 31 PID 2912 wrote to memory of 2896 2912 cmd.exe 33 PID 2912 wrote to memory of 2896 2912 cmd.exe 33 PID 2912 wrote to memory of 2896 2912 cmd.exe 33 PID 2912 wrote to memory of 2896 2912 cmd.exe 33 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2896 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b6c087ce23acbe5540e2e799e215010_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8b6c087ce23acbe5540e2e799e215010_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1680
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\B864.bat" "C:\Users\Admin\AppData\Local\Temp\8B6C08~1.EXE""2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\8B6C08~1.EXE"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2896
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD5baacba1bd7094d1d9d95107a1c7dabde
SHA18adeb0f519ace285a2b18dc4d82eb2b81c1decdf
SHA25692106696e3d44f15b71547bc21baf61c74b098ac0422dc0c6ba2e58d2514429e
SHA5126fc733e68383dc6bef9b7b3f282f7190a47d308b6b0f3956a2f35202bdbdbe4975f5fba456cdbdbe83e304006f25180b98d9bedd067b3fb26a820fd7ced7d6c8