Analysis
-
max time kernel
94s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 15:10
Behavioral task
behavioral1
Sample
a29f77b308aaf0db99159bf2fd546054_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
a29f77b308aaf0db99159bf2fd546054_JaffaCakes118.exe
-
Size
2.9MB
-
MD5
a29f77b308aaf0db99159bf2fd546054
-
SHA1
821cd8259859d352a310925eac1fba5cd3fea223
-
SHA256
1683066f95e4ba1738602aa34493481e138a877dbdb3f4892eb7c4720be10b79
-
SHA512
3289bcfb88fd2c7de8386eeecff939289cb13cd3a080c0084932e407a2e90477ba876514c8a121689eb3e4e2a6eea04f1616ec157a733e9d272f4f425addfb6c
-
SSDEEP
49152:diUHXgZpqe9fA8NP4M338dB2IBlGuuDVUsdxxjeQZwxPYRKs:w2gSdUgg3gnl/IVUs1jePs
Malware Config
Extracted
gozi
Signatures
-
Gozi family
-
Deletes itself 1 IoCs
pid Process 2376 a29f77b308aaf0db99159bf2fd546054_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2376 a29f77b308aaf0db99159bf2fd546054_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/4412-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000a000000023c35-11.dat upx behavioral2/memory/2376-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a29f77b308aaf0db99159bf2fd546054_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a29f77b308aaf0db99159bf2fd546054_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4412 a29f77b308aaf0db99159bf2fd546054_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4412 a29f77b308aaf0db99159bf2fd546054_JaffaCakes118.exe 2376 a29f77b308aaf0db99159bf2fd546054_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4412 wrote to memory of 2376 4412 a29f77b308aaf0db99159bf2fd546054_JaffaCakes118.exe 83 PID 4412 wrote to memory of 2376 4412 a29f77b308aaf0db99159bf2fd546054_JaffaCakes118.exe 83 PID 4412 wrote to memory of 2376 4412 a29f77b308aaf0db99159bf2fd546054_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\a29f77b308aaf0db99159bf2fd546054_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a29f77b308aaf0db99159bf2fd546054_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\a29f77b308aaf0db99159bf2fd546054_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a29f77b308aaf0db99159bf2fd546054_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5405ee547de662d6cee522cb35cfa642f
SHA10cffbe113754eba817eea12a9a911684cad57d34
SHA25658be2a3ee2b563b6e2057b84336368452e78c4b47ade82f74bdab338d7b5b6aa
SHA512429ceb850e523522dc3b17af570cd48d45edfe1bf47b88a5d4cb91ebc3d6724bff2857c82d7f69cd6c661876a5a1b741bcc9e0741f3e8c1fd2cb85f660397875