Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 07:20
Static task
static1
Behavioral task
behavioral1
Sample
afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe
-
Size
511KB
-
MD5
afb4846bd287f31e6297cb4095aece65
-
SHA1
b92d682a800d82ff6e980deae88f6cb7e048c11d
-
SHA256
639a86559b0a086fe388e4309ea22e49f79362c0983df1a5b09fa477db3c463d
-
SHA512
8f5b3062a7f4faada34001bbe8510235d20b3d507ee0858ef23db92853f31a3075c60e37738a93e1385995199c9d99dccb7e547247fc9af5b8a8f3557d03d070
-
SSDEEP
12288:nTY7/WAuLAOOxsgfj40bDKg0m7t4is8jYar:kusO+RDKgJBnsgYa
Malware Config
Extracted
gozi
-
build
215798
Signatures
-
Gozi family
-
Executes dropped EXE 2 IoCs
pid Process 1104 dmlomapi.exe 1116 dmlomapi.exe -
Loads dropped DLL 2 IoCs
pid Process 2560 cmd.exe 2560 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\coloes = "C:\\Users\\Admin\\AppData\\Roaming\\ddraitor\\dmlomapi.exe" afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1580 set thread context of 2600 1580 afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe 30 PID 1104 set thread context of 1116 1104 dmlomapi.exe 35 PID 1116 set thread context of 1764 1116 dmlomapi.exe 36 PID 1764 set thread context of 1256 1764 svchost.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dmlomapi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dmlomapi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1116 dmlomapi.exe 1256 Explorer.EXE -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1116 dmlomapi.exe 1764 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1256 Explorer.EXE -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 1580 wrote to memory of 2600 1580 afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe 30 PID 1580 wrote to memory of 2600 1580 afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe 30 PID 1580 wrote to memory of 2600 1580 afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe 30 PID 1580 wrote to memory of 2600 1580 afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe 30 PID 1580 wrote to memory of 2600 1580 afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe 30 PID 1580 wrote to memory of 2600 1580 afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe 30 PID 1580 wrote to memory of 2600 1580 afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe 30 PID 1580 wrote to memory of 2600 1580 afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe 30 PID 1580 wrote to memory of 2600 1580 afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe 30 PID 1580 wrote to memory of 2600 1580 afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe 30 PID 1580 wrote to memory of 2600 1580 afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe 30 PID 2600 wrote to memory of 2588 2600 afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe 31 PID 2600 wrote to memory of 2588 2600 afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe 31 PID 2600 wrote to memory of 2588 2600 afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe 31 PID 2600 wrote to memory of 2588 2600 afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe 31 PID 2588 wrote to memory of 2560 2588 cmd.exe 33 PID 2588 wrote to memory of 2560 2588 cmd.exe 33 PID 2588 wrote to memory of 2560 2588 cmd.exe 33 PID 2588 wrote to memory of 2560 2588 cmd.exe 33 PID 2560 wrote to memory of 1104 2560 cmd.exe 34 PID 2560 wrote to memory of 1104 2560 cmd.exe 34 PID 2560 wrote to memory of 1104 2560 cmd.exe 34 PID 2560 wrote to memory of 1104 2560 cmd.exe 34 PID 1104 wrote to memory of 1116 1104 dmlomapi.exe 35 PID 1104 wrote to memory of 1116 1104 dmlomapi.exe 35 PID 1104 wrote to memory of 1116 1104 dmlomapi.exe 35 PID 1104 wrote to memory of 1116 1104 dmlomapi.exe 35 PID 1104 wrote to memory of 1116 1104 dmlomapi.exe 35 PID 1104 wrote to memory of 1116 1104 dmlomapi.exe 35 PID 1104 wrote to memory of 1116 1104 dmlomapi.exe 35 PID 1104 wrote to memory of 1116 1104 dmlomapi.exe 35 PID 1104 wrote to memory of 1116 1104 dmlomapi.exe 35 PID 1104 wrote to memory of 1116 1104 dmlomapi.exe 35 PID 1104 wrote to memory of 1116 1104 dmlomapi.exe 35 PID 1116 wrote to memory of 1764 1116 dmlomapi.exe 36 PID 1116 wrote to memory of 1764 1116 dmlomapi.exe 36 PID 1116 wrote to memory of 1764 1116 dmlomapi.exe 36 PID 1116 wrote to memory of 1764 1116 dmlomapi.exe 36 PID 1116 wrote to memory of 1764 1116 dmlomapi.exe 36 PID 1116 wrote to memory of 1764 1116 dmlomapi.exe 36 PID 1116 wrote to memory of 1764 1116 dmlomapi.exe 36 PID 1764 wrote to memory of 1256 1764 svchost.exe 21 PID 1764 wrote to memory of 1256 1764 svchost.exe 21 PID 1764 wrote to memory of 1256 1764 svchost.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe"3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\6E00\B700.bat" "C:\Users\Admin\AppData\Roaming\ddraitor\dmlomapi.exe" "C:\Users\Admin\AppData\Local\Temp\AFB484~1.EXE""4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\ddraitor\dmlomapi.exe" "C:\Users\Admin\AppData\Local\Temp\AFB484~1.EXE""5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Roaming\ddraitor\dmlomapi.exe"C:\Users\Admin\AppData\Roaming\ddraitor\dmlomapi.exe" "C:\Users\Admin\AppData\Local\Temp\AFB484~1.EXE"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Users\Admin\AppData\Roaming\ddraitor\dmlomapi.exe"C:\Users\Admin\AppData\Roaming\ddraitor\dmlomapi.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe8⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1764
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112B
MD5dacd11e61478e2fb54cdb4aa866ea27c
SHA1066a350727658586417da0055be5a4f4965e8350
SHA256f55bee9d8ef22ae2797ac3a39d3c73d089410c6c19a8b2818e77a3326b900a46
SHA51232f5edc59f080c0954104bfffbce16a8142cd2f714e03f3c3a7e93b39b45684264f044fe4ba68b000fe291e1b5a571ce9861ce610852efcc37c790f5b2daa8c4
-
Filesize
511KB
MD5afb4846bd287f31e6297cb4095aece65
SHA1b92d682a800d82ff6e980deae88f6cb7e048c11d
SHA256639a86559b0a086fe388e4309ea22e49f79362c0983df1a5b09fa477db3c463d
SHA5128f5b3062a7f4faada34001bbe8510235d20b3d507ee0858ef23db92853f31a3075c60e37738a93e1385995199c9d99dccb7e547247fc9af5b8a8f3557d03d070