Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 07:20
Static task
static1
Behavioral task
behavioral1
Sample
afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe
-
Size
511KB
-
MD5
afb4846bd287f31e6297cb4095aece65
-
SHA1
b92d682a800d82ff6e980deae88f6cb7e048c11d
-
SHA256
639a86559b0a086fe388e4309ea22e49f79362c0983df1a5b09fa477db3c463d
-
SHA512
8f5b3062a7f4faada34001bbe8510235d20b3d507ee0858ef23db92853f31a3075c60e37738a93e1385995199c9d99dccb7e547247fc9af5b8a8f3557d03d070
-
SSDEEP
12288:nTY7/WAuLAOOxsgfj40bDKg0m7t4is8jYar:kusO+RDKgJBnsgYa
Malware Config
Extracted
gozi
-
build
215798
Signatures
-
Gozi family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2780 adprdiag.exe 3448 adprdiag.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AppVmRes = "C:\\Users\\Admin\\AppData\\Roaming\\accefg32\\adprdiag.exe" afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 1492 set thread context of 2692 1492 afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe 98 PID 2780 set thread context of 3448 2780 adprdiag.exe 106 PID 3448 set thread context of 4032 3448 adprdiag.exe 107 PID 4032 set thread context of 3436 4032 svchost.exe 56 PID 3436 set thread context of 3944 3436 Explorer.EXE 60 PID 3436 set thread context of 4176 3436 Explorer.EXE 62 PID 3436 set thread context of 3480 3436 Explorer.EXE 76 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adprdiag.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adprdiag.exe -
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 adprdiag.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName adprdiag.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3448 adprdiag.exe 3448 adprdiag.exe 3436 Explorer.EXE 3436 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3448 adprdiag.exe 4032 svchost.exe 3436 Explorer.EXE 3436 Explorer.EXE 3436 Explorer.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3436 Explorer.EXE -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 1492 wrote to memory of 2692 1492 afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe 98 PID 1492 wrote to memory of 2692 1492 afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe 98 PID 1492 wrote to memory of 2692 1492 afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe 98 PID 1492 wrote to memory of 2692 1492 afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe 98 PID 1492 wrote to memory of 2692 1492 afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe 98 PID 1492 wrote to memory of 2692 1492 afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe 98 PID 1492 wrote to memory of 2692 1492 afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe 98 PID 1492 wrote to memory of 2692 1492 afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe 98 PID 1492 wrote to memory of 2692 1492 afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe 98 PID 1492 wrote to memory of 2692 1492 afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe 98 PID 2692 wrote to memory of 264 2692 afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe 99 PID 2692 wrote to memory of 264 2692 afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe 99 PID 2692 wrote to memory of 264 2692 afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe 99 PID 264 wrote to memory of 2816 264 cmd.exe 101 PID 264 wrote to memory of 2816 264 cmd.exe 101 PID 264 wrote to memory of 2816 264 cmd.exe 101 PID 2816 wrote to memory of 2780 2816 cmd.exe 102 PID 2816 wrote to memory of 2780 2816 cmd.exe 102 PID 2816 wrote to memory of 2780 2816 cmd.exe 102 PID 2780 wrote to memory of 3448 2780 adprdiag.exe 106 PID 2780 wrote to memory of 3448 2780 adprdiag.exe 106 PID 2780 wrote to memory of 3448 2780 adprdiag.exe 106 PID 2780 wrote to memory of 3448 2780 adprdiag.exe 106 PID 2780 wrote to memory of 3448 2780 adprdiag.exe 106 PID 2780 wrote to memory of 3448 2780 adprdiag.exe 106 PID 2780 wrote to memory of 3448 2780 adprdiag.exe 106 PID 2780 wrote to memory of 3448 2780 adprdiag.exe 106 PID 2780 wrote to memory of 3448 2780 adprdiag.exe 106 PID 2780 wrote to memory of 3448 2780 adprdiag.exe 106 PID 3448 wrote to memory of 4032 3448 adprdiag.exe 107 PID 3448 wrote to memory of 4032 3448 adprdiag.exe 107 PID 3448 wrote to memory of 4032 3448 adprdiag.exe 107 PID 3448 wrote to memory of 4032 3448 adprdiag.exe 107 PID 3448 wrote to memory of 4032 3448 adprdiag.exe 107 PID 4032 wrote to memory of 3436 4032 svchost.exe 56 PID 4032 wrote to memory of 3436 4032 svchost.exe 56 PID 4032 wrote to memory of 3436 4032 svchost.exe 56 PID 3436 wrote to memory of 3944 3436 Explorer.EXE 60 PID 3436 wrote to memory of 3944 3436 Explorer.EXE 60 PID 3436 wrote to memory of 3944 3436 Explorer.EXE 60 PID 3436 wrote to memory of 4176 3436 Explorer.EXE 62 PID 3436 wrote to memory of 4176 3436 Explorer.EXE 62 PID 3436 wrote to memory of 4176 3436 Explorer.EXE 62 PID 3436 wrote to memory of 3480 3436 Explorer.EXE 76 PID 3436 wrote to memory of 3480 3436 Explorer.EXE 76 PID 3436 wrote to memory of 3480 3436 Explorer.EXE 76
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\afb4846bd287f31e6297cb4095aece65_JaffaCakes118.exe"3⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\264A\1325.bat" "C:\Users\Admin\AppData\Roaming\accefg32\adprdiag.exe" "C:\Users\Admin\AppData\Local\Temp\AFB484~1.EXE""4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\accefg32\adprdiag.exe" "C:\Users\Admin\AppData\Local\Temp\AFB484~1.EXE""5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Roaming\accefg32\adprdiag.exe"C:\Users\Admin\AppData\Roaming\accefg32\adprdiag.exe" "C:\Users\Admin\AppData\Local\Temp\AFB484~1.EXE"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Roaming\accefg32\adprdiag.exe"C:\Users\Admin\AppData\Roaming\accefg32\adprdiag.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe8⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4032
-
-
-
-
-
-
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3944
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4176
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112B
MD57d81c05af5bb4ba1820deb5a572f9619
SHA1b0866e2d4d4d0b866da942fde754addbab0f8901
SHA2565bf3ee93c2d693a31262bafee6ec7fd8a52ed3e19fa782bece16ad7afe4b468a
SHA5126ef054b72b18d319028476a9101db9601e2495209a1d859c10566a30cb10604507f9f3291e33d2252112d4a8fac416cf5e92c9fda10ea727411cf6e0db63fe39
-
Filesize
511KB
MD5afb4846bd287f31e6297cb4095aece65
SHA1b92d682a800d82ff6e980deae88f6cb7e048c11d
SHA256639a86559b0a086fe388e4309ea22e49f79362c0983df1a5b09fa477db3c463d
SHA5128f5b3062a7f4faada34001bbe8510235d20b3d507ee0858ef23db92853f31a3075c60e37738a93e1385995199c9d99dccb7e547247fc9af5b8a8f3557d03d070