Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 10:54
Behavioral task
behavioral1
Sample
b0c737e8001073fcbd2ff4976f3d7247_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
b0c737e8001073fcbd2ff4976f3d7247_JaffaCakes118.exe
-
Size
5.8MB
-
MD5
b0c737e8001073fcbd2ff4976f3d7247
-
SHA1
4587cf15e65f02d755648b721ffcbd2d3a354c37
-
SHA256
50296d0a9c89d72b9e20b47dce43020575d5cd8f279afc5d0f4ac879c2505f13
-
SHA512
5e0204d6e7afbc3e3583589724bf56e99676fba0ebff64a93f3f7cee1e98caa455935f615fa4bd8e22235d50314839863b774554bd6f13ea276d37bfbb988ba0
-
SSDEEP
98304:oqMjDjnNRcM2kGQZaXhP5a9UEI+eG9jAkbkR79D+cVItGQZaXhP5a9UEI+eG:objDjnNGMZGhRaaCkN9qHGhRa
Malware Config
Extracted
gozi
Signatures
-
Gozi family
-
Deletes itself 1 IoCs
pid Process 2004 b0c737e8001073fcbd2ff4976f3d7247_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2004 b0c737e8001073fcbd2ff4976f3d7247_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2484 b0c737e8001073fcbd2ff4976f3d7247_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2484-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000b00000001226a-10.dat upx behavioral1/memory/2484-13-0x0000000003DD0000-0x00000000042BF000-memory.dmp upx behavioral1/memory/2004-16-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b0c737e8001073fcbd2ff4976f3d7247_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b0c737e8001073fcbd2ff4976f3d7247_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2484 b0c737e8001073fcbd2ff4976f3d7247_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2484 b0c737e8001073fcbd2ff4976f3d7247_JaffaCakes118.exe 2004 b0c737e8001073fcbd2ff4976f3d7247_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2484 wrote to memory of 2004 2484 b0c737e8001073fcbd2ff4976f3d7247_JaffaCakes118.exe 31 PID 2484 wrote to memory of 2004 2484 b0c737e8001073fcbd2ff4976f3d7247_JaffaCakes118.exe 31 PID 2484 wrote to memory of 2004 2484 b0c737e8001073fcbd2ff4976f3d7247_JaffaCakes118.exe 31 PID 2484 wrote to memory of 2004 2484 b0c737e8001073fcbd2ff4976f3d7247_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0c737e8001073fcbd2ff4976f3d7247_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b0c737e8001073fcbd2ff4976f3d7247_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\b0c737e8001073fcbd2ff4976f3d7247_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\b0c737e8001073fcbd2ff4976f3d7247_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.8MB
MD51facf1374f35e4cfa04ba5854bc2adac
SHA1cf9ec4958ac0d8541332384389e3ca574b5e51e1
SHA2564f785334fcfd6df2592d341e49c9921680a00812240e4eab6d983d21404da374
SHA5122eb6a69c28dcdbb7985303741aa40a5269b8d4385104b1fdd204b62b7ec9a824542d5cdc0f9d65d1b81fca75f6a515a6be98908793df0b11357ad9b025e466ed