Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
04-12-2024 12:02
Static task
static1
Behavioral task
behavioral1
Sample
c2721712884af79b3925a9461b6956ba_JaffaCakes118.exe
Resource
win7-20241023-en
General
-
Target
c2721712884af79b3925a9461b6956ba_JaffaCakes118.exe
-
Size
502KB
-
MD5
c2721712884af79b3925a9461b6956ba
-
SHA1
5b16851628134c8fd01f3b0a19c98ab24c9e036b
-
SHA256
1829a6442112ad58298059ea9ccfe9bbaa12de5465c5ad28a15009e1ee4552a1
-
SHA512
df29f587c3fa46a4a2312ed336b2f5f184dbd2f7cd69073e9c10b0876d2151effd25494b2d8ef326967ab74b2cd156969009998a33e61157ec2c79663d7e9487
-
SSDEEP
12288:6OzvBPEuLAOOxsgfj40bDKg0m7t4is8jYar:ousO+RDKgJBnsgYa
Malware Config
Extracted
gozi
-
build
215798
Signatures
-
Gozi family
-
Executes dropped EXE 2 IoCs
pid Process 2536 comptdll.exe 1684 comptdll.exe -
Loads dropped DLL 2 IoCs
pid Process 2516 cmd.exe 2516 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\cmpblayx = "C:\\Users\\Admin\\AppData\\Roaming\\fdWSRESM\\comptdll.exe" c2721712884af79b3925a9461b6956ba_JaffaCakes118.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2712 set thread context of 2808 2712 c2721712884af79b3925a9461b6956ba_JaffaCakes118.exe 28 PID 2536 set thread context of 1684 2536 comptdll.exe 35 PID 1684 set thread context of 1340 1684 comptdll.exe 36 PID 1340 set thread context of 1100 1340 svchost.exe 20 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c2721712884af79b3925a9461b6956ba_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c2721712884af79b3925a9461b6956ba_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language comptdll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language comptdll.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1684 comptdll.exe 1100 Explorer.EXE -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1684 comptdll.exe 1340 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1100 Explorer.EXE -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2712 wrote to memory of 2808 2712 c2721712884af79b3925a9461b6956ba_JaffaCakes118.exe 28 PID 2712 wrote to memory of 2808 2712 c2721712884af79b3925a9461b6956ba_JaffaCakes118.exe 28 PID 2712 wrote to memory of 2808 2712 c2721712884af79b3925a9461b6956ba_JaffaCakes118.exe 28 PID 2712 wrote to memory of 2808 2712 c2721712884af79b3925a9461b6956ba_JaffaCakes118.exe 28 PID 2712 wrote to memory of 2808 2712 c2721712884af79b3925a9461b6956ba_JaffaCakes118.exe 28 PID 2712 wrote to memory of 2808 2712 c2721712884af79b3925a9461b6956ba_JaffaCakes118.exe 28 PID 2712 wrote to memory of 2808 2712 c2721712884af79b3925a9461b6956ba_JaffaCakes118.exe 28 PID 2712 wrote to memory of 2808 2712 c2721712884af79b3925a9461b6956ba_JaffaCakes118.exe 28 PID 2712 wrote to memory of 2808 2712 c2721712884af79b3925a9461b6956ba_JaffaCakes118.exe 28 PID 2712 wrote to memory of 2808 2712 c2721712884af79b3925a9461b6956ba_JaffaCakes118.exe 28 PID 2712 wrote to memory of 2808 2712 c2721712884af79b3925a9461b6956ba_JaffaCakes118.exe 28 PID 2808 wrote to memory of 2688 2808 c2721712884af79b3925a9461b6956ba_JaffaCakes118.exe 29 PID 2808 wrote to memory of 2688 2808 c2721712884af79b3925a9461b6956ba_JaffaCakes118.exe 29 PID 2808 wrote to memory of 2688 2808 c2721712884af79b3925a9461b6956ba_JaffaCakes118.exe 29 PID 2808 wrote to memory of 2688 2808 c2721712884af79b3925a9461b6956ba_JaffaCakes118.exe 29 PID 2688 wrote to memory of 2516 2688 cmd.exe 31 PID 2688 wrote to memory of 2516 2688 cmd.exe 31 PID 2688 wrote to memory of 2516 2688 cmd.exe 31 PID 2688 wrote to memory of 2516 2688 cmd.exe 31 PID 2516 wrote to memory of 2536 2516 cmd.exe 32 PID 2516 wrote to memory of 2536 2516 cmd.exe 32 PID 2516 wrote to memory of 2536 2516 cmd.exe 32 PID 2516 wrote to memory of 2536 2516 cmd.exe 32 PID 2536 wrote to memory of 1684 2536 comptdll.exe 35 PID 2536 wrote to memory of 1684 2536 comptdll.exe 35 PID 2536 wrote to memory of 1684 2536 comptdll.exe 35 PID 2536 wrote to memory of 1684 2536 comptdll.exe 35 PID 2536 wrote to memory of 1684 2536 comptdll.exe 35 PID 2536 wrote to memory of 1684 2536 comptdll.exe 35 PID 2536 wrote to memory of 1684 2536 comptdll.exe 35 PID 2536 wrote to memory of 1684 2536 comptdll.exe 35 PID 2536 wrote to memory of 1684 2536 comptdll.exe 35 PID 2536 wrote to memory of 1684 2536 comptdll.exe 35 PID 2536 wrote to memory of 1684 2536 comptdll.exe 35 PID 1684 wrote to memory of 1340 1684 comptdll.exe 36 PID 1684 wrote to memory of 1340 1684 comptdll.exe 36 PID 1684 wrote to memory of 1340 1684 comptdll.exe 36 PID 1684 wrote to memory of 1340 1684 comptdll.exe 36 PID 1684 wrote to memory of 1340 1684 comptdll.exe 36 PID 1684 wrote to memory of 1340 1684 comptdll.exe 36 PID 1684 wrote to memory of 1340 1684 comptdll.exe 36 PID 1340 wrote to memory of 1100 1340 svchost.exe 20 PID 1340 wrote to memory of 1100 1340 svchost.exe 20 PID 1340 wrote to memory of 1100 1340 svchost.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\c2721712884af79b3925a9461b6956ba_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c2721712884af79b3925a9461b6956ba_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\c2721712884af79b3925a9461b6956ba_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c2721712884af79b3925a9461b6956ba_JaffaCakes118.exe"3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\6BEE\B5F7.bat" "C:\Users\Admin\AppData\Roaming\fdWSRESM\comptdll.exe" "C:\Users\Admin\AppData\Local\Temp\C27217~1.EXE""4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\fdWSRESM\comptdll.exe" "C:\Users\Admin\AppData\Local\Temp\C27217~1.EXE""5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Roaming\fdWSRESM\comptdll.exe"C:\Users\Admin\AppData\Roaming\fdWSRESM\comptdll.exe" "C:\Users\Admin\AppData\Local\Temp\C27217~1.EXE"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Roaming\fdWSRESM\comptdll.exe"C:\Users\Admin\AppData\Roaming\fdWSRESM\comptdll.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe8⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1340
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112B
MD5f40498321f46c5cc303f3d2ac4be22eb
SHA18c6982be7acbc606ac3c2c85024301608e8061c6
SHA256efcc5a581631358eba72cda3779f795fce9a3c039378eec2aaca9c38af0decfd
SHA512045b514a94fa6ee36aeb3677252e67fe837561cd5d6b8e05ee8a6a179d5d3793b45b6210595c6f7e68c10aa5457fc41eb190664d365466e6a3eddd3f6018de5c
-
Filesize
502KB
MD5c2721712884af79b3925a9461b6956ba
SHA15b16851628134c8fd01f3b0a19c98ab24c9e036b
SHA2561829a6442112ad58298059ea9ccfe9bbaa12de5465c5ad28a15009e1ee4552a1
SHA512df29f587c3fa46a4a2312ed336b2f5f184dbd2f7cd69073e9c10b0876d2151effd25494b2d8ef326967ab74b2cd156969009998a33e61157ec2c79663d7e9487