Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 13:55
Static task
static1
Behavioral task
behavioral1
Sample
ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe
-
Size
508KB
-
MD5
ebd494a0747eab84aac0b4feb25f4f26
-
SHA1
5bfdd529187ba019eeaf1a2867941308cb19a721
-
SHA256
33b2a70bdd26061272b778e683b6e7f904060677d05c8aa26595cd44c5d11b50
-
SHA512
c4a730a9ff85190fd8f82b6af7acafeba745d03aa0df14dfb5efeed51eb9e2266d5dca4c86124e96325c7ad0d1eefc23d7abb8aff13c165eb0ab24ecd9493584
-
SSDEEP
12288:mHCxJuzO8PW418jZZUozZuzYgwz3r14Y07KCJ:8ddZ+tZlVUYBzB0KC
Malware Config
Extracted
gozi
-
build
215798
Signatures
-
Gozi family
-
Executes dropped EXE 2 IoCs
pid Process 2596 dmutters.exe 2536 dmutters.exe -
Loads dropped DLL 2 IoCs
pid Process 2572 cmd.exe 2572 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\BioCxRes = "C:\\Users\\Admin\\AppData\\Roaming\\appmdemx\\dmutters.exe" ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1960 set thread context of 2752 1960 ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe 30 PID 2596 set thread context of 2536 2596 dmutters.exe 35 PID 2536 set thread context of 2416 2536 dmutters.exe 36 PID 2416 set thread context of 1232 2416 svchost.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dmutters.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dmutters.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2536 dmutters.exe 1232 Explorer.EXE -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2536 dmutters.exe 2416 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1232 Explorer.EXE -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 1960 wrote to memory of 2752 1960 ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe 30 PID 1960 wrote to memory of 2752 1960 ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe 30 PID 1960 wrote to memory of 2752 1960 ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe 30 PID 1960 wrote to memory of 2752 1960 ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe 30 PID 1960 wrote to memory of 2752 1960 ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe 30 PID 1960 wrote to memory of 2752 1960 ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe 30 PID 1960 wrote to memory of 2752 1960 ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe 30 PID 1960 wrote to memory of 2752 1960 ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe 30 PID 1960 wrote to memory of 2752 1960 ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe 30 PID 1960 wrote to memory of 2752 1960 ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe 30 PID 1960 wrote to memory of 2752 1960 ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe 30 PID 2752 wrote to memory of 1632 2752 ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe 31 PID 2752 wrote to memory of 1632 2752 ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe 31 PID 2752 wrote to memory of 1632 2752 ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe 31 PID 2752 wrote to memory of 1632 2752 ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe 31 PID 1632 wrote to memory of 2572 1632 cmd.exe 33 PID 1632 wrote to memory of 2572 1632 cmd.exe 33 PID 1632 wrote to memory of 2572 1632 cmd.exe 33 PID 1632 wrote to memory of 2572 1632 cmd.exe 33 PID 2572 wrote to memory of 2596 2572 cmd.exe 34 PID 2572 wrote to memory of 2596 2572 cmd.exe 34 PID 2572 wrote to memory of 2596 2572 cmd.exe 34 PID 2572 wrote to memory of 2596 2572 cmd.exe 34 PID 2596 wrote to memory of 2536 2596 dmutters.exe 35 PID 2596 wrote to memory of 2536 2596 dmutters.exe 35 PID 2596 wrote to memory of 2536 2596 dmutters.exe 35 PID 2596 wrote to memory of 2536 2596 dmutters.exe 35 PID 2596 wrote to memory of 2536 2596 dmutters.exe 35 PID 2596 wrote to memory of 2536 2596 dmutters.exe 35 PID 2596 wrote to memory of 2536 2596 dmutters.exe 35 PID 2596 wrote to memory of 2536 2596 dmutters.exe 35 PID 2596 wrote to memory of 2536 2596 dmutters.exe 35 PID 2596 wrote to memory of 2536 2596 dmutters.exe 35 PID 2596 wrote to memory of 2536 2596 dmutters.exe 35 PID 2536 wrote to memory of 2416 2536 dmutters.exe 36 PID 2536 wrote to memory of 2416 2536 dmutters.exe 36 PID 2536 wrote to memory of 2416 2536 dmutters.exe 36 PID 2536 wrote to memory of 2416 2536 dmutters.exe 36 PID 2536 wrote to memory of 2416 2536 dmutters.exe 36 PID 2536 wrote to memory of 2416 2536 dmutters.exe 36 PID 2536 wrote to memory of 2416 2536 dmutters.exe 36 PID 2416 wrote to memory of 1232 2416 svchost.exe 21 PID 2416 wrote to memory of 1232 2416 svchost.exe 21 PID 2416 wrote to memory of 1232 2416 svchost.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ebd494a0747eab84aac0b4feb25f4f26_JaffaCakes118.exe"3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\82F6\C17B.bat" "C:\Users\Admin\AppData\Roaming\appmdemx\dmutters.exe" "C:\Users\Admin\AppData\Local\Temp\EBD494~1.EXE""4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\appmdemx\dmutters.exe" "C:\Users\Admin\AppData\Local\Temp\EBD494~1.EXE""5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Roaming\appmdemx\dmutters.exe"C:\Users\Admin\AppData\Roaming\appmdemx\dmutters.exe" "C:\Users\Admin\AppData\Local\Temp\EBD494~1.EXE"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Roaming\appmdemx\dmutters.exe"C:\Users\Admin\AppData\Roaming\appmdemx\dmutters.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe8⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2416
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112B
MD5c429c60f77ebe65fa1b724bd1453f576
SHA181d28114ff5fcde5fab1cd111a17f040b49a96bd
SHA2560b3c45f7569153bd264c41fee6aab7f6785c258403e504ef227b57f73b37f272
SHA512a1e7cb1e356dfe752aaec6697fb3ff35934302ea720e5695b7d072f2491bb1f7ef69040b6cf85154eadcad468a6e95aef09559cbb64c88484412c3b70e7227aa
-
Filesize
508KB
MD5ebd494a0747eab84aac0b4feb25f4f26
SHA15bfdd529187ba019eeaf1a2867941308cb19a721
SHA25633b2a70bdd26061272b778e683b6e7f904060677d05c8aa26595cd44c5d11b50
SHA512c4a730a9ff85190fd8f82b6af7acafeba745d03aa0df14dfb5efeed51eb9e2266d5dca4c86124e96325c7ad0d1eefc23d7abb8aff13c165eb0ab24ecd9493584