Analysis
-
max time kernel
6s -
max time network
7s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 07:01
Behavioral task
behavioral1
Sample
JaffaCakes118_51045137416f6b58fbd97c0702fb2b6b.exe
Resource
win7-20250207-en
Errors
General
-
Target
JaffaCakes118_51045137416f6b58fbd97c0702fb2b6b.exe
-
Size
19KB
-
MD5
51045137416f6b58fbd97c0702fb2b6b
-
SHA1
cce9cb8393ec00bec05e0855500a578b0dc7ca1f
-
SHA256
77c4732c7a775660d950d4cd952150a145f317dad0657dfc6b64c1227989e1db
-
SHA512
c64dc192830f354087e3483592c7ca5ac29177f521d9561fdbfa726d85c2fd5cc059b24ff31b2bcc5deaa9e21acdd974014378113b7f461db949432c85433c2b
-
SSDEEP
384:yF5wSY5FcFTOjAjqMDP/Ik2qK7maNJawcudoD7Ubd:yFE5FoTJZKN7HnbcuyD7U
Malware Config
Extracted
gozi
Signatures
-
Gozi family
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1508 JaffaCakes118_51045137416f6b58fbd97c0702fb2b6b.exe -
resource yara_rule behavioral1/memory/1508-0-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/memory/1508-116-0x0000000000400000-0x0000000000412000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_51045137416f6b58fbd97c0702fb2b6b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shutdown.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2492 shutdown.exe Token: SeRemoteShutdownPrivilege 2492 shutdown.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1508 wrote to memory of 3052 1508 JaffaCakes118_51045137416f6b58fbd97c0702fb2b6b.exe 31 PID 1508 wrote to memory of 3052 1508 JaffaCakes118_51045137416f6b58fbd97c0702fb2b6b.exe 31 PID 1508 wrote to memory of 3052 1508 JaffaCakes118_51045137416f6b58fbd97c0702fb2b6b.exe 31 PID 1508 wrote to memory of 3052 1508 JaffaCakes118_51045137416f6b58fbd97c0702fb2b6b.exe 31 PID 3052 wrote to memory of 2492 3052 cmd.exe 33 PID 3052 wrote to memory of 2492 3052 cmd.exe 33 PID 3052 wrote to memory of 2492 3052 cmd.exe 33 PID 3052 wrote to memory of 2492 3052 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_51045137416f6b58fbd97c0702fb2b6b.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_51045137416f6b58fbd97c0702fb2b6b.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\E051.tmp\murclub.bat" "2⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\shutdown.exeshutdown -s -t 1 -c "ε°ΦßΩα" -f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2492
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:3036
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2500
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD57ac57cca0ecf9dbecc045b4ff71a7519
SHA18746be1750cc837c638ef8e845581be70aa6bea7
SHA2561f2e8317f0fcf4c14b9baacc639ed987408b5d01100a32e0feb93f790748c7c2
SHA51224fde19ec0d704ac3f49f9096c6ae8e31ab269cd1bc031eed7438fdf2282dc9b479527ba5f1f6adc94a9d06915c055d7368b128ee70093881c464afe62d75fe4
-
Filesize
31KB
MD57b860f28be19d4aef761fb991134a556
SHA10658a7456d0234dcca598b6ee599fe134d0ecd61
SHA25657a2586d73188a694944c7da60c78380f82fac46452ed1a31c818ceb93e660bc
SHA512a0685a25cbc3fff74aa4ad538ade5282242980f07fe1171e01644e0fa98e1ec6adc87b943290983f6fb5070d26fc15d697ae31a1f570e83e504ae1e4508aefa5