Analysis
-
max time kernel
4s -
max time network
6s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2025, 07:01
Behavioral task
behavioral1
Sample
JaffaCakes118_51045137416f6b58fbd97c0702fb2b6b.exe
Resource
win7-20250207-en
Errors
General
-
Target
JaffaCakes118_51045137416f6b58fbd97c0702fb2b6b.exe
-
Size
19KB
-
MD5
51045137416f6b58fbd97c0702fb2b6b
-
SHA1
cce9cb8393ec00bec05e0855500a578b0dc7ca1f
-
SHA256
77c4732c7a775660d950d4cd952150a145f317dad0657dfc6b64c1227989e1db
-
SHA512
c64dc192830f354087e3483592c7ca5ac29177f521d9561fdbfa726d85c2fd5cc059b24ff31b2bcc5deaa9e21acdd974014378113b7f461db949432c85433c2b
-
SSDEEP
384:yF5wSY5FcFTOjAjqMDP/Ik2qK7maNJawcudoD7Ubd:yFE5FoTJZKN7HnbcuyD7U
Malware Config
Extracted
gozi
Signatures
-
Gozi family
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts cmd.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation JaffaCakes118_51045137416f6b58fbd97c0702fb2b6b.exe -
Loads dropped DLL 1 IoCs
pid Process 4844 JaffaCakes118_51045137416f6b58fbd97c0702fb2b6b.exe -
resource yara_rule behavioral2/memory/4844-0-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/4844-106-0x0000000000400000-0x0000000000412000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_51045137416f6b58fbd97c0702fb2b6b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shutdown.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "228" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3664 shutdown.exe Token: SeRemoteShutdownPrivilege 3664 shutdown.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4524 LogonUI.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4844 wrote to memory of 4860 4844 JaffaCakes118_51045137416f6b58fbd97c0702fb2b6b.exe 86 PID 4844 wrote to memory of 4860 4844 JaffaCakes118_51045137416f6b58fbd97c0702fb2b6b.exe 86 PID 4844 wrote to memory of 4860 4844 JaffaCakes118_51045137416f6b58fbd97c0702fb2b6b.exe 86 PID 4860 wrote to memory of 3664 4860 cmd.exe 91 PID 4860 wrote to memory of 3664 4860 cmd.exe 91 PID 4860 wrote to memory of 3664 4860 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_51045137416f6b58fbd97c0702fb2b6b.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_51045137416f6b58fbd97c0702fb2b6b.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6C08.tmp\murclub.bat" "2⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\SysWOW64\shutdown.exeshutdown -s -t 1 -c "ε°ΦßΩα" -f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3664
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa399e855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:4524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD57b860f28be19d4aef761fb991134a556
SHA10658a7456d0234dcca598b6ee599fe134d0ecd61
SHA25657a2586d73188a694944c7da60c78380f82fac46452ed1a31c818ceb93e660bc
SHA512a0685a25cbc3fff74aa4ad538ade5282242980f07fe1171e01644e0fa98e1ec6adc87b943290983f6fb5070d26fc15d697ae31a1f570e83e504ae1e4508aefa5
-
Filesize
7KB
MD57ac57cca0ecf9dbecc045b4ff71a7519
SHA18746be1750cc837c638ef8e845581be70aa6bea7
SHA2561f2e8317f0fcf4c14b9baacc639ed987408b5d01100a32e0feb93f790748c7c2
SHA51224fde19ec0d704ac3f49f9096c6ae8e31ab269cd1bc031eed7438fdf2282dc9b479527ba5f1f6adc94a9d06915c055d7368b128ee70093881c464afe62d75fe4