General
-
Target
JaffaCakes118_89dbe243829a1f6c79190897e3c8fbae
-
Size
5.6MB
-
Sample
250327-s1j7aatza1
-
MD5
89dbe243829a1f6c79190897e3c8fbae
-
SHA1
b28d6881630e4ff0675cef42b55a910b3e1dd1c9
-
SHA256
59df1601a47511118c430b1961a05ed8000b73468dbbcaf06cd4048e8c7370c7
-
SHA512
13b639f23cc342718fe8d3f0930c7eaa64576cf6cd91e0db8555e799fa8d37fb08476631a8359021a53f38b04162f20081913186a5a20c5014f1226c0d8b99b8
-
SSDEEP
98304:GofZgqJrfcAmilwi/hMF5BdGTVNsUMDG5ACoRKqA4lsAS1J0lQW2AdYeBPZqV7fS:Hdl/lw8hMy5ORDG59pOHNF1ZcV7HHu9v
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_89dbe243829a1f6c79190897e3c8fbae.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_89dbe243829a1f6c79190897e3c8fbae.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
gozi
Targets
-
-
Target
JaffaCakes118_89dbe243829a1f6c79190897e3c8fbae
-
Size
5.6MB
-
MD5
89dbe243829a1f6c79190897e3c8fbae
-
SHA1
b28d6881630e4ff0675cef42b55a910b3e1dd1c9
-
SHA256
59df1601a47511118c430b1961a05ed8000b73468dbbcaf06cd4048e8c7370c7
-
SHA512
13b639f23cc342718fe8d3f0930c7eaa64576cf6cd91e0db8555e799fa8d37fb08476631a8359021a53f38b04162f20081913186a5a20c5014f1226c0d8b99b8
-
SSDEEP
98304:GofZgqJrfcAmilwi/hMF5BdGTVNsUMDG5ACoRKqA4lsAS1J0lQW2AdYeBPZqV7fS:Hdl/lw8hMy5ORDG59pOHNF1ZcV7HHu9v
-
Gozi family
-
UAC bypass
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Hide Artifacts: Hidden Users
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
3Hidden Files and Directories
2Hidden Users
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
5Discovery
Browser Information Discovery
1Peripheral Device Discovery
2Permission Groups Discovery
1Local Groups
1Query Registry
6Remote System Discovery
1System Information Discovery
7System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1