Behavioral task
behavioral1
Sample
08e5352a2416bd32a1c07f2d6c2f11fa_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
08e5352a2416bd32a1c07f2d6c2f11fa_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
08e5352a2416bd32a1c07f2d6c2f11fa_JaffaCakes118
-
Size
105KB
-
MD5
08e5352a2416bd32a1c07f2d6c2f11fa
-
SHA1
75a8054ee4939564fb90ccc654f0cfa9afe062c7
-
SHA256
aceca16c33ae8a73b1fd7699a8317d70d164df9744cb7e494834b9c1e457a768
-
SHA512
db1268b7f11726d9fae2d143757bec5c1497710cc97f3561cdf6dbd5cdd97aef7da2f1fbbbf6819b520e01a85e83775817d051812bcfcf5850dd534532ffc2af
-
SSDEEP
1536:2FmExUd6hs8reTaBElUWasAYHx0OyZ206LM9YZALMwVw:2nohCWasXxb0T9YZ3we
Malware Config
Extracted
gozi
Signatures
-
Gozi family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 08e5352a2416bd32a1c07f2d6c2f11fa_JaffaCakes118
Files
-
08e5352a2416bd32a1c07f2d6c2f11fa_JaffaCakes118.exe windows:4 windows x86 arch:x86
97d06901a54c8aad9ef540d5e4857a4b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalFileTimeToFileTime
SystemTimeToFileTime
CreateFileA
lstrcpyA
lstrlenA
GetProcAddress
SetFileTime
GetFileAttributesA
GetSystemDirectoryA
SetLastError
GetModuleFileNameA
CreateMutexA
GetLastError
ReleaseMutex
CloseHandle
SetUnhandledExceptionFilter
DeleteFileA
GetWindowsDirectoryA
LoadLibraryA
WritePrivateProfileStringA
RtlUnwind
RaiseException
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapFree
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
WriteFile
HeapAlloc
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsGetValue
ReadFile
SetFilePointer
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
IsBadWritePtr
SetStdHandle
FlushFileBuffers
InterlockedDecrement
InterlockedIncrement
IsBadReadPtr
IsBadCodePtr
GetCPInfo
GetACP
GetOEMCP
SetEndOfFile
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
user32
wsprintfA
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
OpenSCManagerA
CloseServiceHandle
RegSetValueExA
RegCreateKeyA
OpenServiceA
Sections
.text Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 65KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ