Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29-04-2024 13:48
Static task
static1
Behavioral task
behavioral1
Sample
07cec3757ad7218235b8e8c5b6237417_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
07cec3757ad7218235b8e8c5b6237417_JaffaCakes118.exe
-
Size
203KB
-
MD5
07cec3757ad7218235b8e8c5b6237417
-
SHA1
c23c9493d07e14cc81c06176f2fc83db46522182
-
SHA256
b5f09753495f464954880601781c3f02ce80fe4f66ecd32c72a92ca79c4a1813
-
SHA512
bc94ed5415392c8bb0e9fa34e4a26caaa29818f488d4d6eda2cf6976d8490b8be9a7996f46add9f87bce7192e58f5a742f133ce01bcc3f7f7959883e66796be7
-
SSDEEP
3072:93ji2dQ6v4uPXDNUj4jKBonzmLXlYVRLh0epEEZqkFBc4+uTqN76o:97dp4uPZzGonqXGXh0bluBc4GZ5
Malware Config
Extracted
gozi
-
build
215165
Extracted
gozi
3162
menehleibe.com
liemuteste.com
thulligend.com
-
build
215165
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000056a6b73a4afb3095461788942a4543f1a7205fdff66c0b431572d9c8b95511c6000000000e8000000002000020000000322990cabd4cd70a25199563cf684be44d4832cdb2e8a0ff79e3f2835b530514200000003570b97998cea5fb11c5a0903a02f305c9aca8628c84b518f40cf713a72389f840000000c1f5e65526ac5561a469304f2cab93cbed59e0ae8e82198b65b19199ffc47c30d5bea904d25888f6d71097b26daf43b77008776618a4877ab20e99ad62df37cd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80aeb5133c9ada01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3EE884B1-062F-11EF-8A46-EA263619F6CB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2688 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2688 iexplore.exe 2688 iexplore.exe 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2688 wrote to memory of 2472 2688 iexplore.exe IEXPLORE.EXE PID 2688 wrote to memory of 2472 2688 iexplore.exe IEXPLORE.EXE PID 2688 wrote to memory of 2472 2688 iexplore.exe IEXPLORE.EXE PID 2688 wrote to memory of 2472 2688 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\07cec3757ad7218235b8e8c5b6237417_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\07cec3757ad7218235b8e8c5b6237417_JaffaCakes118.exe"1⤵PID:1652
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2688 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500115c1d81b42146e317fd6bc82fe87b
SHA1ce1d5cfb00ef53e924096894d9cba1d78c62e157
SHA256c6aa062a359043f75e390845baebbf1b0a39c4e6bf9b8ff0907d12d1d1927b55
SHA51296ed0c1abaaf9afc05b7b5d269446aa9b1834c312aa4c734c3aa5fc7a1b11f7ff7c42b12db5054ddd14ca19b0678de4929546cbed129d8de040d72c17d501464
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de20952a5fdd9d8fca33240c9f48bd9e
SHA1badb409d3d9b24c2eecf1cb871d5354b67c6a572
SHA25609a30c0ce6c4693cca689e91903f428af962fff99fdf9daf0b07e5dfa5096ab9
SHA512c0c4b44c60306734b0534033acbff7a25edecdd8c5ab5fcf74f0ba99b0a69b2069740eb8a15ea4bdd7170442312603943d746772a1e99324a8deb84fb778dde0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e82af91f6270180d4b20588839647844
SHA1a9d418a58390d0007abb516acda4bab6a79cf540
SHA256dcd1970311be3da2086e6af605aa3327510deb789d7611c95e203aa42ac053eb
SHA512d1e8f83220738523698825a59b43c34726a92ee02b00a4987e165f961c71abe5aae5459c1a60542e241bf190f29e26803d5c7c17d0023cb60a645641ca545d33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2184bc17657884ca3bf1a4554ec01ba
SHA1812600f245ae745f43b10996bcabbc90a66d3263
SHA256a6e3b5c6c744db31bd323aed82cfab6d7c253140674e7fc5818c7321c0bc4221
SHA51204e6549c176a950ce09a746cdb70b892b6297baf23d4b316d84ef7c661bba2c4e5860e7288e8136f56f9042a90957bccfcf4ea7855d7bcd52d0cadb4dacc0725
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad255c27ea17a6f4e5b2060065b4090f
SHA15db6abbd49e3a4c8ed39568e42e00d30cbc4a87f
SHA256835b26f5fb91718d897962c152d8129cb31324f44cb79b52a7d255ddd64a3e58
SHA512012b9213fbc466ca84d720ce2a2460da8d3bf0773d1612465c76a8e13210b99d14ed18a582f4f2f23ba8bbfa39bf2029e7ced86af937a0ccb456e0fb1e38e98f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f351913e6ea54c5071e65f9f2bfd8a1
SHA103945597250a95d350adcac11d6391f7d3b69ce7
SHA25611bb05c10fea2b6a508c1cfb42220fdc9dcb477ae6f13a37a3084108f01675b7
SHA51231fa02785f527ca4fe7b00f670e1db88c942c54f23ac0db4e18abac95a703cda24eb815dd7d528a405bfdfa4f70be078e7ab0e281830e99a3453006091b0e617
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfdb5665d91c81ca1844e5d519c3b05e
SHA1f49b253180bfccde9c55dff708f24c47f111ab61
SHA25681e25f1e61c108ff964aac438b8aa6a5c6f56d4593f855f724ac87c082950bc2
SHA512301ec46c4c46b3f6072a7b691236cba045bf4fc8d24140a796685c61b6aedc4d7717c4dcb01282caaec3136eefc09156487ffc87f465c0d15c9e1fe4c00c1390
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549045aebfa34eeda246358ef6d662824
SHA1ffb309468f4f0c1db4505ca3582776f52543579a
SHA256dc8816c99d5c79a9af44e504fab1a1e1fd9eaff719c967acdbcc54c3e72d02ae
SHA512d91d2073c0450a0c905cda74a3ec6997d7cab5d75908ed4f0e9940e36c91e5aacbe954903bbddf41d3a6e656822e674f968e9977b37c8075daa0e3ac92121ae4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f2a0ad95eaa7771f7a515af1219c9b9
SHA13561f68fbd6ae7f607f114ab49c5c25a38443e83
SHA2565903cb569f7e60e23ecc3633f11b9d9af93a7e3a14a7e680da49b4b4508b7494
SHA512c9d82a11c9af5ff003d612812dfac399de525d16c9137f86fe9620b3a05d39d1a3071e26b8bc64db67d1b6f7e8786422d4ffe36de370cc4b9beb11b261e7cce5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55da02ef5a3d2c545790bb0940b1eab34
SHA177c1a60ee6ad98768307b5c167cb7d3564e03d76
SHA256e8c26c1b9e809f85d34daa795fa1d295c45c654dc094ece45d7177a810dc2da1
SHA51233ab96ebc5ae7a459888d5ef0fa17e8e68d3dbb671a5321f4214e4eb6a0a96574562748cdef3385a106dae28a8af4874e5fd39843cf29db055b83884100747a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599312c8e831ccd53196ac54790abea1f
SHA143c7429ceb37d0c2f8f6c73595226b61ffcaad0e
SHA256d6a3c96b4a9b46769be5aa62ad761576461b3464725921dded4e175aa092ec31
SHA51258c1387f8e065855ce0d18b1f15a1796233b282876389dd713dd29d54060e690ef9d83804143581441e91c6ba2a5b339b7ef1a1e0971483bdc845fc3f715e418
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a