Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30-04-2024 03:03
Static task
static1
Behavioral task
behavioral1
Sample
08e0b9ef42c8a0bc04cb62af20d2e7cf_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
08e0b9ef42c8a0bc04cb62af20d2e7cf_JaffaCakes118.exe
-
Size
269KB
-
MD5
08e0b9ef42c8a0bc04cb62af20d2e7cf
-
SHA1
73769dafe13733200f0f578078e1d3a6bbe3329d
-
SHA256
0ae5c577513e23f8f453d650af3582dadadcef255e1d0970bdd790d52f57d4cf
-
SHA512
db2059a83166ac7e9f0d41f6a72fb2d922f26d52955db61abc836ebe1591861e5901a9e0f66d1471bee858dc10f47e1be48ed2f2a8a8945d4f117619d9f11529
-
SSDEEP
6144:gVfmmDgASD5W/adCxsT4/YFqBcIsBGOhN/35:gVfjDmtW/adCC4/UIsBhN/5
Malware Config
Extracted
gozi
-
build
215165
Extracted
gozi
3151
zardinglog.com
sycingshbo.com
imminesenc.com
-
build
215165
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4CA86B01-069E-11EF-A635-D2EFD46A7D0E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000000136c7240b6750d5bb41863b26476f63918416a4f85b6d0175c85d52202b2a6b000000000e8000000002000020000000fa8659b21b1c6879c1f7999164ce0001dc0cec155867fbce2a1965eb6bd04a782000000012a4507132fc6eac0dc3cc2c6f3116a86a6cd43a851e5585de3694c611bf3c49400000000a23c1ce3e6f17d4b7eb70fbc75736a1ea939bbe889e298fbadac731bcbdf46cfecfa33f282ce9f10ae59bb58ef0c961a71be2ed9c65bbf3ba04e8103ff9c52c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0ad6921ab9ada01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2668 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2668 iexplore.exe 2668 iexplore.exe 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2668 wrote to memory of 2432 2668 iexplore.exe IEXPLORE.EXE PID 2668 wrote to memory of 2432 2668 iexplore.exe IEXPLORE.EXE PID 2668 wrote to memory of 2432 2668 iexplore.exe IEXPLORE.EXE PID 2668 wrote to memory of 2432 2668 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\08e0b9ef42c8a0bc04cb62af20d2e7cf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\08e0b9ef42c8a0bc04cb62af20d2e7cf_JaffaCakes118.exe"1⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c8cda84f569b050a2a8ac2022e616a15
SHA1586a5306e5b0749361e1ccaa4219ed84f6b1f4d8
SHA256a9ed10204d296ef05c816f54c089a63dfab41b3ae89cdbfa7080196e16a6e5c3
SHA512faf2a78fc5617cd59130cbba972c190451d1226759c68f3e2f9153e9f12bb44da24469d04edb98e7cba0e5f392d645dac1aee5a8b81d72f69ae7635bc0fdb640
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59b586a18da613d8a21e4e6357f470dbc
SHA1ef4c9a82b15f84682c2d889f35566296701b4e11
SHA256250ac8090892fb4b4be2c6c48be8a73c92ccd7261c69a25f957df769c0d2ad9e
SHA5123bb2231f9ef7d0a6308a1e12f6dd6396b920a5dab6202d901c6281556052103099720eef362a227db6d80a52e3905a527d3521c52fc4c80cb2c4fbde8b9e3a9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD58171b2ce9482be0257549a9c606dc59e
SHA1369017b705f7f0881516f98ac45896a7bf777aa4
SHA2565f7d0b266ab37481e889387fac3cb2227777c224408ddf1a1590521b19544f49
SHA512be3ab07a55ab37f1d9ae11a0be5fab82b35ca062bf5b4bea3335b18c7de175e3d09d8a69923581d32f5ee3325f8c496cc9dd22cb90b670d4e14883da2fc5cd65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53a9022d76a7e41da6e1b3c6bd316dca2
SHA165962331335219bde7259bcf54437ca1a81aa1ef
SHA256158f4638f3c736bd243fa125cc92d621024a80548b4ac724ce5fc579fbdce0dd
SHA5123fe1ae13c72e46f9002b6d6e24f6e666a9318ac0de3fb1ff2bd224a9a82c4aa013f79a773a67d922fcdff0ed9e0a57b551d0703eb472ba332f34b32847230256
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD502bd5159ba4554d922859809914f8c31
SHA1bdd0e7272ea174a0eae406782b6a705bb07d8b0c
SHA2560b0ade462b3492c12d86d8bb9c25dbf6dd1a2ddef92c91928b3bb8c6396596fd
SHA512a60fdd9160cf5b62f94a8c7380f5d59deac448a16fdf180ccea3dba99bf5750263dce46631335d64c2d8a63a59f6877d174e4630bf9af8929767ddc8829a62a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5bcd3666e91ac87df2bb684e1c4efe95d
SHA1624a9ce0ab58a5f0470392aa7e32c959d1eca360
SHA256e77edf5c64312f19c4763180e1f359f9bda297c3b3dcd7a4c8a21dcf83bb8091
SHA5121cd9d1b64a166b555774e980dac18a114f3dbc4330bc61a49c59c24ae48bbc325c9d58b572ca285bbc6eea5b5277a391ef53e26187518f25b7031234ce80c212
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5356c7d68842e3d68337a5b03830151a5
SHA132b544e44e3faeb4e9aac8a22275ef2caee75bad
SHA25657c9c5c03403db1289a27427c0e033439bed2c1e0f14b502d7d8301d2fbfcaa5
SHA512e75ac5ee05869c3f4b7fce589d10cd34294e48a9b41554b47287122d593d0357b7d66a5b065d26a0ae556dd6beb48c78b171a7f3869f844f789d27ddfe55c53d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51fe2d240045867c1335b6782e7572bfb
SHA1c02408b52e8aa7cf00084c7f69429961fcfeff1d
SHA256476633f7b996533fbfb392c1b51f41963fdb3db5296926aca3a10b4646e7b867
SHA5124e33fad954189cdc89ec0a22a7c4ee40b6515db98565d0fbf77a2c066ab5a624c079f155f8357d76915a0441cabcce0f185c990ec4641c1ffe0f4fbd28436cfb
-
C:\Users\Admin\AppData\Local\Temp\Cab9751.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Cab9822.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\Tar9825.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
memory/2320-0-0x0000000000BC0000-0x0000000000C13000-memory.dmpFilesize
332KB
-
memory/2320-6-0x00000000003D0000-0x00000000003D2000-memory.dmpFilesize
8KB
-
memory/2320-2-0x0000000000270000-0x000000000028B000-memory.dmpFilesize
108KB
-
memory/2320-1-0x0000000000140000-0x0000000000141000-memory.dmpFilesize
4KB