Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01/05/2024, 19:32
Static task
static1
Behavioral task
behavioral1
Sample
0ca818e0891059faaa5a27e359c1989d_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
0ca818e0891059faaa5a27e359c1989d_JaffaCakes118.exe
-
Size
215KB
-
MD5
0ca818e0891059faaa5a27e359c1989d
-
SHA1
bb4abc7d811952a8aafc13391b694ec4d2a0a6a3
-
SHA256
e3d7fdead1746a958ff5020f275eab267eba0ecbf7b708758f2293d96b70c291
-
SHA512
1456b9ca16f9b02143f81afb7a8b38adcb117038bca1e42b07594bd52c57fc2adf215528cf4ddf88ec2654f536d34bbbefbae66440b79ef20e912c26fed2cfbc
-
SSDEEP
3072:Rb9pXDyUKdySqVgQZt8OdcjFfSvbke/0t4mwqWB55syoNdL0z2L6BWnqR+yV:BHXDy1qVvZnOe/HEyoGWGd
Malware Config
Extracted
gozi
-
build
215165
Extracted
gozi
3153
biesbetiop.com
kircherche.com
toforemedi.com
-
build
215165
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10242963fe9bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8E54CE51-07F1-11EF-972F-E61A8C993A67} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000cf4fed1011b44752c281ebf0cf135ce5413c0c1d1d183168e4145c8e68786d33000000000e800000000200002000000085f1e4b7cff3c49f6301c0249e6e751d7bed5f50fce0922e13f483b584f7926720000000bf6e7e5de4d57c36c79f1e5c723e4df5f4cf4cbeb31ad44707925b0e119ba00b4000000055c8efffe11eaf7c25851be6ea07e94d8e5c483daefbe1b59e22e46bdc938190cf872a9daa7147ce71f48f64a805e6e7f1e7f7dda133a46407211defd9757607 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2596 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2596 iexplore.exe 2596 iexplore.exe 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2596 wrote to memory of 2972 2596 iexplore.exe 31 PID 2596 wrote to memory of 2972 2596 iexplore.exe 31 PID 2596 wrote to memory of 2972 2596 iexplore.exe 31 PID 2596 wrote to memory of 2972 2596 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ca818e0891059faaa5a27e359c1989d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0ca818e0891059faaa5a27e359c1989d_JaffaCakes118.exe"1⤵PID:2112
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2596 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b10b3692b42f1318e4f17f1a816a347f
SHA1217ea587f38606cc82d81cfbc4b3431c726362b1
SHA256a19277db279b98a01a70cf036b226176e9230e07d407b31516d92793fc399f81
SHA5129269a2436405ffa4c24d02f260f7e779af65e1a249349560ffa4ce60892e36b8268c22c7ef59389d02bc70d43ead77afb3585d35b3b38d0518023180b2a2bc0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505873645fbb1de7f5950dc6269f434c5
SHA152c069ab90e425568c7acfcd45d8aca10d6181d8
SHA256f768b94349bf5dae26258e34c52be7eec44a2df935fde4e10e1b12d23b699bba
SHA512d101819f0d74206edd8a0bebfa97dfb7acee2bbaa5e7202f48aaaa8633b747a7dd216b4e8ffadf136b7bdfc7b3fc57926f2ddc30d5dac1d7321c7f79160ee491
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5ae578acc6c3adbdf350b93cc0129ca
SHA1bdea1ec919dbe9a7711463e6e11a1cf8c63b1889
SHA2560d39099d136a2f60b776027c8dfb956e09f6ba1e38e11891847c06925bda3f53
SHA512c7d1aa4e3764221110cbc7983b5ad0a7de52f31fe55533accfa70d06ca98d3d7fc6b4dc40462114fa6d944e7223396b6d3a4f5c28936de4d553284c392eb1173
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e467b96ae1b03b7a395690f665353ba8
SHA12fbc2a19d69f0967d3960cb42df69d3c08923338
SHA25601e82500bee6a6a2d9f482f7780246d8f644d9339eba4d9b185bf65bdac304a7
SHA512d711a34192bd619a568e4a5be03c5a171b9a66692c3fc05a311b897cccf9611f56ef972154819790a1995a769f30beffca79b16493f85f87f405390b37917b47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a9a405c6546f011657d4f51ce70d060
SHA15491ff781a8f400d0c1c1ab63ea6133e36bff079
SHA25618d0b1aa931e530852eb8df482804f9dd780fe75fbbcc51d82418fc521239e2f
SHA51200a2fb37f6dd0bf47dc8cc4fae1aacc6d817d92ca6e3318e5c6b0806f38f57362ba238664cb03450fbedfc582f248c68a0cbd01912af2655d3f0be5106ca169c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53692baf3b132ef9942d05f207462dfb1
SHA1c93e1f34720f2c6c79c26ed6b3eb69e0121c2d28
SHA256b798774b146ba9758f40a2a2a08b083512644d226a1bdf0a30d60b8e12b08edc
SHA51267a7d324b1aad0668ab4ba8d865ee0c0a0f0108eb648e460f5bcd21059428fd988811094253e55d95479feab1a896310f2f848c24a991fe98e737deb378c769b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f725396636340cac3c9b0ec53acb723c
SHA1b2f5ae94191ef6a2635332df2ff349d9a3164bc7
SHA256f3c8f1fe8ace16a94048f6f8a23b7daa220a8a558b44fe5b62c631512c65a7d7
SHA5124b4a1616316a070692fc608b0c719014c370e40041743b4ad172aed87a93b6a544e7db74ee54252120222fa4b59db4d4ee82daa6d36657c052ca7cd6843349f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52191e0fc06f273e01aa224be6e708e0a
SHA1a8ca90a183427a4f0d3bb0c4e2fb59abec33a68e
SHA256ac503521c98084320b8c87a76637845d297024fc36133a37e3fe3ecabb1fa937
SHA512b9f509c2764bbe42971c8480ff18f799cf551a50e5e576fe5135515fb77e85c674bb7b3e70dddd275bce37706501abcc81fb0936de06859665a1c577b9a426bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adaed92ac1d1119d3bba3a5b4d433068
SHA103f0990bee4d761e2376dabd6995feba034cd393
SHA256c5e766c505ca3187ad514d286aa9a6f5f184cf1a0273d8bf3432404f73f16732
SHA5127814e54d398b99c3f4d5c6984653b983e296b42b9132f0f34ea580723ac93e5e9288b3d6ecdb4c4a9360a989c5113305ba24094501f15ef42a1a9bf93278d041
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a