Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
02-05-2024 00:38
Static task
static1
Behavioral task
behavioral1
Sample
0d000748ed275195be493e094435069c_JaffaCakes118.exe
Resource
win7-20240419-en
General
-
Target
0d000748ed275195be493e094435069c_JaffaCakes118.exe
-
Size
203KB
-
MD5
0d000748ed275195be493e094435069c
-
SHA1
90a77087bae8d2d53ca4c49452e07bbed067d69a
-
SHA256
95c2e799a86e222b4d2b8f83278df0324b6a2ec99ba69ebe13f51b0087e8125a
-
SHA512
a92002239a1405fad253e83c4d80ff46b3063815a930bd3e7765cd47f9547cb81a05055e6ae9b1011c24b9b74976d0d72dbc6f3b2108005ad86d9524fbb54a84
-
SSDEEP
3072:9xji2dQ6v4uPXDNUj4jKBonzmLXlYVRLh0epEEZqkFBc4+uTqN76o:9ldp4uPZzGonqXGXh0bluBc4GZ5
Malware Config
Extracted
gozi
-
build
215165
Extracted
gozi
3162
menehleibe.com
liemuteste.com
thulligend.com
-
build
215165
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{62B9F7E1-081C-11EF-9A0E-5A3343F4B92A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0df5937299cda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000006097fb7772a9fac0aa932474448f3fdc22a5fb82ef23e027c848d3b6333ab4fb000000000e80000000020000200000005b3852872a60f917b4355f8641ec21e87b10ff9740149abc275e7e81877b51cc20000000bef1aefc23e4ab7cc94392f790b4a9790d554ecde6ad2961272ce6f6f5c3ead940000000aad030eb911838080205818e4b9d4556d94c307ea2d8edc9797ac0c3ddc412832f6b6e4898c5043922058242b7c419f273abdcfce0fca93c0cff94f6f364451f iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2660 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2660 iexplore.exe 2660 iexplore.exe 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2660 wrote to memory of 2056 2660 iexplore.exe IEXPLORE.EXE PID 2660 wrote to memory of 2056 2660 iexplore.exe IEXPLORE.EXE PID 2660 wrote to memory of 2056 2660 iexplore.exe IEXPLORE.EXE PID 2660 wrote to memory of 2056 2660 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d000748ed275195be493e094435069c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0d000748ed275195be493e094435069c_JaffaCakes118.exe"1⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2660 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5223890f8c267d17dd9d6b80d90e6e4fd
SHA12065c37727d6ea5b7142199972929e9cc4344b67
SHA2567769c2b934b5e18246dda0624e49a5c8531c090d89ea89e4cfb54fa7985521eb
SHA512c108e700e7063bfe98578decd9595665d7ca8a0ff14943cc4daf51ac463709c066d0b4d243c182e7161116bc29a16f504f6df2280ed24630a5b21e0088c170a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ea938e5afe6fced28780c4491ec29b10
SHA1d0db2d4cfcc0677f050a1976ea1a05cbd61863b4
SHA256f2152cdc0bdfc5dad15f3a7639c49e2d61970def3e7eaffdbb7f1e91767af19c
SHA512cd689cbe2cb7f8d3eebbdf805bc51e9654a0708aad0fae69b231bf11e80f9d4696e524a598a05127a78a551c6d7c030b06f5d5b2ea669c08ef937042d7fc1c40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51e5efce3473ec149ec82b7437351b311
SHA149ae11a329ae10b29db8cca57483b7fcf41c7774
SHA2560a988840e5885330fcf75fb75feb641cc9d935b0046c6ec19a332642ee7a2f8c
SHA512edc4b3cd648413eef44e1e66fed19627880ed21f9f183cd91ed8f5158687a386078d27d33bef17f16a7e93061d32a314feb947af806f5e45916105c8065bc54d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD57d053f1ab26fee2be6f86b34f1226373
SHA173599a694c69384adf6ee99573cc8b69131821e3
SHA256360d5cb9be02cc87a1fa2846244613b37601e1f68caea1bfeaa9cdceb7a74fc4
SHA512e4d00b0ce66279a9f8962278f9a25dc4069caca9af278201d9fd5e8dc5f3ea35fe847147573f629b41e67b03c4930cb478026fc1d62effb2d7ab87e1d2d652de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD593bda99558c9fb89d975e69865fe5dfe
SHA1837f7954928118dfbebcdbc381c42174116039c8
SHA256d3977c084355f00b38fbc6e040f9041cf0ce8f067b97a5f17690399e273c3b9a
SHA5124cfccd020cca9b79d696a0299d90a7267340cab0be9818b543575ad0fb2e8bc1623bf8977edf1b125b581c58ec765e39b78a1af04dc1619ecc4139962ce21408
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD579e970b34ef8e8b593515c97bd6daf8b
SHA1d376806bb92496777533e22d60a17dd636436a85
SHA2568e5b76592e496f3d656c25f180dbd82f0d194e3dc40e907732a9d620f5d6c881
SHA512382299aaf0d8d471b6ce1293fee530810d09962e6de428901f34b9f32c92a17ee6a02cedd617a209cc57e79c72401d948a9387eaabe09d3c98c59d36164bc21d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5951c062d84754209e8d740058f5eeffa
SHA1ee8711e377d8caf1e060831c5d4f45512da661e1
SHA2561be305c2f21c83837107ced142fad0ba330534455e93b1b6b9e20b5336c7035e
SHA51247d51b402e7d88aff86506a6ce472b2225104de81d142cfa28d6dd09e241ee61c9ba63995f6dda7ac3862726aad13eaf2a474e3c07b3d75904113e945e1441cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55503a7157e346c30b3ec98053862add6
SHA1bd781aba2578abcc142912d19fd20ec24150cf27
SHA25685203398c3b626e6bfff895dfc831a2fea183789ec9f72b02363a1fadccf1ace
SHA512019077dec94fd8518263bd4643f576c4bcf14081b4bec635b90a663d90c1858e69bada3ce7f6f23d65c4e3d51f90d0d9f27eaa4aca356428457c304559a2f955
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD501b3af1bd52f144946b39e53fd89760a
SHA106d8fdf48ca0566dbe0b198a1776c48d7289ee22
SHA256022c3ad799cc07e544110223ba1eb4011d6b9df5410b7d541a29e05cab093bfb
SHA5127a6ade4d533994d1ddc7d1f3091ec71a702f290748ef72f228b225395668b78ae1964b153e335fda6f3460efbb8e73ef3178abe639d9dfd294735804548a5624
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d1c2b04525b561697b47550852f13e0b
SHA107027322a38ca22051b6f6acb8caa0f7d3ce28c5
SHA25689a81176cf9911caf7a44ae754c729ed8d0b9b9e257316e919c0f2688c379743
SHA5128be0f3dab7622d78089aa13a1d5c740a9ae907c3db495360d7ee957eb2f7817ec789fd47f24920141c7d16e522376d4d4f0020b597137f15b880107c9b206dc7
-
C:\Users\Admin\AppData\Local\Temp\Cab68C3.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\Tar68D6.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
memory/3000-4-0x0000000000270000-0x000000000028B000-memory.dmpFilesize
108KB
-
memory/3000-55-0x0000000000400000-0x000000000040F000-memory.dmpFilesize
60KB
-
memory/3000-8-0x00000000002A0000-0x00000000002A2000-memory.dmpFilesize
8KB
-
memory/3000-0-0x0000000000400000-0x000000000043F000-memory.dmpFilesize
252KB
-
memory/3000-2-0x0000000000435000-0x000000000043A000-memory.dmpFilesize
20KB
-
memory/3000-3-0x0000000000400000-0x000000000043F000-memory.dmpFilesize
252KB
-
memory/3000-1-0x0000000000400000-0x000000000043F000-memory.dmpFilesize
252KB