Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-05-2024 00:18
Static task
static1
Behavioral task
behavioral1
Sample
151fa04d7f14d904a26dea9e6d5aeb5d_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
151fa04d7f14d904a26dea9e6d5aeb5d_JaffaCakes118.exe
-
Size
203KB
-
MD5
151fa04d7f14d904a26dea9e6d5aeb5d
-
SHA1
98138497b764a1c894e7ebd5f0c06fd59c9b9703
-
SHA256
bab642ecb2bf14c321690d07574c14aa962dae6a7eaaddc27db1b8add7971495
-
SHA512
394222954f91fa92b7826a73679d8bbe148ce1d52543efb575f04666d305593a10dd199132c76fa4461860819ba64067a3738340cf6b08f25462907578d3aa33
-
SSDEEP
3072:92ji2dQ6v4uPXDNUj4jKBonzmLXlYVRLh0epEEZqkFBc4+uTqN76o:9wdp4uPZzGonqXGXh0bluBc4GZ5
Malware Config
Extracted
gozi
-
build
215165
Extracted
gozi
3162
menehleibe.com
liemuteste.com
thulligend.com
-
build
215165
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FECDC121-0A74-11EF-BEEC-D20227E6D795} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d02c83d3819eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a96069000000000200000000001066000000010000200000003abbcc97e7f6bfc242d26afbcb0fa847df9ae0f90220e15949c06ef4d0000fc0000000000e8000000002000020000000ae1e49c9ea497d1ace0f560c957087b8063bfeddb59c105a9ae133e14e3cefa9200000005f3261870185b84f8a974f7182e333c5c7db3adb85b2cd951323187fc5f629a140000000297a3dfff8daa80897787917e49135648bb7f387ab6c49bf3a0d10d0bd25e702b8eefe6762ead876fb0e21218956b9eefc9a429acd48caf9c5115100000f8b99 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2520 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2520 iexplore.exe 2520 iexplore.exe 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2520 wrote to memory of 2684 2520 iexplore.exe IEXPLORE.EXE PID 2520 wrote to memory of 2684 2520 iexplore.exe IEXPLORE.EXE PID 2520 wrote to memory of 2684 2520 iexplore.exe IEXPLORE.EXE PID 2520 wrote to memory of 2684 2520 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\151fa04d7f14d904a26dea9e6d5aeb5d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\151fa04d7f14d904a26dea9e6d5aeb5d_JaffaCakes118.exe"1⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2520 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e830e8de90ece15b6ada679a0bf6885b
SHA1288105f4191886a75889feef6da310d98d30ee89
SHA25670dfeecf5b3411440a1e5b157002324a8d15626551e671f0f3dd46fca5290b77
SHA5125cafcaf1ee41d7bd42fbc7df7ce91142639b6afb821e731548a20a3803e35962121ab263dbc0978d4de327f70d9eb325e361e2afcd33b2f3fb75f8ec5e86cfc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD553375676a2dddc9881ad306aa95d885f
SHA18886a4881e4ac2360a5ec12e4c3c219c3817e945
SHA256f5c35328ff0b9cf388fca0015f5f54bd2c2daf15e35b82f4326e8704e19b07b6
SHA512242e547b04ab7c45ff6a2ffcd0d2e0298300732f92b77e412138953b9bf6266cc2ff46215b0bb5143720d359222cc4f42f3d5e7f00e66371c285eb0e3967c365
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53a88c706947617fd69a6e1b2be8ab88c
SHA143482c24f6d9170e65dee8d959a84716070e1a89
SHA256d5db81a0e5738f455e5b88a136a2af73e15afe6d52159aec62589b6a63370e4c
SHA512235357483c25f5c445a1767a0c66ec45945b08cd11186d3a9d3355d81c154f7603e0789ea0ea9ffe214ac000b618cdd9d07cb6ed80a64f5d59899975509a0fe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD574c2ac70a2c67b00a64c441ded6eb92e
SHA1f5fd21ac5b8050403efbbe163ec9fbceabf032b8
SHA2569aa8a2f3b009a056775779d07dcfecbde873ee4e630834b9c05dbabd30f379a9
SHA512ed4b6fd80f6de355767ec46885491e9af201895be8febd77b845b916e31b9cfeb9c5b7ca65c5292ffaaa3ebd80acb3dcc47936d394fbfbf45ab6ad251a575205
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5704490b6394fb03f3b8a10065ea20191
SHA1848600a3eeeb4f64beec6e12b36f4536fa8a255b
SHA25637c9d470620a45fbfbe7dc4ec5cb90eaceacf70bc53e5e3995af9e05f1737cd9
SHA5126ca0fb6a01865cdb1633b1ced448938fc6f107cb83ba824f691ab09201764a62a3c174a5475db2f3c2fa0413f0a7e0be2174b6156ed30b3fe070ffd04f76437b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53119363cc16612bc30c6a70e31bbc932
SHA13aac745a6a1151547d518f85fefb770f1b3479b3
SHA256a2601129c575bcf2f88abf1686e6c0087067e8c1a83894630deac2eea7a22563
SHA512e39fe515a7010ca60f03227dd53044322a2272759a20d97918a7f716484c9a31162c0c02ec8a572c8b567d3b2d52623a9b30aa8f1171c56bac6c163bc0efa518
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54ef0e0b3f922ea0d5194cb23bb7ac40d
SHA18bb3f2e42df541dbb9240b8fab7a4d7e4193804d
SHA256c907cd8b76848da33729e500a378fe481a1355c9974aaf25b01d6c52e936ba23
SHA512d17a50207714c1e8607182bad5bc0a9f2dabb62c6dcc74694d35234b12b47162f08d9f0366e0a494d79a5bb7a3ee38529adb333e4df3a24565ab7bfbc3441483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD52fa613be811ff9ff4701360ea21c3676
SHA1c96a9e9abac782901e6ba0d4b58b4f8b785a240d
SHA2562c5e818fc2f877d6faf2873d1c3f3a70d02736c83272b70ea1e70d0cbf9eb0d0
SHA512c3868c05f449490c4a8c8b890324bf2557527c2efeb5885be1ae6c273790d22d72f1d721b5098ec775e2cf31b638f9e49ec5a28a6d164bc69f66ae22aa777b82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5af7acd33d5087823586cdadee22e0a1a
SHA140a5656e3cbc7f3f03d3cf607cef264297e9821e
SHA256fb4202cd2d79411ea33c998a69207483ebe7bed531cb5a424140e0ec27565039
SHA512e86756ca488d66c0092c5f85744b5a3bad6e039cec9ff9469693dfeaad8c6bff1bd5965ef36768bc250a9d3c9bfcb1be755f8d38da2802aefd0d7706f48e1dd7
-
C:\Users\Admin\AppData\Local\Temp\Cab891E.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Tar8931.tmpFilesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
C:\Users\Admin\AppData\Local\Temp\Tar8A01.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
memory/1924-0-0x0000000000400000-0x000000000043F000-memory.dmpFilesize
252KB
-
memory/1924-10-0x0000000000400000-0x000000000043F000-memory.dmpFilesize
252KB
-
memory/1924-11-0x0000000000400000-0x000000000040F000-memory.dmpFilesize
60KB
-
memory/1924-7-0x00000000002A0000-0x00000000002A2000-memory.dmpFilesize
8KB
-
memory/1924-3-0x0000000000270000-0x000000000028B000-memory.dmpFilesize
108KB
-
memory/1924-2-0x0000000000435000-0x000000000043A000-memory.dmpFilesize
20KB
-
memory/1924-1-0x0000000000400000-0x000000000043F000-memory.dmpFilesize
252KB