Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09-05-2024 21:27
Static task
static1
Behavioral task
behavioral1
Sample
2bc8cee04d1268e58906da502cae5fc0_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
2bc8cee04d1268e58906da502cae5fc0_JaffaCakes118.exe
-
Size
215KB
-
MD5
2bc8cee04d1268e58906da502cae5fc0
-
SHA1
c3f9dcb9a71449913a1dfefe8f45eca41d2c1186
-
SHA256
3665125d615fbe020d0e2eb885aea3aefaa032ed78f2b1427ff1163ef1a44780
-
SHA512
ee198df0bbeb54d0367ee770325925765209c11aa6d7ecaca9a1b0632c0c8110b67763ff9390c43373389abbc396f15ecd3620db748863a5d8695574840f126e
-
SSDEEP
3072:Rb9pXDyUKdySqVgQZt8OdcjFfSvbke/0t4mwqWB55syoNdL0s2L6BWnqR+yV:BHXDy1qVvZnOe/HEyoPWGd
Malware Config
Extracted
gozi
-
build
215165
Extracted
gozi
3153
biesbetiop.com
kircherche.com
toforemedi.com
-
build
215165
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c08c38ea57a2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1391B921-0E4B-11EF-BF06-56D57A935C49} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000f5d7723ca40c15298260d00fefd2359de7aff6c5982bee165a7686422051307c000000000e800000000200002000000037833fa463777aba704d5692caa4edc37f7057fd7e99c3fbc245bdef8feb42e5200000006d10cb24578d9480e1de98595b98724af756746adb294fcc07754e1fe7bc6502400000000937f6325b26356aae8534a4ac76c85fee27512454fe06c9686ca9e43e2d8d66f9676c0735e238dda61a650e137116ce9085ef24b8accd4b097393e95bb21bb3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2624 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2624 iexplore.exe 2624 iexplore.exe 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2624 wrote to memory of 2432 2624 iexplore.exe IEXPLORE.EXE PID 2624 wrote to memory of 2432 2624 iexplore.exe IEXPLORE.EXE PID 2624 wrote to memory of 2432 2624 iexplore.exe IEXPLORE.EXE PID 2624 wrote to memory of 2432 2624 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\2bc8cee04d1268e58906da502cae5fc0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2bc8cee04d1268e58906da502cae5fc0_JaffaCakes118.exe"1⤵PID:1252
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2624 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5892b8663ea57edcd6ab5d827234b62a0
SHA1268933886103506333c4cbf4d690ce67e4e78511
SHA256c601509ba84a105549d1a9c8592530a4715d02687d2ee0c8666c87096c29550b
SHA512b8ca393eba633da5a0c9258e4ba0a6f5834d7e0005b34e3182d2661df7445c1bc8c4fc70842ba0d33c177bd6b954f85bc7baec5148fa2c6de2aa7fd6caafb6d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d95b266fff512851be1b8b8cffce48f9
SHA12fb824f47c4098504bbca286305af6c186702105
SHA256ce9929e278ac824a572dc94b711dbcb9599252ff7cee29f4375cf146413d6d1f
SHA5129ecebb92a2b406cfcdbd78412780281e47f0bf667b87fe41854e7260d7b318587415fb78024bdb22030d90f30b854882881aa1c7c84169bd726c1b2f71f0823c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b56a941a4da143e9987ffa86574e8642
SHA18c985c602ae5de47aacd3b133e66a0f60276d7a7
SHA256e31a4022ec6b26f09a649d7469842b863d00c140c0e4e0f54dad4b669da030cc
SHA5121fa67c00aed7654b571ed87da40f9422c91c6686fb48751e2eb5b03d4695d27477dc2392963c2fab3e66420c8b85045e76d3cdf901b56d9fc32768934b5700e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a865baba31992e56f8a5d399e3ef1493
SHA12f5217c17cb0e57a3d9b3cd2969eab5d12607832
SHA256a267fff2bd95c667d0926ab2c3f24933c6b8a315c9c312c3f2480bb4de64a26c
SHA512f889297653d93ebfae94cf18b5dd965841912f12610c4205d3d0c98152cbd285586bb90a09896ef74d8dfe2385f73cb329b06a6fc57cef46100464e22a357eef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bd1e8f7364cbc561857342f93f2dbb9
SHA1bc61d4aeaa7ad772bc901c0b023d1051993f43a3
SHA25639f3fa40a820b0d96c7a0910344ad7a08a628672a585c2182473b6ea9dad9548
SHA51247dbe1b2fd4e9e23237d6c10f5f1a7df7024387ee958708e0f9345258579dfa6d7e06ef21e2deadd9e3a0cbc91538ef5e0d74e73a03786c9277cd6d59cf4f895
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542418568faaea54829b0bf9f1ffbd6e7
SHA100df95c25f8c8817435fbb0a26e7795b94deb54d
SHA2561b349a2d4b665142a1b687fda966486f96fd016d9c00c53fb6e6746119ce2f01
SHA5121c702fa7adecf0f6c3ba5601ea0d63c61b5d03576aba6b99086477f3122766d89de4a495aa8b8ab2e4c58b5790884b3e5524e2bb8a033508347a3cbe5e3bf480
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5933b91f3c417907c2f461d8cc0c7c341
SHA11ce7bd8c839b6858bf0eb24660634a556c2316ca
SHA256e7ff625ba53d0e3445601649eb8a6711bfe5a2514825f764994d9a3ed04851c5
SHA512eeb92541802162b45f5a5321122f02b247038edf12ccc6b452237d8263311724b6d6703a220725ad808fde9a39569f2fbc16b212036c1f2aee5ce91eddf80273
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50627723965497da77e7cad331cc5d012
SHA11b2375acf142d57d80f070ebfcba6df9f7b267a2
SHA256e924904b8bb597946a1d75e5939b9acca4067e20b47a67266c2273b9149330c9
SHA512b7e3f4b1a0c02c1d3f47b3582856aca4a14f1cf5caa9525c5a9094379093b498cba024a959927b1af3340a9dffc6df1534b8e014fb771e64eca04538c1595d3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5076dc86aa66bfecdc15ba58008b71467
SHA1ebb9c6ac5e1e29765ce964e2df5318b5744a1a64
SHA256f4b9c692f224d29241aad14178dff99496015409605c27d8c0358018442ff9ac
SHA51295c89b4641a62d2e30383da130e63318a845c03db21a60f01b249f051e3bcfb5511a6f930d665eb22aa281aac77ee38d946d8efe5a07ea432367f77954014b81
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a