Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-05-2024 23:55

General

  • Target

    31b021a4ea9e67758113887dfdf4ee89_JaffaCakes118.exe

  • Size

    1.8MB

  • MD5

    31b021a4ea9e67758113887dfdf4ee89

  • SHA1

    ccf28cd9451e330c498d4f9b23b19fe471e1427c

  • SHA256

    892356bd0a480bab24daaa62d66d31b957cbc2bc4414e07a70ec86fba39af0f1

  • SHA512

    7f41bc4c454def40edd3769286daa68aa5e3ebedc4358997556c9ebe9046ed613862e97be8e72c8975e700c3f27a8de8ffa8d89779438c2fef0a8c11119ffe9d

  • SSDEEP

    49152:wK+Hl4vGdpSL5ktmiMb6eMxbqgu+uZtn7ONp7bd4r54pHduC:j+Hl4vEpbtmiMb6ehgu+uZtnCH7bd4r2

Malware Config

Extracted

Family

gozi

Attributes
  • build

    214098

Extracted

Family

gozi

Botnet

3493

C2

google.com

gmail.com

lsammietf53.com

p28u70webster.com

ploi7260m71.com

Attributes
  • build

    214098

  • dga_base_url

    constitution.org/usdeclar.txt

  • dga_crc

    0x4eb7d2ca

  • dga_season

    10

  • dga_tlds

    com

    ru

    org

  • exe_type

    loader

  • server_id

    12

rsa_pubkey.plain
serpent.plain

Signatures

  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\31b021a4ea9e67758113887dfdf4ee89_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\31b021a4ea9e67758113887dfdf4ee89_JaffaCakes118.exe"
    1⤵
      PID:4800
    • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
      "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
      1⤵
        PID:4552
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
        1⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3632
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3632 CREDAT:17410 /prefetch:2
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:4008
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
        1⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1372
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1372 CREDAT:17410 /prefetch:2
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:3340
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
        1⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:520
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:520 CREDAT:17410 /prefetch:2
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:876
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
        1⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2220
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:17410 /prefetch:2
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:3400
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
        1⤵
          PID:2896
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2896 CREDAT:17410 /prefetch:2
            2⤵
              PID:2788

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\79ZXHV21\robot[1].png

            Filesize

            6KB

            MD5

            4c9acf280b47cef7def3fc91a34c7ffe

            SHA1

            c32bb847daf52117ab93b723d7c57d8b1e75d36b

            SHA256

            5f9fc5b3fbddf0e72c5c56cdcfc81c6e10c617d70b1b93fbe1e4679a8797bff7

            SHA512

            369d5888e0d19b46cb998ea166d421f98703aec7d82a02dc7ae10409aec253a7ce099d208500b4e39779526219301c66c2fd59fe92170b324e70cf63ce2b429c

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\CMMYN4JX\googlelogo_color_150x54dp[1].png

            Filesize

            3KB

            MD5

            9d73b3aa30bce9d8f166de5178ae4338

            SHA1

            d0cbc46850d8ed54625a3b2b01a2c31f37977e75

            SHA256

            dbef5e5530003b7233e944856c23d1437902a2d3568cdfd2beaf2166e9ca9139

            SHA512

            8e55d1677cdbfe9db6700840041c815329a57df69e303adc1f994757c64100fe4a3a17e86ef4613f4243e29014517234debfbcee58dab9fc56c81dd147fdc058

          • C:\Users\Admin\AppData\Local\Temp\~DFE697A5B812B6E458.TMP

            Filesize

            16KB

            MD5

            5c1eb8243da51533ca9eb05ac14d0d83

            SHA1

            ec4bbfe8aa7f970265cf15f2a64163780a58fef3

            SHA256

            8646305dbb3650ce6c2daa6068bdf4ef4e8942641ae4bb9401fba85efac77789

            SHA512

            7e87db3d969caaa9c3def480d839e4eaadaf603e1dd5dc06142f7105734a873fa2e292b6eddff884c7029397928e1345353597e93b5b3b252a778d64957ce63a

          • memory/4800-0-0x0000000000840000-0x0000000000B9C000-memory.dmp

            Filesize

            3.4MB

          • memory/4800-3-0x0000000000840000-0x0000000000B9C000-memory.dmp

            Filesize

            3.4MB

          • memory/4800-2-0x00000000009EC000-0x00000000009F1000-memory.dmp

            Filesize

            20KB

          • memory/4800-1-0x0000000000840000-0x0000000000B9C000-memory.dmp

            Filesize

            3.4MB

          • memory/4800-4-0x00000000027C0000-0x00000000027CF000-memory.dmp

            Filesize

            60KB

          • memory/4800-17-0x0000000000840000-0x0000000000B9C000-memory.dmp

            Filesize

            3.4MB