Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 09:33
Static task
static1
Behavioral task
behavioral1
Sample
2e79e2372b2a6f8f1fc3cc91a256bad9_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
2e79e2372b2a6f8f1fc3cc91a256bad9_JaffaCakes118.exe
-
Size
203KB
-
MD5
2e79e2372b2a6f8f1fc3cc91a256bad9
-
SHA1
5618e603826edfe9fff68b5f91e7430198a17a5e
-
SHA256
01bd969e50eea03c1912cb515e547b98e353b93c8ce4e2925b706a997b38697a
-
SHA512
5c1422ae1d54fa367f246160de2b86873f06ec1166b29a5426ed11f20154a20d54825baad248f098fceaaf06ec210a104c228696a81d0ec7bcafaafb1c1860a8
-
SSDEEP
3072:9hji2dQ6v4uPXDNUj4jKBonzmLXlYVRLh0epEEZqkFBc4+uTqN76o:9Vdp4uPZzGonqXGXh0bluBc4GZ5
Malware Config
Extracted
gozi
-
build
215165
Extracted
gozi
3162
menehleibe.com
liemuteste.com
thulligend.com
-
build
215165
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000ca28de4baa9b4ef5eaa9246c4ae499fe6df98bb82b69fa92477d1dae4194e6d0000000000e8000000002000020000000e8aba5d10bba6da94cdd97d344f97d62d126c41010934215565d6ab5624058fa2000000033d8920311e148b7cdd87fb42bf096693ffa6b7ea24e03ce3c937fd714867acb40000000d87cc4331c5e85073c0366e4713c4379eb89d640251b3f045c553c16d024d5c1e3ccd4827b23ddc93d4b50d59cc82ddd2c83f1799334d4dc8caa69e7f677a617 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6566DE01-0EB0-11EF-8745-52ADCDCA366E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0411c3abda2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2228 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2228 iexplore.exe 2228 iexplore.exe 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2228 wrote to memory of 2368 2228 iexplore.exe IEXPLORE.EXE PID 2228 wrote to memory of 2368 2228 iexplore.exe IEXPLORE.EXE PID 2228 wrote to memory of 2368 2228 iexplore.exe IEXPLORE.EXE PID 2228 wrote to memory of 2368 2228 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e79e2372b2a6f8f1fc3cc91a256bad9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2e79e2372b2a6f8f1fc3cc91a256bad9_JaffaCakes118.exe"1⤵PID:2240
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2228 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503c53b6b961fcc7b36c712509598b812
SHA13a5e3b0d7420fb3ffa8931c7dcf89118eb53cb22
SHA256fe796af89b9c2cfa02fc870e38da8991f42580ed8775c003c46c3b7ac4f14ae9
SHA512d3962f10ccfcb972bccced2fd309c2ebf75b3f720ea85709c956f718d5fe352cdad85be3f60493598877dcc393563ebcd7cddd765310551e32d0ae5f9f8c66b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5553019c76f24e59b8ed2929ff6105667
SHA1428fce327ec70542530cd36d1914bd0fd10a499d
SHA256d381023b8864490c71740a4b56f8794fbe0848b2bfba6ad6cdb3725120af9e13
SHA5127dc9a707a50fb2fba03af91af762409384de8327ce7960bdfab50042f349de86eb776bb9a7a95ce3f728400325d1fc3ffd0ba004591d28fa25af1e2698322b11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5063430158ee52ef1ae209d9cd6b78a3b
SHA158aebcfac09ccb3ac46cad07d4337b6b6cc5df50
SHA256225b0b58f54913359ac3c6e17e3ae6ec3524a047be1022173a97223247ed0af1
SHA5121689240445137da33a97cd1ddacbf6d14b77416e50c77cfe8b756841b713052f77d7a597112aba9c5f7b41c56cb527ab4dd1a33e75251c8fc4d84d1721136a6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52151064ac8c13ed920d2d8447ac5d561
SHA19682a90119bad84fe0acd4f505f76a93e4b8b6d9
SHA25689ffd80dd65c3757d49cda2d60780caf5b347ff350a543094102c8bd894cf0a1
SHA51226ab14d70b3fd586d0f61e3b1f70bbb64b1707f4f79961d2acfcf105be656c3a0139776a090fc4790f6d1cd206881775b59d315b682b056406f21955fabfcfe0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5863ba5b9a8046e91d761a312d0c90e73
SHA1538f2c02a398af7812bb78307ebb540c305a7abf
SHA256af675a6484b4a16ed1e2eb0a1b128ed9296141874c4b4ab2cd56eadc9720786b
SHA512ce2fecc6b6e29885a419e1efa82ea6ad37f9524d855d6a0ab3234e5d2abddef4f4fa04fc91c9c8dbea91a534f61b00e8548889d0bcd050ccd26a5c4182f63baa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532d618d3e3aa44d26bc3fcf84ba07435
SHA113941f3c9f5a5a9d3ded722bbf922a499d7e3105
SHA256087da30d3b492a3ee180e92b6337a3a65ec19cd1f866a857f53a80dbd7407aed
SHA512cf2b2d1e252fb58b5dd52f05311ffaad9ded89fa05db44aa1fbd25fbcef26e359cb25200beb8ae52d79c117424818c1ef294f128ca0fe5efc507d6cb13cb48d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527159de347fc66864b0fb1616aa0ab3a
SHA165416e58132caefa0ebcd132bc1c9006ea5981f6
SHA256aa64480acbbb43cbea39278986769008a5d9353cc48fcf94785a3f2114b646a2
SHA512caa513a9f191c25dd67a4ad7cf11f6e79d1e4ca3e54dde394e2b565b36d5011d7341a77920256bcd4a8bbad2c2824adf9bc689c621ba895f82fc58e43f66492a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5739ebf6803be2cea53fefd1ac8aa8205
SHA1794d75dcd812c9347816021792f3d226113182b3
SHA25634126fd190d9500a98f597e01a704954280ba68e412a385ce0dbadf3cb01287c
SHA512f96b23e5dc56cbe913654a284d1f4454d36f6f9f57d33897f05ec765b57b0cce36c3f744f054fae851f3b0e5acb246edde84cb87e4330c37c01c4b6975befc6f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a