Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 11:22
Static task
static1
Behavioral task
behavioral1
Sample
2edc559732a0e9e45fe8ca0121e2787e_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
2edc559732a0e9e45fe8ca0121e2787e_JaffaCakes118.exe
-
Size
269KB
-
MD5
2edc559732a0e9e45fe8ca0121e2787e
-
SHA1
f38cb4897c111065ff830df36921ebadb3f0ad31
-
SHA256
e4de14ee872b74e8d8a9c505eed50055842ac748d7d97fa7bf6c0898e7136d50
-
SHA512
4fee361658d28068c7f5b90b476732f294b5bf6305f6450d76f91734df9a77702a0ba52a8cff0ee7ec8b3e1b4bde96fba40c6d4fcd60a92ed7d82cd70c4b1224
-
SSDEEP
6144:/VfmmDgASD5W/adCxsT4/YFqBcIsBGOhN/35:/VfjDmtW/adCC4/UIsBhN/5
Malware Config
Extracted
gozi
-
build
215165
Extracted
gozi
3151
zardinglog.com
sycingshbo.com
imminesenc.com
-
build
215165
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A1C1ECF1-0EBF-11EF-BF06-56D57A935C49} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000a94825640d41296b5e085de09a3095e65c3c7a319fb85e5f701e2201ff4469ce000000000e80000000020000200000009d8a94617261050c295e46a8f80a2d9ab7604a0100f7af560273db5db9086562200000000d1f38574fc173969cc81a4dabd93c84cb956e2aca43960d573dc9142e7f9c6d40000000eb77c15682b4a0570b05ee3b7a22870176b8039f0a93f32991f47a7ec101e1746d1631f38ffb980a244ecf7c32da7cea880e449decd39b00976a5c2fb28f7585 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 208eb776cca2da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2384 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2384 iexplore.exe 2384 iexplore.exe 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2384 wrote to memory of 2552 2384 iexplore.exe IEXPLORE.EXE PID 2384 wrote to memory of 2552 2384 iexplore.exe IEXPLORE.EXE PID 2384 wrote to memory of 2552 2384 iexplore.exe IEXPLORE.EXE PID 2384 wrote to memory of 2552 2384 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\2edc559732a0e9e45fe8ca0121e2787e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2edc559732a0e9e45fe8ca0121e2787e_JaffaCakes118.exe"1⤵PID:1252
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2384 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1e78457d7ea5bc8a2662e8eb402087c
SHA16c6c2e511f4893ff2aa0a0e6439cd973c8638b8b
SHA256913402044ba7da5316cd14352f0ec69c46e0c05ab2589f75bf031c6887f4b059
SHA5120b3faf60752a4c9fd696c61d59fe243190bab2407153f08bf98f0c4e1bc170513909ecab5851eb3ec8f3fb0abf10047a0edf6bbb7816bcfa2df74839af4a3060
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e57635890601f2f471fb0997caef659
SHA167969bebc5a9d374d0e63fa54f4325ff1fae5bcb
SHA256b5e8b979805e00a53f13dfe11b7e05ee061299673fef80f01563506e7a665867
SHA51257fd483292038330879584ba05765cb634e61e11ff506756cacaafd5d62bd546ba73b4fe51c09e3d44cff6bd3f9a48de2e150b57a0eca21ebdbe8029fe2bf655
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593dc6c1a0ccf4d2ef027215e3d3b12b3
SHA102e7df512f7c5f24f96ccc8b9bc5a3dc64bfb017
SHA25674260638ecdc6089cb9336b7c1752df87932e073e8df29cd9b634afe70b61079
SHA512226c4785b620ab130d4e06d3d72c4e3857ce1279f2de1418193546f67a14d55ff7e9538857520eb8ef1769dcd15499b6b74bcac11be30809589cef7cad28cbc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a81846e560e2e13093941ad71de3ebb4
SHA15c80674c3fb1325d31c6a5b0724b95ca747412dd
SHA256f6eb2123deb2beeeea6a4b1a8b4acab17fcdebd6a852dd6fafb0d835edc83ce7
SHA512401f051b4fb40532471cc89ce009f3df2e02d83a01fec2c4d620876852e6e26a65d0ed7d076b6d8e1a8576258f00c589363b05620425e9c3b9e3041cd9c5a6cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f662f73a45433a442e76316850cedf9
SHA169967a92788afb623ccb500d45d0710ee59258fd
SHA256f1c5ba217438226b5b34c083e7a57f2316cf815743ca6ac080b8c45f55002c41
SHA5128f67dd7e75a8d44a33b95eb00a2d72c6d00ffca88f44a4ff2133b21319163c872e676bc10595a0017d381b3f71ece79b8f80e3ae74a8dd272d4ec6a6c2d64670
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538e68f772e78e6aca55c6a9f926a04dc
SHA17f468bd757c8d3f40639786664d970b25051f70a
SHA25647017fcd670e4ba28129fac8c5a5375990eadd277b5b8dc7b6662d1f5910ee11
SHA5122d4928b29e9458836bac97b8204b93225dc7fdc09808e6cb78787e7a32ce639353f13a3bd5c6e763f6390fe020f65cceba30fbbf0b292dd993e84e06c8d860ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0e2f02792653144aff34bea24fd5e33
SHA1a6fa50927fc9d5a472a4c7386bcbb76fdbafb88c
SHA25621997b53a49d7f7d8de971bb23cc12c91d72c471d7046621a0055f99f6cabea2
SHA5123aa8cdb12a5cfeffbafe691b6d19120512ac374b7cbe10b3225371f1257dc48108e23e915700f651c2c8199397b2a6d639360f9bdf4c9321cfcbb1815f445ea8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea3d589fc5e866b97f1e634774269d01
SHA1095b3ba147499f76cafe5ef4df37f3fe997fffda
SHA2561b1d2bd390abf6f0d3f62f38c638ca86c756cf47c94b58ce69c42461a137b3ac
SHA5123b5b647d78be761d9d31cea31effd718aef5d6ece0d39d81c39fe23f9dcc488037494c4f5a946b3718824475662f75cd23525398a58bff97552c7b8f13a73f0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ba808081cc6cdef69bc315e73f9dc11
SHA14a9c880476696a2531dc0d8d82382d4283784352
SHA256fa87a55e4fe9ed693d1e19c657e7327dcd10d4eece6e2d3076699223b87016eb
SHA5124528d681512551842fc96b854809b3a261ee49841b8c39caa26c7a32db02c44f46da1b40250926fbd205847cfb13f2ecc8e5f161a7f860e30430c2c352facf42
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a