Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 21:15
Static task
static1
Behavioral task
behavioral1
Sample
3113b5d5384728960a57437431bb30a1_JaffaCakes118.exe
Resource
win7-20240419-en
General
-
Target
3113b5d5384728960a57437431bb30a1_JaffaCakes118.exe
-
Size
269KB
-
MD5
3113b5d5384728960a57437431bb30a1
-
SHA1
ad8178a89f508ba3feac05f092b39a4f55705852
-
SHA256
dc1daf2720d27e22b403a5ab6a7e233b048ee4640739f67fb6dd53adfcdb56db
-
SHA512
52d5fbd3241ef0749e2d79cbea6083fe5f114b82da5059737e5b198912e55397b55ae989fbeaf215344dbe00b90498ad1208a0891ede080fa8b464ab9d980990
-
SSDEEP
6144:/VfmmDgASD5W/adCxsT4/YFqBcIsBGOhN/35:/VfjDmtW/adCC4/UIsBhN/5
Malware Config
Extracted
gozi
-
build
215165
Extracted
gozi
3151
zardinglog.com
sycingshbo.com
imminesenc.com
-
build
215165
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000b740812b866e0741bd3df4235028eb15e8e8b5e5fad548012db0075f26f72b28000000000e80000000020000200000002c701ac6ca5899cb3760338869aa3e42f580a2cd03b08377620c8c1bd1d24e03200000003478f08c9195fd3ad3e242a6bd8eced6c1088e2ad249f50bbbc81506eb63e45a400000002960c0a6f19fbfa026680b4476f0ee54c0507e5168845251fc8be366c114c350668b243a2a83bf85455c1bd441214afbfa8e54212400d23fe14d024dd58e84cf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{85EF28F1-0F12-11EF-A346-76B743CBA6BC} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6062bc5a1fa3da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2756 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2756 iexplore.exe 2756 iexplore.exe 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2756 wrote to memory of 2644 2756 iexplore.exe IEXPLORE.EXE PID 2756 wrote to memory of 2644 2756 iexplore.exe IEXPLORE.EXE PID 2756 wrote to memory of 2644 2756 iexplore.exe IEXPLORE.EXE PID 2756 wrote to memory of 2644 2756 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\3113b5d5384728960a57437431bb30a1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3113b5d5384728960a57437431bb30a1_JaffaCakes118.exe"1⤵PID:2028
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2756 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527fd83bae1ec5f56e3c40bc84a2b60e1
SHA1cf333f02a6c7b234268719b3d32fe51eaaa72a59
SHA256869799a7eb6cc3b81e859c37de998dbe509836283ab718c81ab0ba6ba92746ca
SHA512473a290563b65574ca06f32e3a4c1401d8b7da76105f3840eb73bb8207e166dc6d2decb392bf9a81673ce9ed15f6f24ac6ef1b98f2241874c619da7d648d0b31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5def31f0def8eb75d37d588309f5a54a0
SHA1e38947a4207bfb5f9280b2cc36e6b81c240dd34f
SHA2563729ef53d508af2c68733a8a8fbadc21d73c7a7505558b298b80eb2ee37c6816
SHA512515d475c9597387805a849f8c5ab28aacf9e3c0696dfbf2c18f116330d035b5d2b98ca97901d380cabf35cf1922752a0547ae525298a265847f3d6b701ec9fef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58303881f1f3388d476f8aa67a5c751b1
SHA1d76fc116295ebf5ad493b26712b6156436bce6f0
SHA25604b65bbf26d04e836ad45968e57a751f5d8aa52f7c45224b59d6e481d998e79f
SHA5120f0ebe05f4e406f7353684991c358f476328a9524dba1f252c20eab8059b1a138c017d16eae1b1b1486a5a16ef59b86db470fe9185e3606c74a3ec146fc102b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ceefb073c4615202d7779b1b2e6f17a
SHA144c6f8e0e9beae85791342d1b26cb3b8a0de1b9a
SHA25648860be8282e94d7497a7a0a42218654056b4b63ceae966bd5e7b0dd29d68a92
SHA5129d8e4173864927ea3e0bc25df540836d2b7d23fbc61ce7bc29195568c0ae4511dab63a44c8d33956a4d6da4c71c3a9e298ce2348b90e1772a19c83f47e4a5cbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c75bdbc93a9c827f9f518c8fb1a4af03
SHA1a98cc6629926d92bad01aad5b2ecc0448e6025ed
SHA25635412ff3485f2404b5552e5d56555ea00bddd6246084a39c71492219760a8369
SHA512ee46f28dca8ca3d68907e2b3f26725c24798bc102f6563860f5d49f357b515c53daf95b88359bf5b4c40672cdd7fb279aba28ecc4184d1c7ab014abba90ec9cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5477ca86d00e434607aff97d344cc2049
SHA1c2a38b738f0858f828ee38a5964c7c89dae9ced6
SHA256f3ddde536747e7759f4f11e90f2855ba9d9c287822f513a9a4091af6c5fcf982
SHA512837a25476da4592321146a2e58e26e4fbc7c0cc2402ab592e3d5cd731aec0882e16704cedfb5a57fd7269b5c5ba2dcbd687b5929d276f00fd5a95be6cc434ecc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512398ad67a6810d1e749bd1f1b1022c0
SHA15a004c73f7b0f8c3933c4c4781d56430dd566787
SHA256a33a908ed12bb9915500dd0b02002761f1cbfb6eb54748d3f3275ff40196884a
SHA5123bd6128fbe7a6736af4a2040e4ae0ea0f7ccd22d4c4112f58ba6b262f6f8e95dfe787144dbfcc64eca4db24a52775c794197bff60f47fdf846f8dd82d95c0015
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f00707256e809790c3df0712454f701a
SHA141a67f3e4f032c8bb58c6c7e6ba08fdf508cb226
SHA256cc0831bf8b5803564df8bbb8208164ae48c3cdd508553ca4484eae53eb116647
SHA51207ab676db866e52d35e57ccbffd42cd4beb034012badff2403733e83e0eb7702139299bea80f0cf105c12dd2dd719388f227671b2c7b654786647f00c96f532b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595a859c4b51215e6688f2b20730439ef
SHA1e45c9caf64d5d98ff804e01dcefc919f7a4c43c8
SHA2565ac46bce3c63ad76b0be760590a2de57f09e576dbe74fb5a1e7c0aebf8fd63fe
SHA512dffa487d1c79fe569f2376abe6a5ebb1033bd11dfd69a150640d5e6b0733673a987a302f19461366717ec05f338b249f47c0633fa2ccfe85d1b24aa1115342a9
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a