Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
12-05-2024 13:33
Static task
static1
Behavioral task
behavioral1
Sample
3a5e164612d1b0edd9a7869ed9f5a86a_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
3a5e164612d1b0edd9a7869ed9f5a86a_JaffaCakes118.exe
-
Size
203KB
-
MD5
3a5e164612d1b0edd9a7869ed9f5a86a
-
SHA1
17e36bfd5d916ea0ee8a465b8c565054d1a26107
-
SHA256
4a0bd71db44ebca42e13f2556479cda473940438bd0bd7629aaefc684e99f0c1
-
SHA512
6f9b6e33d613d51c73c02fb1bc9570a01f7177fa3e9a4bda3bfadc27febdb8b016399a5dfa11b5dd02c48fb7247792b6c2aefbd5274ff098742936a5585c8df8
-
SSDEEP
3072:91ji2dQ6v4uPXDNUj4jKBonzmLXlYVRLh0epEEZqkFBc4+uTqN76o:9Zdp4uPZzGonqXGXh0bluBc4GZ5
Malware Config
Extracted
gozi
-
build
215165
Extracted
gozi
3162
menehleibe.com
liemuteste.com
thulligend.com
-
build
215165
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5896F971-1064-11EF-B97B-5630532AF2EE} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000a9fec0d0ffaefab8ad7cca87d848a5acf5e91fe98269872dc79740e4d6f70de9000000000e8000000002000020000000ae47aa207aa282b84042928e077131b5bda2f1acdaf39011e72f43020a86eff72000000096c9a5544ff300ec5f5c0ac8f820476b69a2ff4f221882a3bde4228524ac14de40000000ed85f8bd73111c281511baac8cdb15ff77f3c4d6b6757acb62bb7a201b3cce93e6f29741cc85bbe8683ecae72d6bc41fac4065a0b26ec7f34038c5dced1363e9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70e7422d71a4da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2716 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2716 iexplore.exe 2716 iexplore.exe 2580 IEXPLORE.EXE 2580 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2580 2716 iexplore.exe 31 PID 2716 wrote to memory of 2580 2716 iexplore.exe 31 PID 2716 wrote to memory of 2580 2716 iexplore.exe 31 PID 2716 wrote to memory of 2580 2716 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a5e164612d1b0edd9a7869ed9f5a86a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3a5e164612d1b0edd9a7869ed9f5a86a_JaffaCakes118.exe"1⤵PID:2188
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2716 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0a04d6fc713170de3498c68a03f16b9
SHA1622c35d9a76d28cdb2a9f3b63dd86e642af920d9
SHA2568ab52cc0849bcb0b8db501624ea133aea4ec58a7338dd5697421369019b9ea40
SHA5122fbef29708ee1d61213ce932435855a86ce86f68c1ad9077b283c15ddc1b1cecc69aba37f97b2390031312cf83a49af5df4d9e6da7d1a8bdb3b24eecb72f364a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53021f1b172b3c46b03a524e60f665b21
SHA1fdcc688d6d5619c906d56332a110f29a600a4e06
SHA256f200f1d7b6077d16c11a666274c3eccda682417c448d25f9ced1f81e3f6d4023
SHA512a36b5460a7239595604d730fe6cbfdeb0f38f4602492da6136c595e4ca001503225889848aa37aa6fcbe5919211bbcaeb9f0f82f26ce16cebe53eeb8c3d7aa9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3cc4b09fdd25d59778e02b6050aa617
SHA11a145d0878948156b258a52a980bed3fdb36f231
SHA256bcaf5ba9a638e3e157f37b7c1488bf9642bf408f3b82149d23de806625df503a
SHA51281720af7669ded5dfcf0c2487ebc2e24a4543fbd46e07b3bda219db182ba47b3f78bc4a4fe4184c1bac818b374317403970526695c6fbef77a4bad0677dc406e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559658759d43ee76abbb3a31d00f3047a
SHA18b6bf9bfe7d82c4ed62d64fe8fb6792a92ccd9d8
SHA2564d56cefa0152d6032b20b2a0645d4e4ce73230ce1870dc6a5003451a47f9d038
SHA51203eae8832763e8ba0c3151d7224d6a09bb6b325b53a50280bec71aa3cb34ff738f3346082440c9fb2a2c6b822c62b62f548cc95075868a3d596ec656513511b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bb1c0f5f6aa9f03a594cf915bc704c5
SHA13948e5bf94e9fff770384b81ceb4188ecf28301d
SHA2566a93636c07d7f678f4ee0b89ca1d5fb31cfc7bdbc311e57aac5f15f3cb31f5c5
SHA512faa49a1bbcd2679f00c474122d0e77e29bf09a9d4deb692718b151e0d93c5100379e1a45a0cb78917c25fd13f25b2751979d41d62b12c27e80a492b4bb91a407
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9f64621f8b55de7de83dc02c6f811f9
SHA1ec8ba260e81ea61f5ed1210ab7f141d7ee4df79b
SHA256a239a08efd710d9a51eb202d007e4e6afc0a63722a53e60c61706ff77f5ac4b1
SHA51253e9d63c7e79cb486bda172d78f5c03f79499ade7ca28cd2b03ff98a1a3c0e76897fd91de8639ddecc3f014b72026a760d63498a3727a3d42f0e8081bb45c3d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d471f78ab392548ae409fb2c6781798
SHA1370ffe2d4cea2d378fcc5a54ef59260e3a6e6306
SHA2563e534ea9c558095db43c5411139ddbbe6693dba128fed0997ee4a5c97975a976
SHA5126adec6c7ab12127260cca5b0b20fe66d4873eeff501c408cf262ee15e668f59a84fdc92cc21a78e1b32bc60825e3fbb1d7b321864a2f58065a2db383b24d506f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4e2053a4ae8529f3a77112bf7dfb11a
SHA1508fbabca89258cf9cc9d17c7c6c2329ec4b7ec6
SHA256e36436de5f5cce68f44716e4276dbf0c1dc3e808aeb7b96439c06c25110718d5
SHA51289211add1d0474894d96b921e99e659939ebde5df23b5be7dd5653c476c1efd6a2a718850f2cb79bd32c7a746c2856572c4e72ab961acb4b74a93940c84fd96d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c6ef3d66bb750de6ada318471a7c630
SHA111b7e88e3abf41314a2f6dfc9e002f2f3c0bb47f
SHA256101e528f953370ac7a8328b0ceba9cdc4d3ad99ae50d287ed9c957b970f27bb9
SHA512e9a0ff8f0122ec7629be36fc714cf67394efa17fc54888dde9a979fe9b8139560855b5325038662c3229e60fb83372a6f30279c1b1acb7968af554ffc81bc994
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50cefe100193789a5c351efa934fb0517
SHA1f1e94c579db3e9fbc35b171ae3dacdc8e4801941
SHA25643a11ae9f04702e94f13d93a5615f1462f1ee6b412b4ac76924fa4a1fdd4a509
SHA51260b64f68fe8bd9f828f9b9174c76028e32377d18879bf1816a49381544d2dad730294f710096e8632c4589537c7fd705a2d477b6dd6b0484f2ccc821ce512b69
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a