Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-05-2024 12:05
Static task
static1
Behavioral task
behavioral1
Sample
3f6923980a975f19415c9cc653eb38a6_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
3f6923980a975f19415c9cc653eb38a6_JaffaCakes118.exe
-
Size
215KB
-
MD5
3f6923980a975f19415c9cc653eb38a6
-
SHA1
d013ae346d2e991c28b9f90bbb4a7bdcb34e4640
-
SHA256
e4b6725684d724eb207a7471d7c35b1dbbf9ff754860c6473a7e6b7884c38efd
-
SHA512
ab8251c5e5824fe153bf8511e47f54f8016d520ed7c5408b8b2b010fa2d8321dfbbb110804ff2b6b14d60dafd061b1db08f6c71541b32c58b6eda9e4c261577a
-
SSDEEP
3072:Rb9pXDyUKdySqVgQZt8OdcjFfSvbke/0t4mwqWB55syoNdL0U2L6BWnqR+yV:BHXDy1qVvZnOe/HEyo/WGd
Malware Config
Extracted
gozi
-
build
215165
Extracted
gozi
3153
biesbetiop.com
kircherche.com
toforemedi.com
-
build
215165
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40940e092ea5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{34273381-1121-11EF-A635-D2EFD46A7D0E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000004f00376240e4e3a63b3f2791ecdd47332d31541096f740e6e3aa9bf9a0238ea7000000000e8000000002000020000000ead1293e6f28d10954fa1c014cdb7bf15863ff73362869821990cfb4483742042000000040278d880abc191c4a938f84e8ac53fd097d51287ff4407baf6c68af4e6fde3d400000001559289346d9b20b37e3c9ed03e4ef7590275cb37b9cfe2b9d87d1b7779886b6fa2d7389a209a3b6f01292ead3df6867bafee4ffa34e980d92c5906f73f9b5ea iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2548 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2548 iexplore.exe 2548 iexplore.exe 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2548 wrote to memory of 2056 2548 iexplore.exe IEXPLORE.EXE PID 2548 wrote to memory of 2056 2548 iexplore.exe IEXPLORE.EXE PID 2548 wrote to memory of 2056 2548 iexplore.exe IEXPLORE.EXE PID 2548 wrote to memory of 2056 2548 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f6923980a975f19415c9cc653eb38a6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3f6923980a975f19415c9cc653eb38a6_JaffaCakes118.exe"1⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2548 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD56eb943f96b021e25df94a38046889cde
SHA1e1fc79b86cabf7976db2448a9484b80425b13839
SHA256099fdf51e5c7d9720139c42fb2e6dd7e338038d76b37f810064a499673d8d526
SHA512fda1cbce0c488be8ab0ea0eb5cd8e10e680be7a11688d10f6d84b2c41123a7c35fdcb4a8691c656b3c2e31fb59858c5cfd8cb9bb4acf89cdb6b19ec8e6945a9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5873bf038bb7cd791b037f5397a8d3149
SHA161fa59cd6f0cb74a262486e81679b0cceec6ab16
SHA256d2bdc2f5142b91b624fcff2459b343e15304ab82ae6baa0624d4ab76ba4c6eed
SHA5122475ad682dc172e4d6d209d62b74098837d630a0af2e703619774cd06ff3d6861fda3ab698157fd2d1f8d470735a868d4aadcbb321ed4a75125951c13f332f40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5299c428f980368ef9f0188cfd35999f5
SHA1ff622b1415e1bf127aa935f8ada5568d2854c08b
SHA2560098cf01f3ba6ec51ac5583e173ec71933ed189a23fe616aa5de002f9513d3d7
SHA5120fbbc7832e14614097fa955d5b5289f8bea9a2a9797d735fee387a66ded22e04cf93978aefd9a15e0a017168aea9e3f95e099509911f689fc5fb007a52058394
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD56974984ca90eb3e0d0f55a67d70154b5
SHA1543ff60e6b898fd7a47d085493f29c28def45817
SHA256b16e5f1bbfbfd1448eab3724e97fc2a617c59a8006baf62c177679a8ccc29895
SHA512524f719ad843320ab88b21578d973a9ec7be6583344c0203c6aa7709a53b4ee7a28ecd52f72f027f804b98bafee6502de6851886c397186933584a80fd20ca60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51a862f8c305fdaef504097859479552e
SHA1295d136cb113b8eea3b91ac8d436360c76eed044
SHA25691afc8411052a1ed758b3e0746177b48e5550a176e66de808afd333f93b8e2d5
SHA512e94060abd5527000c0cb542405642fad5ed2ac865efc9696d43c0db0c215fb8c763f85e897ad669ff42c9eb8788e033933623bd00196ec7c53e252448647980c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f964d1841b8a9ca15c011dd675619f16
SHA1ef58985613a6da480749626f57859676039483ba
SHA256641ee2a5d654cc18cf843d76c18b009e6932efef7f35803972a4df949a46adc0
SHA512c12927e2858e1557ecd1d8b89122ee0137fda0e291cc766f4c6ef7ac14a78044465172039c12ecb7529ed18e15460fcad4cd78a4f826b6c8a32d407d90903ebb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59a6157277b7f14880871743b89e886b1
SHA15517e195ffc117d593f09f72ba8bf49a85c5a45c
SHA2567a42744bee57a0f8c147ae5487f22a6ae7f11a0e0168bc45235810351bc1a88d
SHA5121f6729495293b9f993cbc347f816e50393e5640945807735f68d807c6b0f5aedf2e776feb15f699b4f0aa448e980dbaf8de9c94f9095995433dc3eaa2f9b7e50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51834a71c78a89e57eb2d93d726afe806
SHA1902af351caae44f804e45c783683ac47ac812012
SHA2561d9e7953cea89feb44922597b845f7b2c7e928160ada4c14bd5495facaa76fa5
SHA512f113d63502aec0f77321b5ab08c92a068893d66bd5aa905b2334ba754b4f0c494ff174647e780596762b40a0f15072d9859525484366810f7cb568a2c0f9e9ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD52c095ebce57dae82cc39c6ddadaa8055
SHA12f3389906ce2f5e59d452aa5d1db7e09d0322e0b
SHA2561131082c8dd15e8256f8b1a5518096785b5b380861f1beffa28cb817a9f455fd
SHA5123b096f3278bbfe4031988bfb4ab9cf83627bc526b7cac582b5d2c86432a07913dcbc41b6012ead44294485988cf326e470207b38ed5717e0de5ddaa593a4c898
-
C:\Users\Admin\AppData\Local\Temp\CabAA27.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\TarAB28.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
memory/2024-0-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/2024-6-0x00000000003F0000-0x00000000003F2000-memory.dmpFilesize
8KB
-
memory/2024-2-0x0000000000270000-0x000000000028B000-memory.dmpFilesize
108KB
-
memory/2024-1-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB