Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
13-05-2024 11:29
Static task
static1
Behavioral task
behavioral1
Sample
3f42856db23e3a13137000d97c98676f_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
3f42856db23e3a13137000d97c98676f_JaffaCakes118.exe
-
Size
269KB
-
MD5
3f42856db23e3a13137000d97c98676f
-
SHA1
fde468396db07317d04a8f3aaa30d4bd4e9547db
-
SHA256
a7f0d9394f40fffcdce6875a613bff3a11e8d8811d3ec413ac0316498b2bf4d8
-
SHA512
4891aef3213a686d31a9bc2384ce634d355167ed9321663297630e3cf6347ca7315dc2aae8a12ed26f29b7381d483b31084b3b38a1c9ce15b801a012b4aeaeba
-
SSDEEP
6144:LVfmmDgASD5W/adCxsT4/YFqBcIsBGOhN/35:LVfjDmtW/adCC4/UIsBhN/5
Malware Config
Extracted
gozi
-
build
215165
Extracted
gozi
3151
zardinglog.com
sycingshbo.com
imminesenc.com
-
build
215165
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{15C7D161-111C-11EF-B587-FED6C5E8D4AB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000ebc2aa9d9f93177f8296250c6e20f6a210e61cfa8bafead821217d2dd4b6a189000000000e8000000002000020000000bd48260c7488c66a8cc5ba8f9ac162f18b07d009f36fa952ef66df450a571f4a200000008b2b4750dc6cafc952fedd57d84d62971f0763fd9def45539a94185e37aa072c40000000eb53af3ead47fc8a3a989a129fa5ee815ff490d289d114bb496d5a393a753ccfad18f3bc74565540ea115684ac417c7dcf391b88173172f0398d6085f0bd3459 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0e9a0ea28a5da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2664 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2664 iexplore.exe 2664 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2664 wrote to memory of 2540 2664 iexplore.exe IEXPLORE.EXE PID 2664 wrote to memory of 2540 2664 iexplore.exe IEXPLORE.EXE PID 2664 wrote to memory of 2540 2664 iexplore.exe IEXPLORE.EXE PID 2664 wrote to memory of 2540 2664 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f42856db23e3a13137000d97c98676f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3f42856db23e3a13137000d97c98676f_JaffaCakes118.exe"1⤵PID:1688
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2664 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe0dd4ad8a9a3f26499e32412d00bbd0
SHA1edf151b207e8773f38e841c5164f65ce5cbad868
SHA2567fb1764bd50c007051935696a6cddb5923ab4757a52ccde818054d2f48304887
SHA512b715c55ad34b77aeaf7bc808c660031e4d8e4b22df8048aba23e8152c55bd231d5608960a596c79e00d31fd300695793186bdddbe5500724e49cbe23d962a3ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6b784e52c9417c67dc80e38c0609b26
SHA17dcc1441cfad26b3c3e17d8dd26aa42da65cee3b
SHA2567445d67cf5af5c4858bfecc4f29f2e55fc5ca11f78b941178a7533f98eda8ae6
SHA5126107b83f3f6c4d8699e1ccc166cd63bd5bae09482f164be4e49b9f98216296e206b069b7ca77ff0dd858204436d87521e3b731eba783f68771b9de02fdfacd4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc1036b5b75612fde0f3097668070567
SHA1342d4b04d21c52c1f78fcc75ed46341281545452
SHA2561856b29b34caa8b0a706f5319de60b36e8fc80f1ed78b22ea72711905123d98b
SHA5124ca29fc354120f31d62f093b9cd46e6ded3c6c15cd81411c534d8d57d92d61a64c12d5953e94d66a2dfa4058ff39aa0e236d3e0412ba98ed087aac15edd972a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cefc02119296d1a48dc562c32482c80f
SHA1bd5e2c278bace7ec5a7321c17e62a159389896d0
SHA2560a92c25c4a48bfde3f171c6b3071cf02295e0d8c1ef657211af835a290b67b7c
SHA512451694f7dd923231b817f5250d6fd166b10bf679009918ffc45c9e835d34396ef7975be9c3f0bd32ff505ec2005be494b641107ddbf2ebd93e035cf2cdbac4f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539e46036c82601cd4306391e3c2e558d
SHA1b03914529bc575f70588d3142072c4b9b142e6e2
SHA2564685f950939801fbd8c0c9702f0ba738eaa8d1c97ca2b4710ddc38a229ecbb02
SHA512b5c5f68866dc17fb75ecf6b8a639d9cf2fff1d9cfe42ab13eb511ce6713f8fab69ef41cf30639f1ec692e0cb67ea34ea0dbf46843e890f15b3809f88a53e06c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ceadadf85688e5c90e4584e0360bcb79
SHA138bad2a7c350bdf5a3292949c7a5768a3c60d471
SHA256713cd5f893e1cf9af744dc3c92ab54e491dd41f4bbf34f8fb160d1aca7079131
SHA5129d55f6c1d547c8b9589994016b981e22f384eb1ed5c6c4dda22163f278a520304564138e8c474933dc60dc751988ab9a7c00a1ad34b87e3345ec5937d7fdae60
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a