Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
13-05-2024 13:31
Static task
static1
Behavioral task
behavioral1
Sample
3fb56f0ea0a2488a5c3e9de9869e8d1a_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
3fb56f0ea0a2488a5c3e9de9869e8d1a_JaffaCakes118.exe
-
Size
215KB
-
MD5
3fb56f0ea0a2488a5c3e9de9869e8d1a
-
SHA1
3e60d01de260c7403347cf221fa35614924e4a45
-
SHA256
dfd9137e756882a3aadbcc7b3bf1fa9bfd7a52a159e7b60b732ab0c9eaadce29
-
SHA512
43d17a6d6157ab29be549957e090165023ed5aa81834f1be30324634e9d89ba27e7618c4b198dfab8a326c45962963963c1868c2971838c92daf8eb35b4a43be
-
SSDEEP
3072:Rb9pXDyUKdySqVgQZt8OdcjFfSvbke/0t4mwqWB55syoNdL0+2L6BWnqR+yV:BHXDy1qVvZnOe/HEyoZWGd
Malware Config
Extracted
gozi
-
build
215165
Extracted
gozi
3153
biesbetiop.com
kircherche.com
toforemedi.com
-
build
215165
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2C8FE111-112D-11EF-BA28-C2931B856BB4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000744b58b8618b817d47bd73c1ba7c2c6f1567404277d696fecf34c952aceefa32000000000e8000000002000020000000deb28769c8b5612c7a0b3b98e4eed5ce688459c1cd9047b84866176089dcfff0200000000fa44dd51a799c5ee82c7d41d9fe6e9f98cd7692512f218b1a83d0b525ce14764000000040a74bc791dc8f4ef0d020fd303798a95dbe49064c281ff57e04f74164eeecfe646a83bf7bb975685862a26f40193dee5a02d382725933d36c43635affb88d89 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e01570013aa5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1192 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1192 iexplore.exe 1192 iexplore.exe 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1192 wrote to memory of 2568 1192 iexplore.exe IEXPLORE.EXE PID 1192 wrote to memory of 2568 1192 iexplore.exe IEXPLORE.EXE PID 1192 wrote to memory of 2568 1192 iexplore.exe IEXPLORE.EXE PID 1192 wrote to memory of 2568 1192 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fb56f0ea0a2488a5c3e9de9869e8d1a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3fb56f0ea0a2488a5c3e9de9869e8d1a_JaffaCakes118.exe"1⤵PID:1872
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1192 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc58ed3bda5416de4068cba10b9eeb6b
SHA169621c6e46cf74aee31bae18408e13b1261219b8
SHA25687d89bfc44e4c171aff5f16b473c7183acb9adc160779950d23e42d6465b785f
SHA5123b781a6254cda5aa38bd54a9406efcdb332d35e94a52ff88bf52be7739c307fe021248cdf4c93b03f5bc7bff7e3099a7875325ef0a92ea486382dfe6c5d46bc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbafa73e300193a64992d8af51537f60
SHA14b6055ad5e755bb13ccc38d3ee6920a49dc7e024
SHA256293dff9a4b12c9a34e6a51d36bbadc06847405e77a918924c0dc733f1201d64a
SHA5129dc8f514f1edcef9ec9e68dacca1395a9708f44a2b1d6d3209ce164b4120693588073148edfc767b345dfe1bdd6fd27d282a1bd433f86f7b909c0ecfdcf445ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53eee185ddef989b49102be83c7e45bc4
SHA103c993ea9304bf20de6480f5b6769da271131abc
SHA256d09155271ed7022143eaf9e865b29d438da4a82348011e40faf320c63dc259e6
SHA5124120878f99808e687ddbb7c6b501322dd026070254fc1f5079fcce2bcbf8ef002f2d12a365c2bb2c18c191496bdcf118e116ebb39b0aa22e25eeb3335d65e81b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3721eec616d4ee7645d5e32dbdcefc4
SHA1e6a23a60e0d55433b6534770b964beede3956a53
SHA25644d3ae371ffa5ef7d7b5f57fc0d6e6e5e908fb8a42dc90fac6e00aea857c2d6b
SHA51274d54e4064c01593b5bee8690134becf86705a84bf11a89b4c52a2288208135bd07ce08a660b75d3e6c225c56ba92c0d958290bf6fd5e2c1fb140f80b9f9593c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50dc9aeca3f74e86acd00414cfaa82e63
SHA190dfc57d9697475f3c9f5c073391e3f101db017b
SHA256dc143ddf0e16921b36b0fb9578652a4a757913225fc2e100a8fc01603ae7a01c
SHA5121638e6868377cea7680b0d7336427a8edbfad9b69dd12557f3f53a4b7bb6cc02032c0269b51f215c0a315487822fcfb5640f7c53099ec94d6f152e12a223be39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543cf01c156d9520f21e88b306875682f
SHA139379fa57b98542bd642a14a34b8ef08a36d4d5c
SHA25604d02c3ef2ddd1e8ba26bada3d06bb4850a22837b86adfa4a13fa2cb2cb4ac46
SHA512b5ce8d1b2abf7165c9edca3721381e6a8946ebac8cf9d1d8cea8809b39402b54498cc93bfd58d9221abccb962329d8201e70714506d839bda649979c456a3545
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc916e897fc965ffe5da19a9ab3f7e71
SHA13a4a4cf627a46332b14b8767f1e7f36204e9c527
SHA25632ac3cb839da5e77198569e7a329165d19c64affbf9434135065a6bba9b553bb
SHA5125a88b0b2d8d143d8df32ab8ef177fd13a1077180a933fb2b80276014e2b5d1bb5f870dcc3ed0add73cca9af69ace21bf62a25000d9906734fb6f391397a14237
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54eebd4ae8b7a0ca9dcb3b8a0451539c6
SHA1166dc7e36d7c667025263a8538a87137e86fcb44
SHA25687ced594d273cef28edf9018bb30bc8fc8aca8e0fdbd4251757585e930b16c95
SHA512e2cd10a6118d327ec3f449a9c34e122c932dd77c56d483adddcdef11ac94b8541157abbd24aa78eedc0dfd0d467fb4f4b6969ea658b163d054417d2e84a9c1b6
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a