Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
14-05-2024 21:15
Static task
static1
Behavioral task
behavioral1
Sample
431a3be44594d1dba224be1f4f8985ee_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
431a3be44594d1dba224be1f4f8985ee_JaffaCakes118.exe
-
Size
203KB
-
MD5
431a3be44594d1dba224be1f4f8985ee
-
SHA1
b3a5478ac7fdd5a8ab5eee6c4c306bebab00b598
-
SHA256
595fb1bb689599e7f92bc9a30ee1205e626b6aeeabf0b9af6d5da8586abda881
-
SHA512
1a80f93c009ff14a1d9c66b26361fb70098315037aa3deef16da5be7085d90c111b03004d4726e85060989b406895b8db92d40a6ddebb613e42632c428130422
-
SSDEEP
3072:9aji2dQ6v4uPXDNUj4jKBonzmLXlYVRLh0epEEZqkFBc4+uTqN76o:9kdp4uPZzGonqXGXh0bluBc4GZ5
Malware Config
Extracted
gozi
-
build
215165
Extracted
gozi
3162
menehleibe.com
liemuteste.com
thulligend.com
-
build
215165
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1679A1D1-1237-11EF-A4C2-6AD47596CE83} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000001253066cdd5da34c9ebb28702decee3cd7c10a2446b475569a12c698a877a41f000000000e8000000002000020000000d995a64536c82d26a604f702e0a9d9b2504a23bd4835c34a379b9f8dfecce18190000000637575f0d13b0c8e651cb1ce8bc8dbe1a6fea19faa1ae6e5ff1f764bbec9ee30261509338f23a87ae064207bd82eaffd0b4c97bd4fb515a9a6a3c517ffdcf895b4f6686987adaf15edd7e937a17c4fbe9c3c54730deef9e189ca46a7e79a2238d4b6268da6d0f70dcfc0cfafdc13577e335d0a45c761a4ceb2bc1000132ac3f33ad30b7ec25d1f5061a6deba17d0f39f40000000001aa6b80e773699363baafad4e2ad2805045d18e64e328dd367917ba85fb62f94f494769359e56e181c1dbf54168d11cc36c44a3ce424ce602e520b00b80d25 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000002a813687be403b39bbef96bc1b82fc64d5751475249757719ac69686c15c682a000000000e8000000002000020000000f5fc857569ead8ac78b7c4bcfb2b5cf48aee11b63cbeb051342381483db678b320000000bd49c65c6b32d32bb1497856a6d26dc4d100760926ecbe3d497447585e1a31ec40000000906510c5e2c9f6d9be46a5daaf806f5fd4376d8a9bb78b12dce951dc5ed4e4756d70aea537225daf06943dcfa0024cac54cb6e1f0f15a7b9fe3fe1c01ad1a2f0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 705731eb43a6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2624 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2624 iexplore.exe 2624 iexplore.exe 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2624 wrote to memory of 2884 2624 iexplore.exe IEXPLORE.EXE PID 2624 wrote to memory of 2884 2624 iexplore.exe IEXPLORE.EXE PID 2624 wrote to memory of 2884 2624 iexplore.exe IEXPLORE.EXE PID 2624 wrote to memory of 2884 2624 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\431a3be44594d1dba224be1f4f8985ee_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\431a3be44594d1dba224be1f4f8985ee_JaffaCakes118.exe"1⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2624 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5504be839c1d47dd8bda19e847c2abc88
SHA12cef67bda1d5d1bdd71c6d7e7f249a92624fb95d
SHA256822a5757fe34e869270c049a79c35a09f3ede38e157af929c3f65a338315c729
SHA512a5a519e79c80a2aaf5dd6c8c37b72fa160d384c0ed8c2c2d26cbba762e8357038d771fca60ef9f8e18f087ba3a1a49cae6804137a1e8654967e4ba8ff3077bab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ba3a8a9df905896f45739cbc63493b9b
SHA1f618c29b537d9d6fd015be5a709e5227135f6be4
SHA2568f5f0bceefcde25ff62e2c7d8fb3dd5b35fe4dcc8804185e1948dd5a44da7527
SHA5128b68470f7c4974342aad833de1c3077fb7405ed05ef8321a2db847307a6be143c426397626b6e01298e9af3eeaafd936acd3c3157912f6c840b73571f6f0bb13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD539a28c12d37580f94ce9b1e3d09d16f9
SHA1a9a3b2e15abeecc353a3cf5d2158cc334032859e
SHA256bddbea4b5f8aa4911586cc3191608ab737bb322f9cff9efe54faa901f88833c2
SHA51268d851c96dc46bead5ad72a4a0c01c402a88803deaa44dbcddad6d3c4d487b2a10c3af6ddf81e4bb555aba487f042a41dab4a590b48311e248e7fde8ad990310
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55dca6d2c55896bdcc2b93282db28d83b
SHA1e2c96ecb416050e84352edffcdd572e4190b5627
SHA256ae3c9acccf0bc052c85b6444b01d0cf176714c4e8e074ec5e0634586d2cdade9
SHA5129c0b97c5f96cc34878ed9d31fe1f7f7bee463a1aa6cbf7694df2e429796f133a8d072605b217a105c08e1f2ad37890bdfb80a959468bca08616bdaf449396a69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5616a125243d2b385c8ee98e03db8c063
SHA1898eb513940132be813f3e485f7acf86e987788f
SHA256527a1f0111136fd9147899d1a0ff64c5e1e6f53bfdff76ab56311e08ca4ad3ef
SHA5120e297a35bfaec5f79dc35f95f299b366a788bf59ee57e16a5b6c87101e5027a911c71e719c5a0f0fa47013bfb4ec1fed11e633759c1003c84ebfb10ef4134f42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD563e2aa7fc98f9da948cc8654ac0361ff
SHA189d799da3f5544fd753f9410d2ea09ce13ecfa63
SHA2560dedcd8b698224095a3430aebd31f2a4c2b629e8c99fac855452f0a28fbf4bda
SHA512e9bfebc624fd415841b5c56ffe00324ddefcb61ce1981a444b91ef6f961acdfb3246b27d68067c1849384282b8e7bc82ba7309c67b289a0974a0cd25b6be9fe4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54d03ae3dcf6696b4c811d681e97dbbeb
SHA1eb6d3f9a1bd8308eaa2e90270d43b23d7f2ae124
SHA256a13766953c6929bc006f098b43dbb6d572f3afff825a6cd86deca93319f536e5
SHA512026457cec16355b100b5de73e5c5ccd31f58a8dce42c9ce005d6fd19719ef68eb3c1eecf76c05e908ccdf5a01022ba925b14a264df3a18fbdfde11e38054696b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51f402cec55888bfe834f336f9b13972b
SHA17cd304e832232c3e717929207142328a761541aa
SHA25612780dff66e9b8ef1b14ee081af4cf34293126044cccba2f462abe9b8e346807
SHA512a7cb0d476609b05de9b1adbfe0acc3690d61c42cb0c8ba5400502e8735b366a32677f41d43aa12d6b79a2da5ca062e1b2cce4b3b010c2adca517dd4c3da9263f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d24e1a8a356f333679881dda23c5a1ea
SHA1c0d163ce1939d1bf67902b500324cd766fdd4389
SHA2567f2dce8b87dc01bd652d854fdf9f11d8b257bc1d89f1a98ed802bdac58416908
SHA5123304ebf3a2bc8b44ab6f91cfcb854d93347ce8dd980716a29a278331a0f9704b893cd004c2777eb9144c7a0f96775ef638a624ec50d6ce25225185edd2e82246
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD58f00cb2b371a2404680b08c5d3a14b16
SHA1d0eeb9a215c1907fb8f9fdf61ff55a5bab811410
SHA2561920ae0126aa48457c577506e8c2711d187175dada70e88492c0b78aa7597eb6
SHA51234f082215d4a43d7b56f9caad505c1c7e90b2f90e89ad0db6948d6d918d34fa636585980b7f3f7e94d64689460c8651bff6f158dc4bee2b2468acce92ee1e917
-
C:\Users\Admin\AppData\Local\Temp\Cab7D5C.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\Tar7D6F.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
memory/1240-4-0x0000000000280000-0x000000000029B000-memory.dmpFilesize
108KB
-
memory/1240-37-0x0000000000400000-0x000000000040F000-memory.dmpFilesize
60KB
-
memory/1240-8-0x00000000002B0000-0x00000000002B2000-memory.dmpFilesize
8KB
-
memory/1240-0-0x0000000000400000-0x000000000043F000-memory.dmpFilesize
252KB
-
memory/1240-1-0x0000000000400000-0x000000000043F000-memory.dmpFilesize
252KB
-
memory/1240-3-0x0000000000400000-0x000000000043F000-memory.dmpFilesize
252KB
-
memory/1240-2-0x0000000000435000-0x000000000043A000-memory.dmpFilesize
20KB