Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    15-05-2024 17:41

General

  • Target

    474adcbbd56545e775b13d1ea3048d10_JaffaCakes118.exe

  • Size

    299KB

  • MD5

    474adcbbd56545e775b13d1ea3048d10

  • SHA1

    c5507feb50d4ad3a60807fb6942317838b7f3a56

  • SHA256

    64d01ed1bbe05ae4ca42b4e3437fd4bad69febf0637da7f4ede9c889bb1eaf34

  • SHA512

    b833ea8bd93a33a147c6dc9448123a0500c026c7775367cb813b08c64d653c187f17464d5805965a2ff89fa9c9282e372f61ab10814d1fea3949f49b374c0d36

  • SSDEEP

    3072:RcV9NdB2RYNiHB0F7yZCSOm6g4zM6EXustQKu:6ndB20iHBlYSF6fM6EXVQK

Malware Config

Extracted

Family

gozi

Attributes
  • build

    217061

Extracted

Family

gozi

Botnet

2000

C2

ax.ikobut.at/webstore

beetfeetlife.bit/webstore

foo.avaregio.at/webstore

api.hamanana.at/webstore

api.ikobut.at/webstore

supp.zapkopw.at/webstore

cdn.avaregio.at/webstore

Attributes
  • build

    217061

  • dga_base_url

    constitution.org/usdeclar.txt

  • dga_crc

    0x4eb7d2ca

  • dga_season

    10

  • dga_tlds

    com

    ru

    org

  • dns_servers

    193.183.98.66

    91.217.137.37

    192.71.245.208

    8.8.8.8

    178.17.170.179

    82.196.9.45

    151.80.222.79

    68.183.70.217

    217.144.135.7

    158.69.160.164

    207.148.83.241

    5.189.170.196

    217.144.132.148

    94.247.43.254

    188.165.200.156

    159.89.249.249

    150.249.149.222

  • exe_type

    loader

  • server_id

    550

rsa_pubkey.plain
serpent.plain

Signatures

  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Unexpected DNS network traffic destination 16 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Modifies Internet Explorer settings 1 TTPs 25 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\474adcbbd56545e775b13d1ea3048d10_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\474adcbbd56545e775b13d1ea3048d10_JaffaCakes118.exe"
    1⤵
      PID:1716
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:532
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:532 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2408

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1716-0-0x00000000003B0000-0x00000000003BF000-memory.dmp

      Filesize

      60KB

    • memory/1716-1-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB

    • memory/1716-2-0x00000000005F0000-0x000000000060B000-memory.dmp

      Filesize

      108KB

    • memory/1716-7-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB

    • memory/1716-20-0x0000000000620000-0x0000000000622000-memory.dmp

      Filesize

      8KB