Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17-05-2024 14:54
Static task
static1
Behavioral task
behavioral1
Sample
5016784605ad3fd883fbdfdd5fbd469f_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
5016784605ad3fd883fbdfdd5fbd469f_JaffaCakes118.dll
-
Size
749KB
-
MD5
5016784605ad3fd883fbdfdd5fbd469f
-
SHA1
30100663d3d88d7399948f7f92602efcb70b5a86
-
SHA256
14d4db1adde49001f81cb670a60f9d40fc7dea4b96cd77029ca87b44ccb586c8
-
SHA512
3f61dac201d25c5cb8932e9bed8b762c6897462edf912091e6921f2895645908b64c91a779f8db0cac76a0ddae19808d9ba6ce7fb27cd0a0153c5bf20d01f116
-
SSDEEP
12288:INVtF21kgh6j10JGCDn3NVEoYFA5rId7ipJC:INVtEjcMfTpYC5cmHC
Malware Config
Extracted
gozi
Extracted
gozi
700
http://cxzko43pnr7ujnte.onion
http://intraders-support.at
http://freshness-girls.at
-
build
216098
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
worker
-
server_id
12
Signatures
-
Unexpected DNS network traffic destination 3 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 208.67.222.222 Destination IP 208.67.222.222 Destination IP 208.67.222.222 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Explorer.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\comuobby = "rundll32 \"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\AsfeOKSE\\adsnprov.dll\",DllRegisterServer" Explorer.EXE -
Suspicious use of SetThreadContext 4 IoCs
Processes:
rundll32.execontrol.exeExplorer.EXEdescription pid process target process PID 2240 set thread context of 2752 2240 rundll32.exe control.exe PID 2752 set thread context of 1212 2752 control.exe Explorer.EXE PID 2752 set thread context of 2440 2752 control.exe rundll32.exe PID 1212 set thread context of 1964 1212 Explorer.EXE cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exeExplorer.EXEpid process 2240 rundll32.exe 1212 Explorer.EXE -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
rundll32.execontrol.exeExplorer.EXEpid process 2240 rundll32.exe 2752 control.exe 2752 control.exe 1212 Explorer.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Explorer.EXEpid process 1212 Explorer.EXE -
Suspicious use of WriteProcessMemory 39 IoCs
Processes:
rundll32.exerundll32.execontrol.exeExplorer.EXEcmd.exedescription pid process target process PID 1420 wrote to memory of 2240 1420 rundll32.exe rundll32.exe PID 1420 wrote to memory of 2240 1420 rundll32.exe rundll32.exe PID 1420 wrote to memory of 2240 1420 rundll32.exe rundll32.exe PID 1420 wrote to memory of 2240 1420 rundll32.exe rundll32.exe PID 1420 wrote to memory of 2240 1420 rundll32.exe rundll32.exe PID 1420 wrote to memory of 2240 1420 rundll32.exe rundll32.exe PID 1420 wrote to memory of 2240 1420 rundll32.exe rundll32.exe PID 2240 wrote to memory of 2752 2240 rundll32.exe control.exe PID 2240 wrote to memory of 2752 2240 rundll32.exe control.exe PID 2240 wrote to memory of 2752 2240 rundll32.exe control.exe PID 2240 wrote to memory of 2752 2240 rundll32.exe control.exe PID 2240 wrote to memory of 2752 2240 rundll32.exe control.exe PID 2240 wrote to memory of 2752 2240 rundll32.exe control.exe PID 2240 wrote to memory of 2752 2240 rundll32.exe control.exe PID 2752 wrote to memory of 1212 2752 control.exe Explorer.EXE PID 2752 wrote to memory of 1212 2752 control.exe Explorer.EXE PID 2752 wrote to memory of 1212 2752 control.exe Explorer.EXE PID 2752 wrote to memory of 2440 2752 control.exe rundll32.exe PID 2752 wrote to memory of 2440 2752 control.exe rundll32.exe PID 2752 wrote to memory of 2440 2752 control.exe rundll32.exe PID 2752 wrote to memory of 2440 2752 control.exe rundll32.exe PID 2752 wrote to memory of 2440 2752 control.exe rundll32.exe PID 2752 wrote to memory of 2440 2752 control.exe rundll32.exe PID 1212 wrote to memory of 1648 1212 Explorer.EXE cmd.exe PID 1212 wrote to memory of 1648 1212 Explorer.EXE cmd.exe PID 1212 wrote to memory of 1648 1212 Explorer.EXE cmd.exe PID 1648 wrote to memory of 2512 1648 cmd.exe nslookup.exe PID 1648 wrote to memory of 2512 1648 cmd.exe nslookup.exe PID 1648 wrote to memory of 2512 1648 cmd.exe nslookup.exe PID 1212 wrote to memory of 2544 1212 Explorer.EXE cmd.exe PID 1212 wrote to memory of 2544 1212 Explorer.EXE cmd.exe PID 1212 wrote to memory of 2544 1212 Explorer.EXE cmd.exe PID 1212 wrote to memory of 1964 1212 Explorer.EXE cmd.exe PID 1212 wrote to memory of 1964 1212 Explorer.EXE cmd.exe PID 1212 wrote to memory of 1964 1212 Explorer.EXE cmd.exe PID 1212 wrote to memory of 1964 1212 Explorer.EXE cmd.exe PID 1212 wrote to memory of 1964 1212 Explorer.EXE cmd.exe PID 1212 wrote to memory of 1964 1212 Explorer.EXE cmd.exe PID 1212 wrote to memory of 1964 1212 Explorer.EXE cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5016784605ad3fd883fbdfdd5fbd469f_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5016784605ad3fd883fbdfdd5fbd469f_JaffaCakes118.dll,#13⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\system32\control.exeC:\Windows\system32\control.exe /?4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL /?5⤵PID:2440
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\2824.bi1"2⤵
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:2512
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\2824.bi1"2⤵PID:2544
-
C:\Windows\syswow64\cmd.exe"C:\Windows\syswow64\cmd.exe" /C pause dll mail, ,2⤵PID:1964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
122B
MD586ae6b510c19228190f4b797503ce192
SHA10a6c67bc4f36fcdaa7a553f9ff9ae439f13b32d1
SHA256be8c30a0e245b6d86db1e7bdf04b8cfa3117846d5b88f6d476066041eaea1c3a
SHA512bec76ed958ccf192f26b2eb9250f02ce2cf04318cc4f51d30cbbd24b96de172f4f26bbac018938ebd2f7c38f70e70def8d8f6b0e9b473b3a32bbe252449e3dd5
-
Filesize
749KB
MD55016784605ad3fd883fbdfdd5fbd469f
SHA130100663d3d88d7399948f7f92602efcb70b5a86
SHA25614d4db1adde49001f81cb670a60f9d40fc7dea4b96cd77029ca87b44ccb586c8
SHA5123f61dac201d25c5cb8932e9bed8b762c6897462edf912091e6921f2895645908b64c91a779f8db0cac76a0ddae19808d9ba6ce7fb27cd0a0153c5bf20d01f116