Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
19-05-2024 06:55
Static task
static1
Behavioral task
behavioral1
Sample
591a3d2238c8d37711181d2c118cc9b1_JaffaCakes118.exe
Resource
win7-20240215-en
General
-
Target
591a3d2238c8d37711181d2c118cc9b1_JaffaCakes118.exe
-
Size
1.8MB
-
MD5
591a3d2238c8d37711181d2c118cc9b1
-
SHA1
979de11fb7d1ee31a7f39a6275ab9e5f98bcee32
-
SHA256
109ced53fd27efac18e0b6934e9f50182f18ff0dcc505abcb65ead3da1e19f02
-
SHA512
78a58e0d98fdb9d89b08d6dd835390882b3058c523fe65b519a4450a5284921bb1ff9a0251b0ab52a44616ca7fdec73e4a150cbce79871877e62aee7f108197a
-
SSDEEP
49152:4SuE34trqPKIO23Hlin6COYolnyJ2WR6wOHste0uIlCj790Lhf4xC0FyQ4L6nd:3L30qPKIOson6Cslny8WR6wOHstehsC7
Malware Config
Extracted
gozi
-
build
214062
Extracted
gozi
3184
qfelicialew.city
mzg4958lc.com
gxuxwnszau.band
-
build
214062
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007567ffeaa9be42408fdd0c69ab76b1bf000000000200000000001066000000010000200000009a7472750469ea15bfdd6c96d3f8e05572e2fcb0d5836a7429971583324c74a0000000000e8000000002000020000000287aefd4953dd5fc90a1a5979ea3b38c8fa099caeb8861cdb7f43286d16e0d9f900000007673476eb88a974bb12ccc85d2872ef6d796050ac78373eaff22944f43417d743a53a88ee11345adf39c6c62edafc2d74aa07fb69469782ae61d98fa1eda6004c7718c2efe1b25f0f5be6ec0179ab731a9a75d0e5bde54d94daf8aaa2ca4160043da8c28b0fad07b8fbd2acdbb8546a9c196076a03785759d260f409d89d8bcae3360fb607fa5705a3b2d541960a3389400000004501e19c8f052a7fcb734c3ffc87f5fb0caf4e3c32e351b4ecf0eaf27bf42cef84ff8449298f7c23ebbc2ebdc333f37f9a73ac328f5999439f1823b4c61b5c67 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EB6F41B1-15AC-11EF-AAE3-FED1941498E6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007567ffeaa9be42408fdd0c69ab76b1bf000000000200000000001066000000010000200000000478390b06973fb36e1bb2477170652b4a6cb08132307a55901151263da16fe5000000000e800000000200002000000048dc46caf746bc1ecbc91a74eb6e76a0a400be72befe31d4650ba7a004c7f95820000000a04e64b801d82ecef7b5249b8ec74b854799b7dc5fd8b9010fb3a6b635fc4d054000000020f7ba8d31ea8c47f676f8b3861498e835674448c7828d43beacf9e013ac8f59c792635f64ad6045bc52bde1ffd181e1e6756dc62e112abe123328ff43b7a265 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b05829c0b9a9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2524 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2524 iexplore.exe 2524 iexplore.exe 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2524 wrote to memory of 2476 2524 iexplore.exe IEXPLORE.EXE PID 2524 wrote to memory of 2476 2524 iexplore.exe IEXPLORE.EXE PID 2524 wrote to memory of 2476 2524 iexplore.exe IEXPLORE.EXE PID 2524 wrote to memory of 2476 2524 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\591a3d2238c8d37711181d2c118cc9b1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\591a3d2238c8d37711181d2c118cc9b1_JaffaCakes118.exe"1⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2524 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59db1c2f624ee63f751195dfe62afd791
SHA165b55bd3dd272f58f28648e7f1d2fd386f0c1b43
SHA256ea04da665bd86fec611f2eb091f55a93ba69f67da999d70eb7ceec525ce9254e
SHA51221f12962146a1fe0d0616951ce40701bf7457234272caed593477f1e19663a4aaca391ba449484d08d256e28158d44fa8db297ce7c51b880b124e8e2a7d66082
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD573bd70d7cbc041c66049e83e1a65ce34
SHA12b5dd7eb8bbd3f711502f17403bb80389e763840
SHA2567b1a78c5799ebabbf466b864661f837d6bcb5091f1f9f70a96c78ba5698cad5d
SHA51258fc40f134b83163f9b1ca3835d122a1fe3434c5db17ec2ffe910d75bebc22d4b44a7ad3c02fc4fe816acdc85e607105a90c059fedf2c7063590cafc556a8bf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD52b4d0d6f3a8a6a55e6548bf0faa62487
SHA10c22543c50eb5a247fee598d7955b519894b8a3e
SHA2562044be02a061d9e1574184998c6f9614e549c1cc5732747cf660cd0d44d52c31
SHA5124f6d1ac5ea8a85e4c8cd9018937c5514f15b6e5c40983435cb7b44cd20df8abcab20b052c0ab8170a7662928d0af82a339bf5ffa5b254096a8a86e39f0feac12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD543695864c16654fcbfa1c77fd92c800b
SHA10689db0ca116f834189b75f8f0feb4b8028639b8
SHA25668e7ab3b195df15d8aa92edfa6fa13cb204340e81ab055100fdc5049408b568a
SHA512573666a9d6b976ad4a7aed892c0e44e301da895d6b20a3433a9f0b5bdc2d48195089f06dbbd1afe0b1c1fb51306763eedf26e8a575abc092748f65fea9588538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5108605576c0a4fd32dae12d8ddc28dec
SHA1d531fdbbef4c8c1c4a0edadb215fb1acdbdaf304
SHA256fbdf0e7199d83a3966813cc23a044cc54b30897007ff54daa42b3bc9f05c9dfd
SHA512e572f80e856aed36d9f12feccfa6ff5a13e36c0c9ded9d7c57b0355733034c68b47c0ddc490ac4a4e05011cc19cabc2d7387e5cce9fde36a9313f01048f8df62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f690fa3c7b4c8f15028f2cd3063946ca
SHA1fcd895c5e1511ae98e90af96c20bf0065f0aa614
SHA256d8200cb89a96fae037a991ddb493cf5c9b91b8300b12e9f0d1b8cdd1c69132d2
SHA51281dcd905a63bfc57460215fcba6cc8ec30d1db070c383958b390f85ae6c03dee3a249dd78760443043401586155f923347444686a819850346b8bdbbda9ef8bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5439c74807be34faa74888ecee58053e7
SHA1657307f7681d7e2b7a350f467f32940e47c8b337
SHA25663795936e1cfa1121f86ad89819156955c8c35409d316609b8a5529d2a8f6ac9
SHA5124276de971fa56ef39cb7f8ac8a4746ee739f9bb59b63990ece5892620fddedfc79e214a9c8219d1e5196e47d8037c64ec209eefed7a224866b2b3b7fb3108547
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD503c1cd5871aa403b725907fc6917bbed
SHA1467e2d2bff492150447ef1f0ebfd5725d3e916ca
SHA256393ce974540f15a55cf5b2539c2f67332a8489540ae8693c779ec4e560df03f3
SHA512cb7ea89a907b5b92b7f2cec392e30082cfaa610b6e4dfb05eaeece915c91adeaafa9a3253c2c53b0b7a4f6209f43bb9d0cfa468201770cbb486678f6a91130f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b955e5b6e56eb9bf5e758a1664ebb482
SHA10fc2321013d46bf23db6b45de379924ba5afbef7
SHA256a5aea6c4aa7317119744414458893ac984a41dca6b15e8df798b26b3148240c3
SHA5122dcbd502790c381dc889df18f64b7d9765a654629dd264feed8ae522a7e1629d70a1ae3fb86441372e68958b0582ce64ea188086875801141c27a495ff069aa9
-
C:\Users\Admin\AppData\Local\Temp\CabA595.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\TarA677.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
memory/2108-14-0x0000000000400000-0x000000000040F000-memory.dmpFilesize
60KB
-
memory/2108-0-0x0000000000400000-0x00000000005E8000-memory.dmpFilesize
1.9MB
-
memory/2108-5-0x00000000007A0000-0x00000000007BB000-memory.dmpFilesize
108KB
-
memory/2108-3-0x000000000058F000-0x0000000000594000-memory.dmpFilesize
20KB
-
memory/2108-1-0x0000000000400000-0x00000000005E8000-memory.dmpFilesize
1.9MB
-
memory/2108-4-0x0000000000400000-0x00000000005E8000-memory.dmpFilesize
1.9MB
-
memory/2108-8-0x00000000008A0000-0x00000000008A2000-memory.dmpFilesize
8KB