Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
19-05-2024 18:56
Static task
static1
Behavioral task
behavioral1
Sample
5aee524d478760de9d848a4a749ca805_JaffaCakes118.exe
Resource
win7-20240419-en
General
-
Target
5aee524d478760de9d848a4a749ca805_JaffaCakes118.exe
-
Size
269KB
-
MD5
5aee524d478760de9d848a4a749ca805
-
SHA1
c009ec659d5bc86ae26fa229a574031a90287532
-
SHA256
76a34f89dcee59fa04fd1e7b16391c0c09944c2c026dd67bc4fb408f38ad7a4d
-
SHA512
c8d13fc8d3c6ba9dde83166177a57b4f469a6b78c7460438e007a6fd9122ede2c18cf4410bc31c79f9749bfccf609cd0c316e33658423ba6cda38b6f58651103
-
SSDEEP
6144:QVfmmDgASD5W/adCxsT4/YFqBcIsBGOhN/35:QVfjDmtW/adCC4/UIsBhN/5
Malware Config
Extracted
gozi
-
build
215165
Extracted
gozi
3151
zardinglog.com
sycingshbo.com
imminesenc.com
-
build
215165
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000b7380ecc9749ab76cece15f5473414d7ab0e96368667c9219b88c3dd1532eff3000000000e8000000002000020000000d91bc15966386259058732ba1f74c890426bdb2e59b1c69a49de999e0e514cc120000000930aee699101273cd03b685fb359f117afc094a1b58479415a03f88e84650c3140000000b266a6c2ae56d8d58355d639f6dd7048c9bc52c1ee581c05d2d5e5b79003e8568aa90c8b8d12798e7b39e3690ca4ca1eb4149db535359f388905eb739b583540 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80c3215f1eaada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8A5E1F31-1611-11EF-9CF3-F62AD7DF13FC} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000009ef0e2ce723d80ef72213d0c534a70cb09bb5280bc9a085d2bf6936984af61eb000000000e8000000002000020000000a63dd5aca9b5583d8444442e73e4aeda290f589ce14a9b33ecb6fb8c69a9194e90000000273386a137763fa0e2ebbde7101365a63064cdd266cd0fa491e6b66e52b1121dda46a199a4d2f0e62227eca66f4cf9333901ec14dc6e1c683691c401937842d21d8efb3f251aaf3e9a41346d469544dbbdfb1e477cc91a3bf41d30fb5cb7845f293a54a299bfdfd7a7a96803ea325f8d6e38698428e57ccf9e2b60760407116a79fed35b564a15df58a6eb01c190368540000000683765695dad0e04179c2dd59b825dcd5af99d82496058b76b4bcf2eb781205ae10f52a2d1e75d0b6521564d8e8b550d417920d4ea216f51ea26a40574e25e63 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2700 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2700 iexplore.exe 2700 iexplore.exe 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2700 wrote to memory of 2768 2700 iexplore.exe IEXPLORE.EXE PID 2700 wrote to memory of 2768 2700 iexplore.exe IEXPLORE.EXE PID 2700 wrote to memory of 2768 2700 iexplore.exe IEXPLORE.EXE PID 2700 wrote to memory of 2768 2700 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\5aee524d478760de9d848a4a749ca805_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5aee524d478760de9d848a4a749ca805_JaffaCakes118.exe"1⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2700 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53197c019202b4a88e3f600947d1b3597
SHA1570b22e10651a675ef49b9d167a46afeefc79aeb
SHA25683c0c5dd4687698d3005d9400e2e9c03fe9626e6f5bbe2d73f6e00c579214ace
SHA5128d0c066a6625e90f7824557f4f4ece54cb39bd3eea10803affb271a781d484b9a3d6f14b736ed6f83c2f4d01143e8d09d0944aee1d54c4efed39c6772cfc7804
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD504d29ed1c4466c3ecb185043a630e368
SHA173ded062bfe93eda65a33d090e7ed8f074c604cc
SHA2567e620964a83f4ecb27648e8c9e71e102a6e71d55c9724192b89f0cf5b9dc76df
SHA5125e66ea5a9f5072c3e1c22fc2e2006e1ef91bc197da96cb6695b8c492b50ef865f438587ae020513fe02a1012ed492117d9c065fbf284eda0ddd3ca148f8cd633
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ccbbdb88b3680c751764691dd0d7969f
SHA14bcda629d2cf623b85b5042ab406104d71bdcec2
SHA2568a400131dc7856386d2c7b710aa5639a168c34a84da72b0ebb8f02ed71cf9961
SHA512428b9ec289490a5a548fdff3d119e4d5f79a6e3c75f684a357653aaa6d68d8c9484a78f4e8af91a767eff06f08ea13bde0761f1644993eab72c8c33995ef286b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD50bd456b14d54da60e6f54859fcc029e7
SHA16242e664b5bf00d282232ac31c9548a9b1632354
SHA2564eba175d82025f297a925de019eb7cc31ccb7dd60a28894e7dddb53691387b48
SHA512eb837b45caca43f5d67545d2e80a7f172faeb9f436e08ce0f35ef8cd988200748441fcb7241ab22f34c1327b4c456755a7ca49ed81f9753e2816e09b0af31431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5febef9a76981a46fe3c906157d90b262
SHA13500dd5bc554042495a0308be59b960e0731b55d
SHA256c57b4f32c0a420797ea7b6e6a4f1f599a1fba51362ae8a277b3351aaf6b99ac9
SHA5120e4ab02b0630e6305ff941d4a7c08eceb68eb75ff3b879775cda2bbaa002a6bccf1638102c0569bd41046dec17e26791a319b1b6b2519d7605a4672fc790034b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e67bed1bd26942729948ccf325e1af22
SHA11f3d80a64339ee08cd02b9d9da4254d2ac76d762
SHA256b5f80282cf588d758d29158447f4b9f657b4ab774b02d2650f3b8d80549b6499
SHA5122f31001465d0e2645c1269b047fa731f82613c9493a0d67c9e8f6f2204c6b8b60eee5ee7e0b5c9715bfaa75fc900b590c3f7872fa305501c0ac61d215cb73014
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e14ade8e0a0db7f0136f662c6a71af90
SHA10220fa230ed03d7b92b96a023065a75a4b0612d6
SHA25630cdc2caf3e3308e229240a5fe61c014f2635af62a12666ee411a3ee936b2e9c
SHA512a182fe1ab81ca1a745d5648aeab46a7c59d7b032d8d169afff8f50fea6c187b5e9fdcb92de7ac254d19a181282f001d8fe6a41a1d794da16ee877abaabbccb54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD502ad0e576a00a5751516aa1f882524c5
SHA10cdcb17616ef978a3277538db5c41d0264469003
SHA256ec6fa14f216cea09c0c39d0818579fa1df469c0315a0f370b68c4f0e735b1166
SHA51286e4b485da558e84c936b0e10abcac5be1c0fa3c523bbd391be819807300a769e93ab970a70db0ea9ff19115d386681d0e403706f52530a947b5d00ee8b74de5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD50c18ed3b03111558067ee52b0fe998e4
SHA1df65164a2345aa121974f75d982d74e7267c3a1c
SHA256918caae78b078bd63b601dec0af5ab3065c2746b5e9f1f99905736d377cc9c25
SHA51232970749832f4e6ac68aa72a3816e9f1b63c6c91ea793d5c9eba3fbdb917cba90359a69aafc22cd2405a9caae6b3c633e33bd4ce67cb3f6a3532073986c780f7
-
C:\Users\Admin\AppData\Local\Temp\CabA22C.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\TarA28C.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
memory/1520-0-0x0000000000AA0000-0x0000000000AF3000-memory.dmpFilesize
332KB
-
memory/1520-6-0x00000000001A0000-0x00000000001A2000-memory.dmpFilesize
8KB
-
memory/1520-2-0x0000000000160000-0x000000000017B000-memory.dmpFilesize
108KB
-
memory/1520-1-0x0000000000130000-0x0000000000131000-memory.dmpFilesize
4KB