Analysis

  • max time kernel
    141s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-05-2024 22:42

General

  • Target

    612bfea40ab2f0ae736b98e94b95bc5e_JaffaCakes118.dll

  • Size

    118KB

  • MD5

    612bfea40ab2f0ae736b98e94b95bc5e

  • SHA1

    c95e8af48c7cd4bcc8f28583a2803eea5124b334

  • SHA256

    9fff8e2a6ec0b66b064f156eb829722576a3a3d64a2e77387e599477a55e53a9

  • SHA512

    b013da46cb3b34af5de8d1290ffe42ac9c6b3eec32ab7ab4234bf300c0530bdfd3371759fc9ec049a024959aefaf88578e8e2410a17e9f28ceba875533c16bf8

  • SSDEEP

    3072:5Qyynkl6uDo6e0swuPWDsQ4gBiMJJfqc6wVAFb7XWe8Wln9J:VllTlFLsxgBiMnCfca7Z5ln

Malware Config

Extracted

Family

gozi

Botnet

7129

C2

pop53334.yahoo.com

web.canoeontario.com

Attributes
  • build

    250154

  • dga_base_url

    constitution.org/usdeclar.txt

  • dga_crc

    0x4eb7d2ca

  • dga_season

    10

  • dga_tlds

    com

    ru

    org

  • exe_type

    loader

  • server_id

    12

rsa_pubkey.plain
serpent.plain

Signatures

  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\612bfea40ab2f0ae736b98e94b95bc5e_JaffaCakes118.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:920
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\612bfea40ab2f0ae736b98e94b95bc5e_JaffaCakes118.dll
      2⤵
        PID:512
    • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
      "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
      1⤵
        PID:1200
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
        1⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4264
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4264 CREDAT:17410 /prefetch:2
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1300
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
        1⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:5036
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5036 CREDAT:17410 /prefetch:2
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:8
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
        1⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4492
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4492 CREDAT:17410 /prefetch:2
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:832
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
        1⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2536
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2536 CREDAT:17410 /prefetch:2
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2992

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\~DFE43F92EF766DA2F1.TMP
        Filesize

        16KB

        MD5

        6b35e64f8097b0e23be9c6bbf27e9027

        SHA1

        d2b9574a9f13f91a892f1269ff1e049eedad9ad8

        SHA256

        f50f966e3b680458cd252cee6577f28f3accfdf208aa8adfd5e8344734866541

        SHA512

        29311ae682054a31d8a1f69c2c64e9e1cf907c1d72c84d349fca46e2fe035ec0c53e8ea249bf5f9a5e84be2cc3d0a1d1aa7c2cafb0474883c9cce85e130cc69e

      • memory/512-0-0x0000000001460000-0x000000000148A000-memory.dmp
        Filesize

        168KB

      • memory/512-1-0x0000000001460000-0x000000000148A000-memory.dmp
        Filesize

        168KB

      • memory/512-3-0x0000000003390000-0x00000000033A0000-memory.dmp
        Filesize

        64KB

      • memory/512-5-0x0000000001460000-0x000000000148A000-memory.dmp
        Filesize

        168KB

      • memory/512-15-0x0000000001460000-0x000000000148A000-memory.dmp
        Filesize

        168KB