Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 18:53
Static task
static1
Behavioral task
behavioral1
Sample
60a6e455ef240b89acdeda979beb376e_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
60a6e455ef240b89acdeda979beb376e_JaffaCakes118.dll
-
Size
1.1MB
-
MD5
60a6e455ef240b89acdeda979beb376e
-
SHA1
2bc1d323670a03676107c5c5cc773eb34d72bc18
-
SHA256
5e20dcc938ce2e061104b90a90c2f8d14f814f674184519ee8c1c018ce5faa6d
-
SHA512
b83e08bbd47b6ef520bc22509dfface44c9e527d10f753d099e0ddb52b22bf92679bda62459cbc8b519345c3f1fc18bada907f63849436623fb47c81b9a4dd98
-
SSDEEP
24576:umpC5XQ4oIJW7mmCi1t1Ajn9V6YmA7tOJLbXq7:uPQ4oIQR1LHYnOJ3q7
Malware Config
Extracted
gozi
Extracted
gozi
1000
http://ey7kuuklgieop2pq.onion
http://shoshanna.at
http://buismashallah.at
-
build
217027
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
worker
-
server_id
12
Signatures
-
Unexpected DNS network traffic destination 3 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 208.67.222.222 Destination IP 208.67.222.222 Destination IP 208.67.222.222 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Explorer.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\comuobby = "rundll32 \"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\AsfeOKSE\\adsnprov.dll\",DllRegisterServer" Explorer.EXE -
Suspicious use of SetThreadContext 4 IoCs
Processes:
rundll32.execontrol.exeExplorer.EXEdescription pid process target process PID 2220 set thread context of 2712 2220 rundll32.exe control.exe PID 2712 set thread context of 1200 2712 control.exe Explorer.EXE PID 2712 set thread context of 2444 2712 control.exe rundll32.exe PID 1200 set thread context of 1668 1200 Explorer.EXE cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exeExplorer.EXEpid process 2220 rundll32.exe 1200 Explorer.EXE -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
rundll32.execontrol.exeExplorer.EXEpid process 2220 rundll32.exe 2712 control.exe 2712 control.exe 1200 Explorer.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Explorer.EXEpid process 1200 Explorer.EXE -
Suspicious use of WriteProcessMemory 39 IoCs
Processes:
rundll32.exerundll32.execontrol.exeExplorer.EXEcmd.exedescription pid process target process PID 328 wrote to memory of 2220 328 rundll32.exe rundll32.exe PID 328 wrote to memory of 2220 328 rundll32.exe rundll32.exe PID 328 wrote to memory of 2220 328 rundll32.exe rundll32.exe PID 328 wrote to memory of 2220 328 rundll32.exe rundll32.exe PID 328 wrote to memory of 2220 328 rundll32.exe rundll32.exe PID 328 wrote to memory of 2220 328 rundll32.exe rundll32.exe PID 328 wrote to memory of 2220 328 rundll32.exe rundll32.exe PID 2220 wrote to memory of 2712 2220 rundll32.exe control.exe PID 2220 wrote to memory of 2712 2220 rundll32.exe control.exe PID 2220 wrote to memory of 2712 2220 rundll32.exe control.exe PID 2220 wrote to memory of 2712 2220 rundll32.exe control.exe PID 2220 wrote to memory of 2712 2220 rundll32.exe control.exe PID 2220 wrote to memory of 2712 2220 rundll32.exe control.exe PID 2220 wrote to memory of 2712 2220 rundll32.exe control.exe PID 2712 wrote to memory of 1200 2712 control.exe Explorer.EXE PID 2712 wrote to memory of 1200 2712 control.exe Explorer.EXE PID 2712 wrote to memory of 1200 2712 control.exe Explorer.EXE PID 2712 wrote to memory of 2444 2712 control.exe rundll32.exe PID 2712 wrote to memory of 2444 2712 control.exe rundll32.exe PID 2712 wrote to memory of 2444 2712 control.exe rundll32.exe PID 2712 wrote to memory of 2444 2712 control.exe rundll32.exe PID 2712 wrote to memory of 2444 2712 control.exe rundll32.exe PID 2712 wrote to memory of 2444 2712 control.exe rundll32.exe PID 1200 wrote to memory of 1820 1200 Explorer.EXE cmd.exe PID 1200 wrote to memory of 1820 1200 Explorer.EXE cmd.exe PID 1200 wrote to memory of 1820 1200 Explorer.EXE cmd.exe PID 1820 wrote to memory of 1852 1820 cmd.exe nslookup.exe PID 1820 wrote to memory of 1852 1820 cmd.exe nslookup.exe PID 1820 wrote to memory of 1852 1820 cmd.exe nslookup.exe PID 1200 wrote to memory of 1960 1200 Explorer.EXE cmd.exe PID 1200 wrote to memory of 1960 1200 Explorer.EXE cmd.exe PID 1200 wrote to memory of 1960 1200 Explorer.EXE cmd.exe PID 1200 wrote to memory of 1668 1200 Explorer.EXE cmd.exe PID 1200 wrote to memory of 1668 1200 Explorer.EXE cmd.exe PID 1200 wrote to memory of 1668 1200 Explorer.EXE cmd.exe PID 1200 wrote to memory of 1668 1200 Explorer.EXE cmd.exe PID 1200 wrote to memory of 1668 1200 Explorer.EXE cmd.exe PID 1200 wrote to memory of 1668 1200 Explorer.EXE cmd.exe PID 1200 wrote to memory of 1668 1200 Explorer.EXE cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\60a6e455ef240b89acdeda979beb376e_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\60a6e455ef240b89acdeda979beb376e_JaffaCakes118.dll,#13⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\system32\control.exeC:\Windows\system32\control.exe /?4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL /?5⤵PID:2444
-
-
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\4BCC.bi1"2⤵
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:1852
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\4BCC.bi1"2⤵PID:1960
-
-
C:\Windows\syswow64\cmd.exe"C:\Windows\syswow64\cmd.exe" /C pause dll mail, ,2⤵PID:1668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
111B
MD517900f543f673fc2e57bb0116a6af5af
SHA14738418078e5213f660191c7fbfc5bc0beb5a6eb
SHA2563d644ae23d5a90d7b4caf7dcfededf77593dcf8fe55052fd945768ca94a426a3
SHA512847ee496601bc4eda51933a0353a63fa13b53dbe419b2d2a5c7325ab7bcefddcc25c83680cc3f2a38a015e3e8cd4940c38d2a52702a2da60f510ebdeab80dbc1
-
Filesize
122B
MD586ae6b510c19228190f4b797503ce192
SHA10a6c67bc4f36fcdaa7a553f9ff9ae439f13b32d1
SHA256be8c30a0e245b6d86db1e7bdf04b8cfa3117846d5b88f6d476066041eaea1c3a
SHA512bec76ed958ccf192f26b2eb9250f02ce2cf04318cc4f51d30cbbd24b96de172f4f26bbac018938ebd2f7c38f70e70def8d8f6b0e9b473b3a32bbe252449e3dd5
-
Filesize
1.1MB
MD560a6e455ef240b89acdeda979beb376e
SHA12bc1d323670a03676107c5c5cc773eb34d72bc18
SHA2565e20dcc938ce2e061104b90a90c2f8d14f814f674184519ee8c1c018ce5faa6d
SHA512b83e08bbd47b6ef520bc22509dfface44c9e527d10f753d099e0ddb52b22bf92679bda62459cbc8b519345c3f1fc18bada907f63849436623fb47c81b9a4dd98