Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:12
Static task
static1
Behavioral task
behavioral1
Sample
65a5bafeff81faaf8a46e737857458fc_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
65a5bafeff81faaf8a46e737857458fc_JaffaCakes118.exe
-
Size
203KB
-
MD5
65a5bafeff81faaf8a46e737857458fc
-
SHA1
6a683a0f8b93fafe295e9a29153e07e80bd0c5e4
-
SHA256
79fc6e50e92e8eef73f0740a64e92798adaee64dd9b4b1b11601c699c7adca1c
-
SHA512
939d15c785720020a0b9501c7f1c76c15d42d94faf1a1c98422ffd7feda03ed0ffe67fc59ed8e07072fa1af5fe52c921c2f9a987bada6c4bc6cc6f0cbdf67a94
-
SSDEEP
3072:9wji2dQ6v4uPXDNUj4jKBonzmLXlYVRLh0epEEZqkFBc4+uTqN76o:9Kdp4uPZzGonqXGXh0bluBc4GZ5
Malware Config
Extracted
gozi
-
build
215165
Extracted
gozi
3162
menehleibe.com
liemuteste.com
thulligend.com
-
build
215165
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
Signatures
-
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BB06B9A1-17E0-11EF-9591-6A83D32C515E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002e6239ad65bf374796b421c483191fc1000000000200000000001066000000010000200000000f84a2943b69ce41d9a43fd015c297c5b215cac152459babe2b0293dc42995fb000000000e8000000002000020000000938c3e33e79df99a36a9455695015f046ea297866ec01c44544713368b21c8f220000000a520cc1bcdfce3b68baaca24e1039b63a31a5c981f488d84b630ff580763c8bc400000009b02f34a319534c59bc32b318bf9f115346f50fb121b4cf6b549508892f994e29f89f95db0333895f07d5faf00a042485fd5918d1fa1e486afe7837afea9f608 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0a7b28fedabda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002e6239ad65bf374796b421c483191fc100000000020000000000106600000001000020000000d635e33589f8f5fa5d95960b9689ed919353b8f8892873afa069c1c48d36bd73000000000e8000000002000020000000975c3e3095061c743e9bf8c3046da681a568af06c75a58e9947e326c397259b790000000578a18ada14a7c8bd26ac038296e72c542bbcb16fbf004f24badfe17b984b92d2c42dca54a28c7a7516ee0df3521d7dade60818d4fa2b487c27bcff38cf094154bf04168d8b45a8734ce92c855384aa937a1577783c597a0c6dfec2ffa046a1ea78e7a75a07f5a29c5ec4bb15a439e37ecf5f774981581b25569eb87db10e8f147382d79f62c08c1cda6ba09f795d56a40000000de36412c95dcedb6a2a9a662b7f06388dfdbcccb549d0503a39fc0f3601eede0bbbcd9eacdc20111210d5d9e384b1d35bddb51cca3c6e178665a92de2d83ad1e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2580 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2580 iexplore.exe 2580 iexplore.exe 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2580 wrote to memory of 2476 2580 iexplore.exe IEXPLORE.EXE PID 2580 wrote to memory of 2476 2580 iexplore.exe IEXPLORE.EXE PID 2580 wrote to memory of 2476 2580 iexplore.exe IEXPLORE.EXE PID 2580 wrote to memory of 2476 2580 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\65a5bafeff81faaf8a46e737857458fc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\65a5bafeff81faaf8a46e737857458fc_JaffaCakes118.exe"1⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2580 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5075af8ccd2816368c45e9a3b4cd16f13
SHA1ab2a08d6a8351eede2a08d28928b972416e5780d
SHA256b73a426d0c59a47d9b7b0222c353a8e7c6142c0b3419f8a6cf9b86c446b49e14
SHA51207d2f6d4e4412a3ef07df74fb87349824acace2eebf84ee8b1b51aaeb7d58399c5e39241a9a9caf5361b2f15d96f6f3d6cdc1aec7e338058b77abae6dae50c06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD50a956f623e84411e58c9b02d2cb594fb
SHA12841d177e416b4edc3b580c60007da7834d8670e
SHA256d42e5b2eef2c4d0f3f928b3840eea143458fa79af25a8563dc3418adb72201d0
SHA5127ede2701a2abd6a72823684102b5569e7194364bc0575aa03c85406da57b9194ce4394ee23e98d2e939838af3ed916c43faf9f074b1ad3a321fd9282a18a1c93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5cdb6eb38b8823fb3d06493009b8e97aa
SHA1fb877384f3e29a311e36f978be1c6df7a76231eb
SHA2565b8425478ca99678650708255846f5996c33ca90fd3460a4855fe417e8883e8e
SHA512c82357677e4ed540c007b74fd9ff3cf95dd62f5f2525ca6999f1cb0a1f7c75f4b525016037c9681a167448e3a251d16148f717919106178da95cb00a535e5a52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5faf9f8d6f0e81def960f001f330b0139
SHA13b4864a7a1edc8dbacd5368db4753081ef448c21
SHA256d49d6f10ec68150d0176b38cbfd89a32b632700fdba37228f4a5c484576d252f
SHA5123e788e10c0eac75e0f10540f34d6eb96e0f72250d1c007ccd8d7d2bb14cc804bdbf75eae2a8c7dbe4db3037c8b23c3b24407676a4cd79772a0224678292543dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD514554f88802ac704ebfa17f4b18396d0
SHA175c5c479058e4e0847743383d0b80baf4e49ab8b
SHA256ddf5ea924ecb3be5d174bb251ee36e6b9db767c4cbd9ad3fad739f83baba7f93
SHA51286cd619dbf542a0a557670a92692ace5167b8e66692c729eab42524ca0165e1055d25d358c8e12825865a4417441b2096008b245a33f58ce50e49fab6054f941
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c5be15c00093dc36d9752eccdddc9c89
SHA17c92dcf525d9b31048db29c697a3e141e4103300
SHA2567dfa6e11680d66996200073423ea4aafb8dcd663f0336b45665a86fab1729c8e
SHA51201bb0d0bb29d47d7e2375cd06c5ff6fccf6540b6c84d162b587951fcc5223c59d61b0f74c9176ff674fc3526984967a0af2db8dc8c16382d3411c91f82debf76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5124aee9fbd7cb1a64f4f43242fb772e3
SHA18a9140ff0c2c00e08c669b03c79391779611d599
SHA25671a07e9c869c2bd77e40f2b73dcae230cbaca7214d5111819f2d29cb5f87de0b
SHA512dfe23b36a974c97c60e4342f4dd1565611b0c8b514405b0195bcef447ab80ec19b4f238270c166cc4c69253372fad609db1f42e754721c68cf08b7a92f38c774
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD503f006bef1a06ec3c67df442be0e45de
SHA1955bc5173306481b5d652015d0a8e7f4b3dbc279
SHA256c2b959625295a7cb0955f1772cce48bdcf5b2363ca8f69e58553b2c7489abe59
SHA512dac0de43a2b85fa18a98283f93d55935bd2af0ccc175947cd5719203bc0634deff947b3cdcfde4270b7be85fa2d4bce859364a1bdbb51b5c4b0c65addcec83fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ebb8544a32e1cb673e89661f4b1b2371
SHA131d32a01ec743863939d2316fb0609ba0b8a02da
SHA256d4b87654cec5c4203113db8b7a085ce464f8dbb217001d83442dcdb8565cd61f
SHA5127292dde1db0ebe87f5c7a86d703047ef86a9fd18c2fafea77724894530c0e5efe4911625d79b21f3d7e86e66681950af44c62d751f298b1ca147156d8f2fe997
-
C:\Users\Admin\AppData\Local\Temp\Cab87A8.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Tar87AB.tmpFilesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
C:\Users\Admin\AppData\Local\Temp\Tar887A.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
memory/2968-0-0x0000000000400000-0x000000000043F000-memory.dmpFilesize
252KB
-
memory/2968-19-0x0000000000400000-0x000000000040F000-memory.dmpFilesize
60KB
-
memory/2968-8-0x00000000002B0000-0x00000000002B2000-memory.dmpFilesize
8KB
-
memory/2968-4-0x0000000000280000-0x000000000029B000-memory.dmpFilesize
108KB
-
memory/2968-2-0x0000000000435000-0x000000000043A000-memory.dmpFilesize
20KB
-
memory/2968-3-0x0000000000400000-0x000000000043F000-memory.dmpFilesize
252KB
-
memory/2968-1-0x0000000000400000-0x000000000043F000-memory.dmpFilesize
252KB