Analysis

  • max time kernel
    146s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 15:09

General

  • Target

    67ae2764af5f5902c95360d421420740_JaffaCakes118.exe

  • Size

    908KB

  • MD5

    67ae2764af5f5902c95360d421420740

  • SHA1

    c65ab45f5c735c0510ef4f9ed4c0d13bfbee4011

  • SHA256

    1225f3a85dd46f1501fe6efd9cc0eae9af9dcdda8a2daeff1f3a0e3d02b2f641

  • SHA512

    8853572536d6002f8b0c5cce214f1f209262c38c8311e6f089ee26d49fbaded974a7582de76b957689621801e086ca23f69c97d75c5fd17d790c415b0e361896

  • SSDEEP

    1536:tV7RSS9YSCSISCShSCSxAGzsCTXYtFBo45GQG770gSvc1RIVLmyLmRgRLuLkutb+:JuAGBTYzGHsNv6xgRK4VljQaeA

Malware Config

Extracted

Family

gozi

Attributes
  • build

    300854

Extracted

Family

gozi

Botnet

202004141

C2

https://devicelease.xyz

Attributes
  • build

    300854

  • dga_base_url

    constitution.org/usdeclar.txt

  • dga_crc

    0x4eb7d2ca

  • dga_season

    10

  • dga_tlds

    com

    ru

    org

  • exe_type

    loader

  • server_id

    12

  • url_path

    index.htm

rsa_pubkey.plain
serpent.plain

Signatures

  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SetWindowsHookEx 24 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\67ae2764af5f5902c95360d421420740_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\67ae2764af5f5902c95360d421420740_JaffaCakes118.exe"
    1⤵
      PID:2296
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2620
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2620 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2488
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2620 CREDAT:668679 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2440
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:308
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:308 CREDAT:275457 /prefetch:2
        2⤵
        • Suspicious use of SetWindowsHookEx
        PID:1960
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1516
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1516 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1368
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2020
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2020 CREDAT:275457 /prefetch:2
        2⤵
        • Suspicious use of SetWindowsHookEx
        PID:2340
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2428
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2428 CREDAT:275457 /prefetch:2
        2⤵
        • Suspicious use of SetWindowsHookEx
        PID:2628

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      dbb7957897908a165781f9b7e0cc557c

      SHA1

      23c133ae45477b674290759a6511952e6b68b0d8

      SHA256

      1453173f6140f49c4a97dcf0262dd6335ea1d50949ad63cc74e396df4164bd69

      SHA512

      e3987b7002b7943aee67593fff7fae9978c3afc5dbb05d96d96b239282460bc3443884d44aa63ace886c953a9086cc863fb7e431f332d3b5b64c033ef93f1638

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      8e3f2523dea42fba00e17642309e73cf

      SHA1

      efe2dfb85db9fd28894d010d539768174ddc01c5

      SHA256

      3d64002e5706984b453c37506b8d2d901a9efb3052d69790681f2b53cc68c8d9

      SHA512

      927704688a7497a8b7746be72e54e1519f017f03d8c39b9631f1966bd826f50087e759433f12eea77648429e358d938603e48743ee7ef30ea027f15e2828ab93

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      ccc58a643cd11a05de2d060d1da517c5

      SHA1

      a10bc357126b275390acd982269d91d32020d08e

      SHA256

      5fd8a611e71c385d18612b0ac8bce2a6ca1297aada06f6265b74e8f6133555ff

      SHA512

      2ade6c18d6cff88cc52dd71788dec96ae330f8c2809d2174c8f79d4779a91f4231c7b67fc99bcf8f42bd1b349981deadfb1166f2c8297d615d00932b691626cd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      2e84af6e723291ab8ef3f2492a1c8ce2

      SHA1

      10a4042492885b03ff7a38c2502eea6beed13c1e

      SHA256

      59e0b345af1b072df26b8ce06876a705df4e344a7639648b45c308f42f6bf620

      SHA512

      745d771a6c7b9d10d7dddde3b712fde0d1a1a3e0fd8b0e0f8e58ef2f66bdaf9f4337563f8b0b8c3ebb0f865bd4021a49a95368062280fa9815965c62ca746a3a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      09698c9358e02472d11aee2fc033e962

      SHA1

      5038ab089c1fe8ebb481c14fb85bd383fda1d237

      SHA256

      a52568d0613cf4e7f5b3c66599006820d742af4b41b6357eb864c9ce7d410045

      SHA512

      34c84d8542c9658aefa69b2ba0d935a57ce021b749cf75d78eec2748ed1617ca150f201262af2746c5e9d3d570157bbec71e18b1c92d488ba6820795134f3987

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      825c5477fa67f34532f11ad6e9d31252

      SHA1

      fcc4516a38e18d2cc1173409a48a7049480ed6c2

      SHA256

      e6015ffc11ae815b690d389ac1d256068f8373dff4ccb7220b3e75d26af7fb73

      SHA512

      ccdf66699920b7d11666473f641224f61167e0ab5cc1c08cb4d7508c8968ffa1fc139c936ce08692bf51f75adfd9c1095a3df19562043ac08b13e1181fcd96c1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      d72af5966f4490da22461c6d0de71e57

      SHA1

      ae9d05a51f70921981edd05fcc8a57ef4628c09a

      SHA256

      cc306d432d9e4b7bebc8eefb87c6bd347fd58bc59875f85dcf31ffb70710dfce

      SHA512

      1118f8c06ff95a489e122710746dd43827a3316fc42868ec762cb46797595364b1207a47747a76a0ac070ee4f72ae98906bd689ab466a0a36a3a7494e963090d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      6226fdf8b8059a3855d7fd98f8456573

      SHA1

      21f3b938acbdb0f534e4366a58669e8d14c8b0d9

      SHA256

      8f72c958eb789a3168f24b7b180e222cbb3d50c798f659d51cdd4a21975ff00c

      SHA512

      881c61e24f3d8baf2f06f4b26720c4ecd385d21a1ace0e4947f757fea67c886a24582d9449c48ae6b6e0808f8d41acd816d5a2869d97150ea85176d4c3d59daa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      5dd2aff9f6fa5376a882a04eb2b39a24

      SHA1

      fac2627cbdb64ff8b6cb603e8911a553b35e0b61

      SHA256

      d95c4fdf48a966c78d715d07b691767e0b210b2364f5b43812247fd28d64c666

      SHA512

      a92b9ef040aa4234c6c0e4d44e474c572c1e5cd5972254d7b67fd313c5c449310ba4bc6446bc090f1c63fa198efacc4eec62aab98220bf0481ae04e0ba9ae1cd

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\G17BROQF\NewErrorPageTemplate[1]

      Filesize

      1KB

      MD5

      cdf81e591d9cbfb47a7f97a2bcdb70b9

      SHA1

      8f12010dfaacdecad77b70a3e781c707cf328496

      SHA256

      204d95c6fb161368c795bb63e538fe0b11f9e406494bb5758b3b0d60c5f651bd

      SHA512

      977dcc2c6488acaf0e5970cef1a7a72c9f9dc6bb82da54f057e0853c8e939e4ab01b163eb7a5058e093a8bc44ecad9d06880fdc883e67e28ac67fee4d070a4cc

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\J8SD872Q\errorPageStrings[1]

      Filesize

      2KB

      MD5

      e3e4a98353f119b80b323302f26b78fa

      SHA1

      20ee35a370cdd3a8a7d04b506410300fd0a6a864

      SHA256

      9466d620dc57835a2475f8f71e304f54aee7160e134ba160baae0f19e5e71e66

      SHA512

      d8e4d73c76804a5abebd5dbc3a86dcdb6e73107b873175a8de67332c113fb7c4899890bf7972e467866fa4cd100a7e2a10a770e5a9c41cbf23b54351b771dcee

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MNCIS1YI\dnserror[1]

      Filesize

      1KB

      MD5

      73c70b34b5f8f158d38a94b9d7766515

      SHA1

      e9eaa065bd6585a1b176e13615fd7e6ef96230a9

      SHA256

      3ebd34328a4386b4eba1f3d5f1252e7bd13744a6918720735020b4689c13fcf4

      SHA512

      927dcd4a8cfdeb0f970cb4ee3f059168b37e1e4e04733ed3356f77ca0448d2145e1abdd4f7ce1c6ca23c1e3676056894625b17987cc56c84c78e73f60e08fc0d

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TTL9DZJ3\httpErrorPagesScripts[2]

      Filesize

      8KB

      MD5

      3f57b781cb3ef114dd0b665151571b7b

      SHA1

      ce6a63f996df3a1cccb81720e21204b825e0238c

      SHA256

      46e019fa34465f4ed096a9665d1827b54553931ad82e98be01edb1ddbc94d3ad

      SHA512

      8cbf4ef582332ae7ea605f910ad6f8a4bc28513482409fa84f08943a72cac2cf0fa32b6af4c20c697e1fac2c5ba16b5a64a23af0c11eefbf69625b8f9f90c8fa

    • C:\Users\Admin\AppData\Local\Temp\Cab6193.tmp

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\Local\Temp\Tar6205.tmp

      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • C:\Users\Admin\AppData\Local\Temp\~DF98A6E160982E6815.TMP

      Filesize

      16KB

      MD5

      8f43ec20e38dd7d37e454bb976bb80dc

      SHA1

      a3ad78e16d3c3f3423483264a847ea5dab8494f6

      SHA256

      8da29d5e509dc90a97b4e41fffbe2284971cded290714b1eaba3d2969f949b08

      SHA512

      86364da696c35b06787eafc84e32fe9b05c9300faec42cb2cd5695cd5ceca0892599d0457cc3a6a09e4793fe2923f9f574ae506cb95b5660533b39f4bf16f819

    • memory/2296-2-0x00000000002C0000-0x00000000002D1000-memory.dmp

      Filesize

      68KB

    • memory/2296-451-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/2296-1-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/2296-0-0x0000000000220000-0x000000000022C000-memory.dmp

      Filesize

      48KB

    • memory/2296-8-0x00000000003F0000-0x00000000003F2000-memory.dmp

      Filesize

      8KB

    • memory/2296-9-0x0000000000400000-0x00000000004E5000-memory.dmp

      Filesize

      916KB