Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 08:37
Static task
static1
Behavioral task
behavioral1
Sample
74e74dd39102936cc43ba684d320d94d_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
74e74dd39102936cc43ba684d320d94d_JaffaCakes118.exe
-
Size
203KB
-
MD5
74e74dd39102936cc43ba684d320d94d
-
SHA1
ac13297cce2c778067d54694722b518bf327a22f
-
SHA256
d9cdb6b8dfc741909d2e2734cd2d89cfcf4b99bb23e6d91a0abafa97b4eb4011
-
SHA512
235205ad40fbd3209f0bb90c3b3d63dc97abc388e733d4463267c16ab51380146671eae4bbba1d82860e525c66e50ca5cbebc791e4590865f377c4b5637762f7
-
SSDEEP
3072:97ji2dQ6v4uPXDNUj4jKBonzmLXlYVRLh0epEEZqkFBc4+uTqN76o:9Pdp4uPZzGonqXGXh0bluBc4GZ5
Malware Config
Extracted
gozi
-
build
215165
Extracted
gozi
3162
menehleibe.com
liemuteste.com
thulligend.com
-
build
215165
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000008f12dafb0fc87183297ed41fdc132d4161296cbd9aa05ba4fe24f7ab7f7ea788000000000e800000000200002000000009a1da62bdd9b29d74986e92101df9a9c8964f3302367ed03d4b70b98aaf22be200000004788b14ccb3cd547ef71563fe881e38f0e56281fbf8b3085c26e5b98994ca8d940000000f178e9ea00047b156bd6f3dca626374169b11dc9baf5c2ce06229f7c7a927a8394508cd12a4f1a80cf33940c1f05d8a3ca37cb9778af5f07b54436c7c39d3c60 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 805a002448afda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4F594E81-1B3B-11EF-91D8-D6B84878A518} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2696 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2696 iexplore.exe 2696 iexplore.exe 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2696 wrote to memory of 2556 2696 iexplore.exe IEXPLORE.EXE PID 2696 wrote to memory of 2556 2696 iexplore.exe IEXPLORE.EXE PID 2696 wrote to memory of 2556 2696 iexplore.exe IEXPLORE.EXE PID 2696 wrote to memory of 2556 2696 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\74e74dd39102936cc43ba684d320d94d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\74e74dd39102936cc43ba684d320d94d_JaffaCakes118.exe"1⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2696 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ae441d9094eb99d3b9c600c6fe9f68ed
SHA1acf7b2b87a7eece690df595272a3f5c73bea92da
SHA256b45860a4e10109423e084936b2b424da7aa5495233552694e637337e0daddb73
SHA512e04bbaedc121b72419466d6bdfce18fcadb25658f63e451c1839f1d419087de7206df2a1a84d90978989103e8ab58b2bdccb985917c0b2b851d64f5e9212aa32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e4690bda6fb7ae744cfa0954b98b0a76
SHA157184e0c9050e8a75523d152ba633d8eba8090e1
SHA256d90966a2192e1466a1230adf66aa9eed189bd941fe74e2a163d2856ba7529fd4
SHA512155f593c98f4288491912603f6b3048cf0c8c00676b5961bf7d9a8d84bee57af3c16545c3a9c85c235d8452b5a9bc8b8962b1d51530a79a2f1b151d3a4ced36d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD532981fe9d101a7f4ad038109c928cfcd
SHA1cdde37e41740034e9df095cea1dac0663ff67e5c
SHA256712e140261535be6353013e15695d28c6132c45bf575ce2e199849080fcfffb4
SHA5123bf8a78fea813794c7b962e3c39916167433ba5c425cdf021d55f2d7e4e4a92758a312f9e68f355a79bbd4462a5b795596f300c1004cf47fa3452136d7d87fef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD593e02915c35d576fd66d858560015712
SHA1bfb1e495a37959fbdaac6f77020d7314754d81c7
SHA256c97602d3395ed00e3971a62f9ac664f9594f71a7bc00484ae1a6ad74eddbdd24
SHA5124ae04abfeecabca8aa0b386e114a8c11475e8b2f41ad26c44545f89f40e9246e1c0715c4498ceaa357ae960c3832eb63eb2427f93f12d8779eb80fea4cc3fe39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53790693182943abda207d04d9c921d38
SHA1201d01433c2cf9d29ef5283e58f30d246a22555a
SHA2569a38aff6154045b51a4a37be038eaea5bad568178a29b4e3cdf7f76a2366b6bf
SHA51209eead8141addedee11da0cf3922ba678db401d4b59fd5327a8497eae601a64b8bef67aab4f041926b06a6d85db1124c27786fa9a2e34a4f5141d55e2a27db27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD545f3c855c148c4c0d5edf96e18bec205
SHA1355af37084b5008911ef2d2e6cd41f1f4938fe59
SHA256c877e578774687e9a6e0959e4616513d27d2c4cd3fd60d695ba279539998b127
SHA512441118434652ffd8b9b793f4e4587b9bc60d4ae0f97aa238ca552e7536b96bf681f50ed7c2a87d69514ec52d092e0be40f242c5e219f5759068bfec82cf16888
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54d7cd3213eaead71b7329cf75a6fc942
SHA1c80456ab2d54b460d9167d4dd890d5d0e1b0468a
SHA2560df965cb7645e4898cdfe26a7fae96e170e26b6106b86bffe50b686cfb119bed
SHA51237b771fdba50ce10616ab8412ff18737d9f6d0837f1b5eef001201ad271b6f92713fc9db6bb8031fdb3ebd8ef73b5a0dc537fe905aa2cfe07fa7e5b72ee13e35
-
C:\Users\Admin\AppData\Local\Temp\Cab7699.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\Tar76AB.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
memory/1704-4-0x0000000000280000-0x000000000029B000-memory.dmpFilesize
108KB
-
memory/1704-53-0x0000000000400000-0x000000000040F000-memory.dmpFilesize
60KB
-
memory/1704-8-0x00000000002F0000-0x00000000002F2000-memory.dmpFilesize
8KB
-
memory/1704-0-0x0000000000400000-0x000000000043F000-memory.dmpFilesize
252KB
-
memory/1704-2-0x0000000000435000-0x000000000043A000-memory.dmpFilesize
20KB
-
memory/1704-3-0x0000000000400000-0x000000000043F000-memory.dmpFilesize
252KB
-
memory/1704-1-0x0000000000400000-0x000000000043F000-memory.dmpFilesize
252KB