Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-05-2024 10:13

General

  • Target

    7525a0139f7b28d74affe5c9b112ccde_JaffaCakes118.exe

  • Size

    155KB

  • MD5

    7525a0139f7b28d74affe5c9b112ccde

  • SHA1

    91a9b33517531ae03b3b05e44c721508890026a4

  • SHA256

    1bcc72682dc5b2652f2ca16cedfbb5b693c2e3b2443718e59f9dad4f7d566e29

  • SHA512

    7fb22d168712689d175ff64ad6c955dd5d36dbac1203f5f0fade793e604cee88154a29f322e1d2d3254303b48fef7971845f4f8a4e9750d2a681f113ab475837

  • SSDEEP

    3072:4Wuk6BU7sniep/j4UswJiNsRI4EwR3WxUIuupo/KuXkwIEnUaTii5Qi37Gq:4WI2wiep/j/2sRI4E4Wx56hIlaMi37X

Malware Config

Extracted

Family

gozi

Attributes
  • build

    214098

Extracted

Family

gozi

Botnet

3492

C2

google.com

gmail.com

lsammietf53.com

p28u70webster.com

ploi7260m71.com

Attributes
  • build

    214098

  • dga_base_url

    constitution.org/usdeclar.txt

  • dga_crc

    0x4eb7d2ca

  • dga_season

    10

  • dga_tlds

    com

    ru

    org

  • exe_type

    loader

  • server_id

    12

rsa_pubkey.plain
serpent.plain

Signatures

  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7525a0139f7b28d74affe5c9b112ccde_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\7525a0139f7b28d74affe5c9b112ccde_JaffaCakes118.exe"
    1⤵
      PID:388
    • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
      "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
      1⤵
        PID:324
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
        1⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4648
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4648 CREDAT:17410 /prefetch:2
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:3052
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
        1⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3836
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3836 CREDAT:17410 /prefetch:2
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:3244
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
        1⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1044
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1044 CREDAT:17410 /prefetch:2
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:4688
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
        1⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:944
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:944 CREDAT:17410 /prefetch:2
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:452

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\~DFA3BD4E134FF18B49.TMP
        Filesize

        16KB

        MD5

        9e9b54d424b5c21d6ac4b9dc1db68814

        SHA1

        50c28499b28d3c9d526a86307aa97ecbcc2ecb0d

        SHA256

        6e18b70e1b60886bd9edf62e1d53d524b033deebab91003b76e42ca6142a153c

        SHA512

        5ac9ce43b17f945a9c5fac88d350cb9bd172b28ae59494aedb534cb7c02361e9be027fea33c28f0e4070bf417ef172814f5b76795f8fd7c9e5589e7b25f23bee

      • memory/388-1-0x0000000000400000-0x0000000000537000-memory.dmp
        Filesize

        1.2MB

      • memory/388-0-0x0000000000400000-0x0000000000537000-memory.dmp
        Filesize

        1.2MB

      • memory/388-3-0x0000000000400000-0x0000000000537000-memory.dmp
        Filesize

        1.2MB

      • memory/388-2-0x0000000000428000-0x000000000042E000-memory.dmp
        Filesize

        24KB

      • memory/388-4-0x0000000000540000-0x000000000054F000-memory.dmp
        Filesize

        60KB

      • memory/388-16-0x0000000000400000-0x0000000000537000-memory.dmp
        Filesize

        1.2MB