Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30-05-2024 07:03
Static task
static1
Behavioral task
behavioral1
Sample
835e9e51d0ef4c5cb6706b65124ebebf_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
835e9e51d0ef4c5cb6706b65124ebebf_JaffaCakes118.exe
-
Size
203KB
-
MD5
835e9e51d0ef4c5cb6706b65124ebebf
-
SHA1
4646766d43ee42e4bd3dc0daeea66dc8f0523ea2
-
SHA256
735c5c63d6d68db96046195a42195049f3d6cbd4817f26c51a6624bcd8d7dd16
-
SHA512
5dd0e44ed9695e9f77ed7a8fa7178bfe0c6fb6f55600818800e830da7b7cc91b4221f6026c57c27adf5e8d621db4ef9a56d24b18c877cfa1bdf7d6ec04ca6dc5
-
SSDEEP
3072:9eji2dQ6v4uPXDNUj4jKBonzmLXlYVRLh0epEEZqkFBc4+uTqN76o:9Ydp4uPZzGonqXGXh0bluBc4GZ5
Malware Config
Extracted
gozi
-
build
215165
Extracted
gozi
3162
menehleibe.com
liemuteste.com
thulligend.com
-
build
215165
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10b86d9a5fb2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C56C2061-1E52-11EF-AFF6-E61A8C993A67} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000096c2c7bd5da4b24889c53b7b362d571d00000000020000000000106600000001000020000000421bd11293b0fd73a55ae23039bd36bda593fecc6dcf3f378b84877b66e6fb1f000000000e8000000002000020000000e265256aa8a402482db830b428343e94dd4fa5d96bae5121b0199bdab57aa0fe20000000076a42ac7c5cdd9000fb22350ae1ee8ab53e0bc851c820ab3ca2c327c17dda5d400000004516c95ee1886b59f51a2030fe84b962a3fe6a2446aac9d1ec217c54a5a0608877944d241830efcd763ce716f77e63f5bcb7ca2e1e29c5f73259cd1392377c03 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2772 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2772 iexplore.exe 2772 iexplore.exe 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2772 wrote to memory of 2392 2772 iexplore.exe IEXPLORE.EXE PID 2772 wrote to memory of 2392 2772 iexplore.exe IEXPLORE.EXE PID 2772 wrote to memory of 2392 2772 iexplore.exe IEXPLORE.EXE PID 2772 wrote to memory of 2392 2772 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\835e9e51d0ef4c5cb6706b65124ebebf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\835e9e51d0ef4c5cb6706b65124ebebf_JaffaCakes118.exe"1⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2772 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD591f238fb8d991b55f7a15e4db631bd5a
SHA1a86c9d10f16d4030c6dcdd0feb87c3fa779ec846
SHA2568cb30ca8dfab5f73c7e21fb60e0736373a74fef4c728fea50a70ec810f8f6363
SHA51235502d1bcad2b2bada507c64384ce776be00bcacad0a1ab829eec4588a9f5dc37ba57e177e102549722714213464ba0e98d3ffde11006e0352ff4295fdc627c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD54513aa346c3d674c0aca4946c336a692
SHA14b26085e9295cb8a3fe9f106be39f0d95883417b
SHA2566474dd27c56fec4efff7803070b4f22d0af59cdcd51e91c46afc03fab2b71942
SHA51235f263524bc1ea5235c35762417af82f5fe838fc2c6638ae8b662314f3c0a5464f38d37381f5a6fef26764b82828682c486f5774db8269b355ce8f52ddcf0634
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD59c5b1e002993015ba26499d9d60be2a8
SHA1a0177dc76b8dfc6493448bcb9e7aee009b42147c
SHA256638a300a54ac2d459b79c17e7f1e6d0b3c933f71e1257c4ed58c1d91056dc2ac
SHA512efc3ec729db82d61610d478d6b9354fee5c5a512a3277d524ebc38f511a3fffb2aa1b96ebad608d3d9489570f5fe4903ebfb73022d5c8507388c35e53c057f46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5b64021bb19fc5caf372450c0d98c1df8
SHA164189c0deb9e082066d3f1c4d05405bd932cb5bf
SHA256b54ce98c4c7144b797b03103939ac4c6248751d0cf5ccf723c40ef4a9bbc9cba
SHA512288d18ccb6adb03f04522210ebd9798831808fa1cdc6e890fe98b957c713e43bdc1725115bebed30caa626ff606b2991490772822c9284c7fe4b64cc09c6f710
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD53c7efdaca69dfd9e73b1797bff745512
SHA1fdda07d3805e7b6ba6285bf963c1d7d89c757439
SHA25660a9a606542377bf2e38f2bc93d03e15eb5feb476107ca8b9294a794f34a9ad3
SHA512b7cdef15c4bed06abc257b0c53ecdce39557b9c64790d9f47b035786097dbe294b81e8cde827c7171c6a4053721ae331fb66e95d93b76702ae5284a8d1899728
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5cc816109597b138309a2b4d75599f363
SHA1f28903ff6055f6be55c6a70767e8e555a2d1f743
SHA256192e5fa81f2095e0f1263d33a0f2c9baf816a44101054fb5890f6cdb3ded6bf2
SHA512b1b8eb28e06403f5b5b5f0b019b1a975673ade1503cc67f86bbcc520fb96712431084392264b8d05fdbf03a81bfb4ec2e267462bb88f1cf9aca1673b5b3b876e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5dd4ca6498e5105e66f14efd62e5a8a7b
SHA1178930eb5933e7352939bcbad48317910788b1f0
SHA2562681338a14d58bceed05c440bc3d0ddc79c50a1bb844938c98cc136dcdf9e483
SHA512aed86e3f2822d08c7149b4d9b12e7dcb77ee246371f3d0734c8380a09cc4143c10de9e110fce0621a71d9333afe866d010ad2358ada83fce1dab9cefbbf9adce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5f39dee3bba9431e1a0ab83ba48dad455
SHA15fa69d5365dce43f5244719b31bf6b4cbd48e121
SHA2564b1d318de3151b36889d19cb3d27bdaee6a4343e2e6bdc236d734474ab5bf1d1
SHA5122b40d7d27c23f292caee13e90d8b9d63be3c73160d6be5b438faf24b84aa013ffd7199b410bf860904df09ef2fa8da0566bed562d5ab6c6e15a2386bb23c7bc1
-
C:\Users\Admin\AppData\Local\Temp\CabFD53.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\CabFE22.tmpFilesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\Local\Temp\TarFE57.tmpFilesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
memory/2980-0-0x0000000000400000-0x000000000043F000-memory.dmpFilesize
252KB
-
memory/2980-11-0x0000000000400000-0x000000000040F000-memory.dmpFilesize
60KB
-
memory/2980-8-0x0000000000320000-0x0000000000322000-memory.dmpFilesize
8KB
-
memory/2980-4-0x00000000002E0000-0x00000000002FB000-memory.dmpFilesize
108KB
-
memory/2980-2-0x0000000000400000-0x000000000043F000-memory.dmpFilesize
252KB
-
memory/2980-1-0x0000000000435000-0x000000000043A000-memory.dmpFilesize
20KB
-
memory/2980-3-0x0000000000400000-0x000000000043F000-memory.dmpFilesize
252KB