Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30-05-2024 14:11
Static task
static1
Behavioral task
behavioral1
Sample
846c3da855a22a68edbefdab14fee4f0_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
846c3da855a22a68edbefdab14fee4f0_JaffaCakes118.exe
-
Size
203KB
-
MD5
846c3da855a22a68edbefdab14fee4f0
-
SHA1
6d304f315f7f9b8c8c032f8b88d0ac2fc2d35925
-
SHA256
77b4f2852d43e77ddf225771b4ee7733229132ceb8113b494dbe9e851f38b463
-
SHA512
fae07752a6259c1af45cbd38db42a4fba3622752296e30418f5c4bd76cdb3870e14b22bed3edb5c2bbab9f4096ddc008a887d2b498d7ae1e6fcf25aa8e63f524
-
SSDEEP
3072:9aji2dQ6v4uPXDNUj4jKBonzmLXlYVRLh0epEEZqkFBc4+uTqN76o:9kdp4uPZzGonqXGXh0bluBc4GZ5
Malware Config
Extracted
gozi
-
build
215165
Extracted
gozi
3162
menehleibe.com
liemuteste.com
thulligend.com
-
build
215165
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
Signatures
-
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f01948659bb2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{907F9B71-1E8E-11EF-9371-CAFA5A0A62FD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000005f6d6833c815a4eb8f6d39717e2a4650000000002000000000010660000000100002000000062e26d2bf263a5ccbb6f6aa2e58808b4b3f03a2edfc11a40e7f71dd173706ea7000000000e80000000020000200000002390a3717ae68ff4f8896d207b642843709790ca9d72aad6918f9d871939b13e200000000b54d139c3c49667c679862c8f87f1341e114ca67fdceb31eeba6b0853656fe540000000f518d26e67779a38f9ce9bfed683279fbe11bc908b5179925f58a9818110ac597be3615bfcbbf28b009439c829aef41c16eeb8118c8071adb6bed571b26c1898 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000005f6d6833c815a4eb8f6d39717e2a4650000000002000000000010660000000100002000000030eb489f277e446635f89d7fb81f7ee143e36bc34f4c4e4787fde70b9cd2cc0b000000000e8000000002000020000000900e8210493df1b9aa24ca73bf37673e12eadd9d00c88d003fead89160d434c490000000c7dacefe563b0f807d5226236506356494a0a3ad00ce7a328784d8ccb3f92cc00f1b7ab7959cfb9d4d068a4aea44fef845cbea98fe00ed9d035c85da4939373623f22a701e9ce276eda2f3a1b3c16261c0bec3180e8662da61538edcdbebad8f79a7ce12ced823cb53942376ac6c4a4efda763aab3c7823661aad89e65f1d627534270fa4422965bf4c22ed27ba093244000000001473aabe3e7aaaf44f4daa40b1845bd0f8c5992d8ddecae5f86acb6ef215fac270aff3aa2d687f87711f2024bf4dc43725aa0c0126ff7845e58c8dde9c52efd iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2680 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2680 iexplore.exe 2680 iexplore.exe 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2680 wrote to memory of 2388 2680 iexplore.exe IEXPLORE.EXE PID 2680 wrote to memory of 2388 2680 iexplore.exe IEXPLORE.EXE PID 2680 wrote to memory of 2388 2680 iexplore.exe IEXPLORE.EXE PID 2680 wrote to memory of 2388 2680 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\846c3da855a22a68edbefdab14fee4f0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\846c3da855a22a68edbefdab14fee4f0_JaffaCakes118.exe"1⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2680 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5d3f780a5596bc9d1a742d38231b09ac6
SHA149f84423456f4139577a4b18521f2a8e41e1bbb7
SHA256043fbe01ad8ecd9fae5960e51904baadf38c96f6a8c9c651a5aadb859121711f
SHA51225623000c68b0b0fc477acb95fe3f82f4395237fcb3891331cedd2b78bd53785c5cd18d5243b5a5ebd8085675788b1156a5202bb243c8698376118e4b953b80d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD56b2a4d9796d5c1c192c80cf055583cf5
SHA1a6e00511ec9ccd829698280083982b16e764a04c
SHA256c68bdbef113607de14b07fd27373c6625c1498fc55df603a3792a2e6b2b2f966
SHA5125e8693a72afa1549a7d1e49efb0834562d84e57a4a9c54f449821e132c9de4ffb38cc20a334cb04c88f8decb3365591ea55b9bf22f255a0e2ad4f08254a329e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5d2639c72858ec32ca8bcdad4ad7769b1
SHA1947e3449f0ac18b09c67b43f33116ee5d8646108
SHA2562099bedf98b1c378fd8b058bc65079154ba05aba1cfc2076ed14240bad2dfca6
SHA51299bd0f86aed244e7988fe9472f4a1c1fbaccccb2bd200feec0ceb3cd927de5a63e18309c841d576eb6528ac3e6a5aa88d07c662b651cee3f967e5578fc6a295a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD55e9867e63d0dfbe91b524c6e268134be
SHA132f4c37519d4aa48c2fc5230337af5eb1145d1cb
SHA256b2a1da28cae7618bfd2d4015231333c8f57f61d86296e96a3fb34cbaebc2179c
SHA5122aeaa04d570bc5dc3283b81b04833d7438fd827bcf84089e0326e92041e0cfa4078ce4452b553fda4075f4b07eb9e1456af26f653d560684e35f563d8acac4d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5cd09351e49b510ea43980e5e49da936e
SHA1b287cf383c4dc809a885b14bb1146f40d28ca10f
SHA2560f19d71e15b41a3ec4616aa263155b68a512c5df9cb8da5318d7591ee55d1d56
SHA51245684b338891a15def892529bca3e7b7a79a4d65b1731246defc6117b630e41f2774ba8d32c6c4ff40d08ed8eb59cfc39086c26f3ab8b549a7fd863917d51377
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD56495e97bd2850a6d5368e2434a34ad58
SHA1f27bce408bf2d9a630eb3d3df31901365eff5639
SHA2569440a0475a18c1990637540d6471cb5a5b1ef5de8b596e1b464e2db2dfdc6544
SHA512e52e6cdc0f09fbcaa7bc7fe11e4656b0ef10aa2f76e02a9f74375dccb1f45ec865cf5916470892dcafc0b5d1588cb384ca73f87dca6b72dc253a34c05b37e81e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD524be139cffd15324004dc2941620fd82
SHA17cfeb5cf90747ef952020c4de28e2606f08fbd9a
SHA2565bf59d76142e8ec60c540ebab4aead4e4e4e31006e326aef8b2eae9be37e6a40
SHA512a28770b3f0291481abcceb9d5ab30cb07d62b9d7eb107e5eb395760fae9a0ee9bc8b27569e9f7058971b22a1056917f50bf199fbb59936f47811e48019da3f17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD507ebe58abd0a8debdb82be3e7cac9d44
SHA1a3d360be89dc91033c3fd2d456dc567d393d8963
SHA2567108a295147e209d4c74d344417efb2bd376ca3d8d07081b39d74b9c7e0795dc
SHA512e492414c9d1baf482c6ee424be663712d1549c8a34777304794289dbc2ea48abdac697e9877e243e498be8b3bb92f544c2f27d55fac1feb51a67698067fc89f1
-
C:\Users\Admin\AppData\Local\Temp\Cab8D33.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Tar8D46.tmpFilesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
C:\Users\Admin\AppData\Local\Temp\Tar8E36.tmpFilesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
memory/1460-0-0x0000000000400000-0x000000000043F000-memory.dmpFilesize
252KB
-
memory/1460-11-0x0000000000400000-0x000000000040F000-memory.dmpFilesize
60KB
-
memory/1460-8-0x0000000000440000-0x0000000000442000-memory.dmpFilesize
8KB
-
memory/1460-4-0x0000000000270000-0x000000000028B000-memory.dmpFilesize
108KB
-
memory/1460-3-0x0000000000400000-0x000000000043F000-memory.dmpFilesize
252KB
-
memory/1460-2-0x0000000000435000-0x000000000043A000-memory.dmpFilesize
20KB
-
memory/1460-1-0x0000000000400000-0x000000000043F000-memory.dmpFilesize
252KB