Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    30-05-2024 14:27

General

  • Target

    8478e7fe58477cd1cca7fe12034de589_JaffaCakes118.exe

  • Size

    203KB

  • MD5

    8478e7fe58477cd1cca7fe12034de589

  • SHA1

    c9f16ea092b69a95e2851b5a6c32661e95fa67f3

  • SHA256

    63976172037b9392781c2760c050cb02db6003d0746be591d8cc2f0eac2b5d31

  • SHA512

    fcd48ffb4af0f091172d518a56b8b6c2a25db485ef39afe4ee2d657037dd8862e18a21480c82033981d6914fc67353ba7d483932c412f1201e02627f6dd9a321

  • SSDEEP

    3072:96ji2dQ6v4uPXDNUj4jKBonzmLXlYVRLh0epEEZqkFBc4+uTqN76o:9Edp4uPZzGonqXGXh0bluBc4GZ5

Malware Config

Extracted

Family

gozi

Attributes
  • build

    215165

Extracted

Family

gozi

Botnet

3162

C2

menehleibe.com

liemuteste.com

thulligend.com

Attributes
  • build

    215165

  • dga_base_url

    constitution.org/usdeclar.txt

  • dga_crc

    0x4eb7d2ca

  • dga_season

    10

  • dga_tlds

    com

    ru

    org

  • exe_type

    loader

  • server_id

    12

rsa_pubkey.plain
serpent.plain

Signatures

  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8478e7fe58477cd1cca7fe12034de589_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8478e7fe58477cd1cca7fe12034de589_JaffaCakes118.exe"
    1⤵
      PID:2012
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2556
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2556 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2544

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      8fd68fa8d26781cee355f40a2680a4dd

      SHA1

      70922d1f9e219a9a7560ba8b10a69a89692c215a

      SHA256

      122280d86b79f4a386cf06d9e20f2cb3352668a00ac0a18c9bf06a86ccb396bf

      SHA512

      23ac99a9ae3ba69ef3cec0c76ac3cff88256cab5f7be7d725f7dc703d42e4e23094083c02bade3ed0d0dcc1ec9d7971ff639243e831d95d6d062c4ef9350611c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      91d12af2d5f30b2d649fb0586b1b84b4

      SHA1

      8efbf19597a76b1f3a3dc60f87e10971aac3a116

      SHA256

      5b53449a59fe7151210f2325f0664551dd7023128c0cbae90e3f8c44ff46b312

      SHA512

      4b293760920f86de1c4325e32bdcf90ed38237716399bfa5ad6619d4b8c0475c8e16c789454ee1efb829d4628f157f42398e2685f3e29414838d52c9fbbd8488

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      c1194b97454a3b3b826a4ae4ef44ad46

      SHA1

      2cd56dd8a274d39232ebf5bfd852a422c8f3cd6a

      SHA256

      49ffa4722e0f3954a98e45986a7b4eba2371007427c9d802ac372a50943d8c3c

      SHA512

      e3110aaecfa1471e1e966fa61574e01468e816cea3fbaab4c63facfa7ecf7537ecd80b68e96e369e018afd3e8c0c509dc7559b8ade3ab04b40c17252e72566e5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      29179ed283759360096bbb07a6c4a957

      SHA1

      933205858ee0dd69e39790514255c57b6156cf48

      SHA256

      c7689187ecde8230b6b4ca37406755b273cbdd42d1e75e7643786019084dff03

      SHA512

      1f680639ef437af23d7a7e7f24f97e5a9b3eedcf57366db985ff322ba8814b056291d6ea5195284e457fcfe69de03871645ccfc70a6e354f346edb1eacee855e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      649d6c18f949b22fab57275084d5edcd

      SHA1

      67afa61f7ea4a68ee4d4b7634dc09c38b3a2bb31

      SHA256

      792adbc1e5dcc0b3aee763855e8fc7ec50fe8449268cd2d00cec289a1dcfb5e7

      SHA512

      c3a40f2ceecacc30f7ec3dd6fdcd1faa953a866410d131e6f38078621b150dee80c105c77cafdce88ac2cfca569a892f5c48260588105798e17f7690216242e8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      763c3a2bc746879383a7d454527ea838

      SHA1

      631550f1b462fecd8fe0fdfdae96ae574c7560a8

      SHA256

      460079bf3595f9a340b57201e2a6f0bf57e13ab9f8736ed42cb858bc62e2c8fa

      SHA512

      eaa2d743c113af8995170aa1ed0465425df83ba9ff1e41029b3f0f2018309db2b03e94b52fbd644bcddc1ab31d6aa70d6844ee0635cbbdf2e9339e1d0fe8b373

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      560422c79ddbe60936ee6f1c353e13af

      SHA1

      fe32b7eb6ee7d3d58d5527f77be8db31d814c0c3

      SHA256

      c71db12d52a54b60ca161a6039d658bebbf79b1b1e7310ae28e479effb960e6f

      SHA512

      d0513619ca39bf5c57aa47d8bba18829182cfa5817edfc69e5004dbbe6427d09d479731aec455256375c6346b400d8a2b1c0ea6cca836aee9498d72520dea22c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      697f931535126abf82b5d1add572932a

      SHA1

      0830b62056cb42ad5ec475c2db4f11a0df21b023

      SHA256

      a76f27d962faf8f5b341128179bff9e179d960317feb8c57ad6a72b887bffef1

      SHA512

      6670bd4d4770ff61e538cf9c107495d5e4b72ab755761edfbda30a06ff3bc4883170dcd1d9d9db0648685593ed93a0182f8be822ee25e42acb7952d89fdc5733

    • C:\Users\Admin\AppData\Local\Temp\Cab894F.tmp
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\Local\Temp\Cab89ED.tmp
      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar8A01.tmp
      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • memory/2012-0-0x0000000000400000-0x000000000043F000-memory.dmp
      Filesize

      252KB

    • memory/2012-11-0x0000000000400000-0x000000000040F000-memory.dmp
      Filesize

      60KB

    • memory/2012-8-0x00000000002B0000-0x00000000002B2000-memory.dmp
      Filesize

      8KB

    • memory/2012-4-0x0000000000280000-0x000000000029B000-memory.dmp
      Filesize

      108KB

    • memory/2012-2-0x0000000000435000-0x000000000043A000-memory.dmp
      Filesize

      20KB

    • memory/2012-3-0x0000000000400000-0x000000000043F000-memory.dmp
      Filesize

      252KB

    • memory/2012-1-0x0000000000400000-0x000000000043F000-memory.dmp
      Filesize

      252KB