Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
31-05-2024 00:21
Static task
static1
Behavioral task
behavioral1
Sample
856ae68eba7a1eeed2fd32f46a1727a3_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
856ae68eba7a1eeed2fd32f46a1727a3_JaffaCakes118.exe
-
Size
203KB
-
MD5
856ae68eba7a1eeed2fd32f46a1727a3
-
SHA1
aa4f48c21c3b2ace94c89ebdba0023796bec7368
-
SHA256
b74c435944f5820de51e5bb43828b186f54e956144ca5bc41f6685652b8cb16b
-
SHA512
7429052dd0a4b7119afaa1d8f2402edba790bc8fa452b00f6d931ec5492c4bac65c80422f3bd07cc12414fa177486342c2026fedbe3089a49c735456cf7b51fe
-
SSDEEP
3072:9Bji2dQ6v4uPXDNUj4jKBonzmLXlYVRLh0epEEZqkFBc4+uTqN76o:91dp4uPZzGonqXGXh0bluBc4GZ5
Malware Config
Extracted
gozi
-
build
215165
Extracted
gozi
3162
menehleibe.com
liemuteste.com
thulligend.com
-
build
215165
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
Signatures
-
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d01e28a0f0b2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000339e21f058011f49a9a3d7186ffb729f000000000200000000001066000000010000200000004742266378324265b9f26726f97f442f3c0f9c5d2ec8bc958c1b8c2a69314364000000000e8000000002000020000000f4864ab09ae5220bd3d7d4bc7f919f2a469755f75748767221696100246004eb900000000ebb18861e9b3d79df4ffd4e7277c3aed63d519339ea2d6a1b30409815ed7df4786e7018b4f86584646b538cbbb8a5f931677173e03d565e23e6c59c1b0adc1b3bed2b629d57aad8b898924a82cf75aa66c1dfc7b708b6a75747b0e9122b2d3b7c52f0999e66706e87380cc79b4060c74ad77125b0043b192081f7d37087617ecf330394e5ae84b26e321e73295683da40000000d2709c6fc63c06e1492744751fb02b29bfd31e1a46ee8cbf1151f571e0a429416e423443d31f670d0e990c214acf91f29f77f4b352e4914b1d4779b29837eb84 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CB5D5661-1EE3-11EF-82E1-DE62917EBCA6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000339e21f058011f49a9a3d7186ffb729f00000000020000000000106600000001000020000000c1c0c19cdd2822977fcf81b1dcaf085a34b1d09065b75279007591ec60ffefcc000000000e8000000002000020000000bf39c3a6d4f73b7576d10f502ad36eb132f67c022ec6574fd78f1156845ee57f20000000ce69cc5246742ee84b0e1bd01c01ad2dfd08a347e967958c99af0f9927191991400000004536114fab42203c101af512ef99f11f6f84762c4fe5f2904c32c9da7ccda4cb144b285bf8f7b7743dbfabbeae113242db2946b41b32463052e1a009fbab46e8 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2420 iexplore.exe 2420 iexplore.exe 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2420 wrote to memory of 2456 2420 iexplore.exe IEXPLORE.EXE PID 2420 wrote to memory of 2456 2420 iexplore.exe IEXPLORE.EXE PID 2420 wrote to memory of 2456 2420 iexplore.exe IEXPLORE.EXE PID 2420 wrote to memory of 2456 2420 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\856ae68eba7a1eeed2fd32f46a1727a3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\856ae68eba7a1eeed2fd32f46a1727a3_JaffaCakes118.exe"1⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5aaeeae6055ca62735ff77e07ef1b9de4
SHA13236871cce4a49f2d9f6cd603ef649ce349a9f96
SHA2569e15daa93b798ba3cfa12a5c0ac30c78bc6d8c9c38f7cc44c69a41da709f0378
SHA512814a23336307b4cbcdf91494fa7b2bb0b16c1e23835edba5fd15e39c04c4f219147870f23ac2b1ba9583e9d052e02175934e3d6f9697f9232713125b7edf5e1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5c26d655e9038fb1229311f9f46fa8960
SHA12640115738fdc4dd954da996512f4650990f9a11
SHA2566ca944e29a29055fd16fa55c80335f44e35d36f7c3df8f7e722f15ffa6a3544b
SHA5126203a6b2bd04dc178512c70453668036930c240af3b1cd0ba8edb3c83729371e5ea3c49dc67b807f949acd25fa68ceb232d5051a5f5fb4eccf18bcb91d0486c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5e7acacc8adadeed9b88d7f52db8f7a20
SHA1c7310c830c5593209f9b0f137cd25b95e221d1f4
SHA25699c7bbcd63dd972cc697a2283f1ca7e3e7581dca8f6a6e0e962bb1714fd881b0
SHA512a18e0ed236167f1dc075ca596df6e666e3ee8a419737da9e0aaeb8967737478409f05c7b28a783a97d2ccdb9d89b5fb782cde78a92c2a1af1e009daa6a2c7f3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5952407f3444d19a7191318cea8eec381
SHA1106c18786dfbd8958ece18b3a65ba58f42585d77
SHA25635089d78239c6a81c0cea046430a8ff29bc0aa914ccb3aba7efe17168176cbdc
SHA51203d554dff1d54fe911482c54fd3ce6a713ba578dc869eab1fac0bf9aa9feb4dadd829f49efa274b7b0871dff6dc74d5dce3314ab17fdeb35c2887c035ec9ba8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD51b2110c06d31a3251e84c80309067acc
SHA1103fd07923eb4825792ba892488a3f20fcfac805
SHA256726ee2100773fc4c02c91500e4cc0727a7b0c75323dae322bcedb7340298ad50
SHA512100ec39ecfb229a647cd47c19baa8f7d4167d1746f6298bf5b1c5577b12cb9d750c03977e9a913cc04d38925d40c9246f00cb7efb36af530c28b293678481f22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5b5adb721e51eb2613403b82ca7741ec8
SHA1620e0e81a6184ae6e234a3f7b856adadf792c160
SHA256a065a055da0b084109ea2deb99783c5b2b43e75237763d67d1732fd31796da40
SHA512aa2183375f65e3ac916bdd5839fb99bbb3bca692b4417cf7da62da48353dbd7aa3a8c151a6381bc78045468c06524e73949b36f6e30268753c5f88b4e83058aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD55cf3482a189c65f891cfed85962c318c
SHA1ac6048b64b59c1d2341a24494897f7ba249d019c
SHA256d83d05251720829e0a8ecbc21888c37450946a93377232288e8d1ff2af48bb60
SHA512881afd959aa8a959ca15b2c3d0c64b5798181427359a793c47825e1d553015af4871364dff275c3378e7d90f28bc29a2b097d2dd193db2869670b52d3f85929f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5b7689ea8ac4ffaed0e7465f5a8f66709
SHA1494c5e592c194d6a24b74f24f0a09e0fcad0c751
SHA256df4cc6b710a2f9cdabb9a0a790e61b26fab621aa7d6720180f0aa4bb0f80f247
SHA512419b2aecef824cac2adc0cfbff4145149551ed2dd2558f5e567742c86ad576a0987460f710c157c473d8db58d53337868febd292b23f8cb2c4c25af556cc56f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD54b72a9146912322798b5de015158b95f
SHA1442a8fddef6cc670733a2f2acdb55e6a1d8f90ed
SHA256821a7548423121e7ccb20013ced2c65b161ccd3464656ec387d398bfa09044c2
SHA5123936ae4de138e8d4469c8a7df81fe267cf22265e561b78f7643a6f13674ff213631a07c0879ed4532532a8f4cc3923111966e66088c21c451b2cc5abb0a979e6
-
C:\Users\Admin\AppData\Local\Temp\Cab8547.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Tar862B.tmpFilesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
memory/2188-11-0x0000000000400000-0x000000000040F000-memory.dmpFilesize
60KB
-
memory/2188-0-0x0000000000400000-0x000000000043F000-memory.dmpFilesize
252KB
-
memory/2188-4-0x0000000000270000-0x000000000028B000-memory.dmpFilesize
108KB
-
memory/2188-2-0x0000000000435000-0x000000000043A000-memory.dmpFilesize
20KB
-
memory/2188-1-0x0000000000400000-0x000000000043F000-memory.dmpFilesize
252KB
-
memory/2188-3-0x0000000000400000-0x000000000043F000-memory.dmpFilesize
252KB
-
memory/2188-8-0x00000000003E0000-0x00000000003E2000-memory.dmpFilesize
8KB