Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
31-05-2024 10:59
Static task
static1
Behavioral task
behavioral1
Sample
86c3cdfe9de317a5cb77ff378de4312a_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
86c3cdfe9de317a5cb77ff378de4312a_JaffaCakes118.exe
-
Size
203KB
-
MD5
86c3cdfe9de317a5cb77ff378de4312a
-
SHA1
4095d6167b43ab660101346b067e46fff728f45f
-
SHA256
649ad032ec2dbe0ce2eec2de332e5a555e02bdf08607e58663af21722eb00919
-
SHA512
5963c0f901e61367116086d4ee91c2fcbb85c934750e676760bd715260d5e11f9478a4c6ded9f1be59dbd2c06d7e748bec3b1ec12c2a205da42ec2590ff4b37d
-
SSDEEP
3072:9bji2dQ6v4uPXDNUj4jKBonzmLXlYVRLh0epEEZqkFBc4+uTqN76o:9vdp4uPZzGonqXGXh0bluBc4GZ5
Malware Config
Extracted
gozi
-
build
215165
Extracted
gozi
3162
menehleibe.com
liemuteste.com
thulligend.com
-
build
215165
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f079c7b349b3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DE8A67B1-1F3C-11EF-9F3E-D2EFD46A7D0E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d4663bca5dd46342a08177da9a75b5c20000000002000000000010660000000100002000000055ec310e194e6b5275be5d51ab6f54a6c50787282fdeb3310ab77df75282bb75000000000e8000000002000020000000e2f1f0204187a9a6c733b02dc17e6150e4cb32cb0905a7549b25e6bfb1aa6e8020000000f142584c6efa5fb619c7434ebfa80ea8fbbf658a245003b6e62cc11ebf634c7340000000404599a0371ebdb7490a5140e5cd0531a3cef028bb860121248185b8bd337df8e272d790869548d145f1523b0d3182f9c6e2baf46e3f69a50c4fe8f992bbaecc iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2660 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2660 iexplore.exe 2660 iexplore.exe 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2660 wrote to memory of 2060 2660 iexplore.exe IEXPLORE.EXE PID 2660 wrote to memory of 2060 2660 iexplore.exe IEXPLORE.EXE PID 2660 wrote to memory of 2060 2660 iexplore.exe IEXPLORE.EXE PID 2660 wrote to memory of 2060 2660 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\86c3cdfe9de317a5cb77ff378de4312a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\86c3cdfe9de317a5cb77ff378de4312a_JaffaCakes118.exe"1⤵PID:1688
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2660 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58be22d9b44318b7da53f3f5cba3b994c
SHA1308003714c07f46b102c160649437b769fcabdbb
SHA256bca991ab1f2e7b43e99b91284b6db65fb43565d61f7797c4768d1a5e2a471e13
SHA5126d07925b7180fe81c65f25bd91a4b981f5336924c9314944ea0f001edf057290943731022d558cd5287d4091236528dbd60fa585d3ea877ad783e7a99c907fea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de4abfe39a52067e136002391bbb2dbf
SHA116e615862de9604364164f4057f6585095215938
SHA256d1d35b26e39a8bc817ea78257186ab56fe405233293585e86dc6f5247fc50c25
SHA5127b1cd5d6053f073529ebac0bbaf36832ca7ef427f35350310dcaca6d6f2b00560069e207da80d81aa99d82100c597db1bbb5b2660da0855d1afd6231e3ae061c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c192ff5cbd9fdbeca76968d6464a6ad
SHA1a55932ba5e82dcbf7d7e9c5d30533a3fa807cc6c
SHA256b68bf7f320021db30df2c79c21c8fa737af46d855b042d0a115212f5cd1d5a38
SHA512769452fd0a5590f6594de2139c613af2d579d8cae35d85f66abc4f70b3b18285055e1037626de0619fa1bd0e56d29a7300f85b9f055103196e9fc6a7486b56ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5fb0a16f1d4f5a4f92a4a46a6385da1
SHA1e24efdf87342024f0e7cc494928b3de692a1ca14
SHA2566f521a57f171196bd5f27bf729749f187b2e13d15ef732479af338f5c3fb6d52
SHA512d70a1b692e56aa5c029c51525986546b9e23511295e10515182ef9a3f534b2b618f5418c1f79768036a36b2060e857fb7ebd2e5a00930629f3b95a8f6d8bb4dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f50ea3d79211a0643e9def90ebaa1d4
SHA1e3c2622e7a6817bd94402c8974999d250f90fc4e
SHA2567df777cce4cb73a1f1bd1941cb107c6abece77d135982ddbd228b8d6e35122bb
SHA51262ee897b73f0988623e048ad2e6ae5ee5a5dac71a3bcaf4ba23a690773632cce4399e3aa5d33c68f97e6dc081448a3cd63cee2e4aa0f885b9906a2aefaa58ffe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c60305723b1af84866a9439a16eec74
SHA18f4155ed591a04e585860a2e5b63ef089ad06d7a
SHA2566cd5b39f272e360b5c45dc2b060fb7f6c08b73dad6356e0cd62f8247b8860b7d
SHA5120112becdbe463430f6af7ea8c49afdaca7c0586fe3d0f9b9ba4c6003c916ce0d210c50fea033f46ab03f7d7295fdeca2207182e46397728634538d25e792430d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e48551facca1c69ea6b44a3d06feacb
SHA1712bb32ce6b6ffd2679198d610b2cb97b0d2677a
SHA2569a36cb2bb9fe07b503be96280f57b5934019a73c47679c3fd54615bfe81d959e
SHA512f2e23efbce4a72eb47ac5911928b80dd4f8cb6d0e8e047059dcb81202ed460ad4c66229838941eb2249a5cb9e11f9d3143b00e35f47930887b34cf633029e58f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab0e3b892d46b5b3a0060447358967b3
SHA10572412d8d529c5d4cb7a59cffed83d89bcb6e3c
SHA2565bce213a81644421f90f9fe4feb425bee57adea7646c83aecd7b611527e98369
SHA5129814c1f48ccc005985b14be594e64087f59620337758b8ccd7a8c7c89a4f72fc31ade64f314b35b42468ee8589d32ac74a0843a8f0b231e862bbceda873cf912
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c9b85333d1894e0effbcf7e7cec37ff
SHA193c2daea5bf070349d291bdfa833769fa8d3333e
SHA25628894ac5762dd1e9b08bfb93722f0af7d14cc85abc5d07dac8315628d05e002e
SHA51275dc3a9dead14889300929c8b39528204608e3c521211272222d59d8260baee18ae159e100df05e74ac0141d9027dd045b48e6f13a2b710600abe80cf4eda504
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b