Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
31-05-2024 18:08
Static task
static1
Behavioral task
behavioral1
Sample
87de92e63762f63c90448f0da5ea1ecb_JaffaCakes118.exe
Resource
win7-20240419-en
General
-
Target
87de92e63762f63c90448f0da5ea1ecb_JaffaCakes118.exe
-
Size
1.7MB
-
MD5
87de92e63762f63c90448f0da5ea1ecb
-
SHA1
9446d4f7e75b3f7d6d09724ef12e37e2f9e88987
-
SHA256
f7d21fe3c530e374a6d4db622a1e36d5b23de2279a087976efc00d33b01e4651
-
SHA512
87850a62f06172e12580377e0c7722d84bc15b019fc78a1b1c59cb6aa54099baa6a1f1102e031db6924b5f7c4a9b51d7a461f47803b30b171bdfe1a1f8f36117
-
SSDEEP
49152:szlXFzryIbDDhPvyXlVzCskIpDRCbKkgmXW1Gd0WQQYStEZ8FLuro:MXFzrNDDhiXlVOskIpDRCbLg8WQ3Qn87
Malware Config
Extracted
gozi
-
build
215165
Extracted
gozi
3155
roevinguef.com
sfernacrif.com
abregeousn.com
-
build
215165
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000002659dcba62038d0162a29d21a587833baf0ffe6cc506dbd2be08910c7165e160000000000e80000000020000200000002bdf0ca560c2f8d60389ccb5979646f9184f51d33537c98d00da08ba52da0d97200000003226b432972a27791bad5c6c798ae09de51d923e19fdff6051a469ecaa61cc3640000000252d4d0c6b23b1511ad9edf3a80447e1e759efd728f143cc685d171d1c52fb31958060b1eaedb9cbce34a050362d87a869f31f75cdfc97f5f259eba50c2cb5ac iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EC853C51-1F78-11EF-B781-461900256DFE} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90bfc4c185b3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2824 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2824 iexplore.exe 2824 iexplore.exe 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2824 wrote to memory of 2752 2824 iexplore.exe IEXPLORE.EXE PID 2824 wrote to memory of 2752 2824 iexplore.exe IEXPLORE.EXE PID 2824 wrote to memory of 2752 2824 iexplore.exe IEXPLORE.EXE PID 2824 wrote to memory of 2752 2824 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\87de92e63762f63c90448f0da5ea1ecb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\87de92e63762f63c90448f0da5ea1ecb_JaffaCakes118.exe"1⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2824 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD55f2af9d453cbe88d0276f9aa95b110d8
SHA1f3a1598b32cf946ec026ed71693017708421ae58
SHA256cc861eff9f227c3c860154e3495e567dc6e6141a38bf7a64d895a24cd686b20a
SHA512a4bd73f3b84cc0a97120fd09b8cf87c4f90a678d5575ecbb2b119f12455592a58e50694e1cb00f9974c82cd99518ad2a98084e8e7025d57fb2fb717341081239
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5a824b0cfc55c45bebedd0b28ce8fe55d
SHA167a61af46f18817e9506378d2586a6f35316e144
SHA2566503fcc6524da4d74611e7d32c0c6ad089011f22bf7947c6700d79c7e1fba86a
SHA5127224890bd9c1024729e52fb97099dc8bf3efb9a1e5fab63799792834ec40852405b531ecfde5f0eaa5e0b304b569e70149b7321845c0a541c8a17a0e3881f310
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5a9912459af90ff2f01aa79ae10589df5
SHA176ca2a473931c3f68c40fc1e65cb3fcfd4b5b630
SHA256334792dae156b9b1c6a3474fcec89f2602a164f74d319ddf3f9bf1e340cd1a08
SHA512788cfe971cc36fdf2318afbadad3443c466172945d80bab14e5baa6c7f7b891e1d3a1915cf7e2f20f0d6619b12dc7992e487822889eef0fc5f60267318767aec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5d6a4788f5dbe20b9b53221e14049f188
SHA18ac1fde26feb0d27fb376005ef0711717c2b364c
SHA256c889f16ae788eeb415996812a05c6c15744ea3448a053198bee2d5f23789e316
SHA5122efed055cb263aef80453de236a1f7cae64f0d05f010052df77a9e89999b558e8b6580776cd6fd5dcbe54a070431488a3f7ce17377a7637a3dbfe83369c466e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD56f810106072f500a1a1d47f657c8ce79
SHA15745a1ed078242917dc73b63647aa040a58c077f
SHA2565e8236ee25dd80be5c8f4303b468dbdb929342d40935d50f338a98b98a3aab01
SHA51235965aaa3051b11e2608f68f8d16eb663ddd2306ea5a6d511449b1eb2a099327e5e263dc624644efe7438ab8d11d1bf53857688bc4d5405922998f35e33d3a13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD512a6275387c7478c4456d204122bd8b8
SHA105fa43835c7b901e1daafa3673d55ae464df774a
SHA2563fbf8ad9950f8bd96f216711ee9f117d6a960592ab17ce8f6944701c9fb04998
SHA5126b8673acefb9f32706703248f4df3cb77b67e7ace9f8fcf080f9fff613f41d490f66fdd54af9e04a273068fef6b164ec7923186d4daefbb9e31d0797501d5d7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5b907e403fb41cb387df4707fbaf3322f
SHA11b37069992c2984cb2634ef1c88d1c2c8644682f
SHA256b474cfa4ae103e04019a1f0dce55e609587fcf1a808bcc82d1b77860aca476f7
SHA5121582de43f8a39ea21f6895faf8da2e27ceae33c731fb82f33b0467c46199cc3a6957655328cd9f8678b1d890911fe9e071fb8e4f60ac12d73bee2fb4828d0de1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD55a162a16a434d9450886507edaf75aed
SHA1bab16e372c261e70ca97beb2c3acb8e1aa8116f8
SHA256a2bd255e207c22011f15482f56130a6a7f13586537780a06305b30c9f73cae12
SHA512ce4a6d390b4b9af549697731b00a442762c5ba02d1411db387cec8ea5044dcefa67e2da6283bd2a54c0078f197cf3c9eff4f3dfa3436dc093caef2b731f8cace
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD572988d647723514334b5532b23d08afb
SHA1fb688ce2efbe40ddd6cac53639d928bafe6a9ff0
SHA256083eaa254095b21a5851c0529d0423827923ced68d8b1c6010eaa0e3cc4358e0
SHA512c1f4fb3ca7e03dfa1afc16681f786db5355ac9e00770aeb944fb60ca30238bc1b0911f6309ebd32ee33a41da5448bf0af93fe4189f5a53c20b9b7e81d45683bc
-
C:\Users\Admin\AppData\Local\Temp\Cab9D7A.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\Cab9DDA.tmpFilesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\Local\Temp\Tar9DEF.tmpFilesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
memory/3028-0-0x0000000000180000-0x000000000033C000-memory.dmpFilesize
1.7MB
-
memory/3028-13-0x0000000000180000-0x000000000018F000-memory.dmpFilesize
60KB
-
memory/3028-8-0x0000000000350000-0x0000000000352000-memory.dmpFilesize
8KB
-
memory/3028-4-0x0000000000150000-0x000000000016B000-memory.dmpFilesize
108KB
-
memory/3028-2-0x0000000000306000-0x000000000030B000-memory.dmpFilesize
20KB
-
memory/3028-3-0x0000000000180000-0x000000000033C000-memory.dmpFilesize
1.7MB
-
memory/3028-1-0x0000000000180000-0x000000000033C000-memory.dmpFilesize
1.7MB