Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
31-05-2024 21:06
Static task
static1
Behavioral task
behavioral1
Sample
885a4074884e031d30031f0e1a534bc1_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
885a4074884e031d30031f0e1a534bc1_JaffaCakes118.exe
-
Size
203KB
-
MD5
885a4074884e031d30031f0e1a534bc1
-
SHA1
ced39fa3e807c59bace51cccc3a1bb2309ad2b1d
-
SHA256
90cd18e755fb9b71edc7f08c4ae390dad7af8c8d765c242746f1aac6a4da6287
-
SHA512
04d920e59b74b5efe1999c207ed06791bdac79ff56fdb4269f1b380fef25cbd58487b48af17d480d7d4cab527fa163318101a6b1b25ab3333ba5fd404bcebe96
-
SSDEEP
3072:9/ji2dQ6v4uPXDNUj4jKBonzmLXlYVRLh0epEEZqkFBc4+uTqN76o:9Ddp4uPZzGonqXGXh0bluBc4GZ5
Malware Config
Extracted
gozi
-
build
215165
Extracted
gozi
3162
menehleibe.com
liemuteste.com
thulligend.com
-
build
215165
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000d308ab4fee2cdf4742edce335f9e5a65ca2e8e803cac3ceb545f9d588f154cb1000000000e800000000200002000000026dc1530991ed978fe8e28257c8f93077ea9d0920c78025dfd5f5d8665d0f88e200000006abeb5ceabd0f5691e9c6f97f4479bc85231441ba773371a1ddd305c22e6dbf64000000019ac2ec547d6988800939ff9ad2239e6d7b4311283cb1a4a1edc5bcd13bebcfd9d3adef65adeb2c61cde770ff813bc802e5c7a73af41308c13f71988c4d0ee37 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C7008DE1-1F91-11EF-B02E-F637117826CF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80b4ba9b9eb3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2632 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2632 iexplore.exe 2632 iexplore.exe 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2632 wrote to memory of 2212 2632 iexplore.exe IEXPLORE.EXE PID 2632 wrote to memory of 2212 2632 iexplore.exe IEXPLORE.EXE PID 2632 wrote to memory of 2212 2632 iexplore.exe IEXPLORE.EXE PID 2632 wrote to memory of 2212 2632 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\885a4074884e031d30031f0e1a534bc1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\885a4074884e031d30031f0e1a534bc1_JaffaCakes118.exe"1⤵PID:3016
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2632 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2b148b58661e9c64768e89601b178ba
SHA1e7cf82ec396f104866844a04878ab0ac3c034ca6
SHA25616c8a7e59d7481b82f80f96ebcc58501c61f69fb31f9b4eaeba611d9e717b58c
SHA51233a4dda6d0bc4d74b6f7cff8b9fb777af047615aa9f232fdd6f48efe5eb3bba30409a5b16f8ef5c4a756f697aced9e29ab2521bcc3b08412078694d95367a9f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a5c5871d08d4646c671d1fc28d832e9
SHA16939ef587b97baadf688165d9e843f0dcc6cba37
SHA25652e52596562044d1f7b14a713017a0971f0c99033072f502ae348b6b0ea31a8f
SHA5126b4dcacd7de8c33198bb252a20a0c9a8c8faf6a485b1551e3752c7f8e3b21c76f8aff19a4db3c8653a4ce04be672921dc9d1e0d55132e263a2e7414add6760d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585a8cb672573c6d6cd917bf8cd337044
SHA10eba5d52fff8585336bef0972fc7b6d5bfd8834a
SHA25603ff921b431c442bd3e2530f8b124f77a5a566d461b4f7ae00d7a9c072e70749
SHA512fc5a1685e387b710547540076bf61faf835e36aa072ed4b082393f1f2157eb8210969cf41b194458638e8e82855cea54b2553413c49eb04157c1f71fa724c3c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc38c98471e0cd9d7ead703b4f2b3ce2
SHA110de0e28c762806171044d2137b05468acd56436
SHA256fcf289bb50a8c936c753eaee5f91b4e5373833054cbec1c21b2fd0dd583ed8d6
SHA512fbbacc1e9844a0eb80bb55005405d5891994e34b0f59eae91d4a46d8123ce8e7677a83c05cb4cfc6e72585198dd769654ece924c8ff1c71f0ba66dc454a149c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58df92bd4b9ca399bc71b16afa3d4157c
SHA10083334c6f3178edaf378eb23822ee846c845c81
SHA25624a7d23dd1001f2a4ec11a909cc669b9ab68739109c64723bbb7e1a805651bca
SHA512a86224317d23b2a2c808a576ba892646acb157ac1fb550e55d86908d193ca31660b0f40c832e1f64b0461d065818ee02b73df3858069a53c8c5faaaf279afd1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bed4e313c89ed66a89808808feb650fe
SHA14952815fca3a211229be228225e0cff2d6f9a5d8
SHA2560c0c024515f88fa73669573bf459ddaac03618835fe8fd4fa6fb67c3cd13b237
SHA5126b8e394038ceb91b0965c97cc368a89168a54d7ce03de5358fbaf67146a3a9fedd7977c1228a3987a06cc200ca91758fb39929b793522b3c7eea6865e36baa39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b9c65ef62106f99812a5c8cefbb35e3
SHA10cec2cc195afe80fbf89311fa21544fa80e3be84
SHA256fa18415f68572fc9a25fdae301808f640ba611ead3d2b9939d0d184a1ac7de95
SHA51252980f1725b7f4b6b1b5c1a0e8755b2386f7bfb3f6e568e54036b6a2c176b0039018e0f653742baa4079835451b0f05cbcaa9d8c7bf0273be6dbafd3d5a02811
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2c44e2f9ec3544deecdfe74a5d51406
SHA13237cfd17e735fa78dd12fa823991cd16c05e8e0
SHA25648800e6a82436d2040b1864dfd204017a874608b326d63ccead861ff84714ad0
SHA512f8322aeb37f1f0314f969c88faeab69330b21bee434139dd069064f59e6c19f63a3b501810f65ffeeb057a0ee66ca026b6bc566f7be4be4093625369bb34595f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5922912848094fefa09b06374437cef65
SHA12d8380acce3a8a993e005d4992f854bb9fddf42d
SHA2563cdfcb5eedeb611dfb6ac73202205a0a3bb00d8dbbb4144725150b569eff538a
SHA512ee9a1f34ca34449bc0c43650e95ca416c0634f6fecb32b18ecacf41b5757c6714e24e192eac47bb2f81883f114880fb9f648f4f7aefaf5fdac3b8e12a9af19cb
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b