Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01-06-2024 11:58
Static task
static1
Behavioral task
behavioral1
Sample
8a68dd8eb11a12832249d08e81a7a3ab_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
8a68dd8eb11a12832249d08e81a7a3ab_JaffaCakes118.exe
-
Size
203KB
-
MD5
8a68dd8eb11a12832249d08e81a7a3ab
-
SHA1
9e9b06d53307c11396d153eae326cd57712ec837
-
SHA256
91c2c546949c57936f7b4f668d0fea27cb14813a2fbd6b8df4a028f389ea20e3
-
SHA512
941161b79299d0146e92d8bd4c0a99f993262f9a931e7844a40110be0cd6d80067f94908305f00bdf52409693e445ee48ec85f7745d532c1c17c925b179e6117
-
SSDEEP
3072:9Sji2dQ6v4uPXDNUj4jKBonzmLXlYVRLh0epEEZqkFBc4+uTqN76o:9cdp4uPZzGonqXGXh0bluBc4GZ5
Malware Config
Extracted
gozi
-
build
215165
Extracted
gozi
3162
menehleibe.com
liemuteste.com
thulligend.com
-
build
215165
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000d7bb5f51f16f748094c39d0d461bd728ca3267a1b4017cc69c9ff8517359c317000000000e8000000002000020000000a5b5dbdd629df1af81454a47675e990dfc57a3fef544b317722b1715d556ff3e200000005eb8a6ead51e3ec82ff260cd0acd326ba78077a84c9205fcabc68c3cfdea8b8240000000f6b6841870e253ec43d3c146aaf322e3da3acae042fc61dce40a729df85351e7390c8d0dd3a3aa8ed52f83976456de42d65b372c05359422adc1bd5eb2dd57f1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{50559E11-200E-11EF-91D8-D6B84878A518} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80cc0f251bb4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2736 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2736 iexplore.exe 2736 iexplore.exe 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2736 wrote to memory of 2844 2736 iexplore.exe IEXPLORE.EXE PID 2736 wrote to memory of 2844 2736 iexplore.exe IEXPLORE.EXE PID 2736 wrote to memory of 2844 2736 iexplore.exe IEXPLORE.EXE PID 2736 wrote to memory of 2844 2736 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a68dd8eb11a12832249d08e81a7a3ab_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8a68dd8eb11a12832249d08e81a7a3ab_JaffaCakes118.exe"1⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2736 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5d66cc632cfd7a428d1a2e3dcfdf9b0df
SHA1159929a731a7697c3c8b26c3a5d70dd72a9355c1
SHA256f9229e8b4736874525fde81156f7f57d353b3ab3f8b9f095bd00bcff70ec06bf
SHA5124534432e88dfe9c5cf6001be63dc59e8b7ccbbe9c042a7aa384cc10e339a8d7bdfac446a53638bf6e4f41dbed1612ab9642d44acced2032dee7397789bd00d76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD56308a1b206fbc24d54a4012d69c75c66
SHA13dc2ab43f14e2463dacb2985428d9f00c184e72a
SHA25619d57fb29ec30526a78f78c603eb43256ad0224ffaad8d39ccebcb636c7f2312
SHA512ec81acae266ce705cf0ba158c054d5ef16a92ac28f061d2538f51ef67d92a3a0537e821fa84b777bd48b966ad37b9c9498e84a5ff289576e2c1458f00765f5d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD51280dfd16a3f387b419a8af23e201ff7
SHA16f51a91784279d6ad2a298b359fa80ec23bb9e5e
SHA2569d5322900b5e3c9db58cef2cbe5223001f2c80d133bf3b7be511e3f26188a724
SHA51286e7b9721686408e8c975476d16830232af86fc55db24db15ae16070f4e3f2bf2f09fc7a9470f7901b5c68eb2aa6dad8c354fe5c4d1ee4e45bf8858e6d1ad977
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD577cb32ce9b0d10c89c7419c40df65a98
SHA1beb65487e35737fd2e70ec9319ba9a4336203c77
SHA25659501faf1678d9d33689ff784ddcc15daf08980e0b9911e0d762ad11e42edfa7
SHA512ac47753d4a1071665d2f06241aff5ba8cf1789c30f252902aa1feef68106caf87d1089142739377f38eb97485ad3338c446fae15270946c6313e03a86b5da543
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5c3d40aaed87b2d209d74800f77de61d2
SHA11753531f34cc562625e82d934eaccaad09187735
SHA256b6630ccad0dcaaebe6dec6a49ee333c7bb50b7321ed793d2c7338c7a85d7b3b1
SHA5129ad25abf84e1720327f52f105f368185306b1d32dcd85fca475e36b6390dc88afc0b9005524d09c8fd2325816c44786cb2eb5d7b5bf4c99320e8dddf3e471b7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD54d89142c3827039b03a3adf1b2992c83
SHA1ca801264a0f275332efaada069f2ee9cd3cfcffa
SHA256df880ad31ad6ad0620aeb8ff491aa4b45017845efa612be957ff5ce1fecabc87
SHA51213fe848c7cba7c35a5c4702b4852843e70af8d909ab4439c0253cf7b89b4d0471080f8add86b405e18f0ba12be0388e73ebc90701016c87a40de328b5c41de86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD51a6ba2a2173057b2d458fffb5a00628e
SHA185425694a75815a87af5bc59f61e7af5a52f07ff
SHA256d53af549686adbccbed65c8a0c6f0719569873dde0630c647cceb5bce0c20893
SHA51213d537721046f18597e4d5cf5e914022a0b60e4ef49ed50ba81a17081afe1ad4c63edf097d3e3875232175675da4f2274e3cb8af4e049e67b74b19f5edfe33cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5b1daa1a19eaf176238be6a88241ab11c
SHA128f97ed73e9265d66c624790ae836e5da5193306
SHA2567a208d069f5226215356a8eeccd88d19e3850f0ff9d8dccb8cc508749f09503d
SHA512e7d3f918c87386001fe61390b664412cf297dc5e2749b8f246992f055f2455d7b763160b09a61ebf6ae20437bb9e61d66c7eb3419a4af1efe2a0837456484ac3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD54f2c2ba0ccb180fa4af3d384224b101a
SHA158bed6654947dcde3e96255d7bc0f19b580f4cf2
SHA256ccff62edbe342a54829015a5bbdeb77a353771ecc70b787a03514dbcb1d2e64d
SHA51240a4630e1af626ce3ad167a6ee07a7c7c24fe82ae2230d9064ffc19de07e29834cb7a1c84311f73d1148e36e3ae507c818074ee837c20a41e421fe6d9dc390f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD52ade6fe6e40a3bb652ecb821b68f4eeb
SHA15aca4509f2a423c1edaab6d991d1a2b2299ad9a5
SHA2566a0c68d68a7411357c2707b7c87ab8d213bda3432bacd23da987db3baec7d614
SHA5124fda570c6a08971f4b3fd9bf2ca1dc327293cd08644183582ad4a104fd0811f5235a7f71a35155fc0100029fc0fbc1baf30bd1bbfe1611b365c91890f55d2b10
-
C:\Users\Admin\AppData\Local\Temp\Tar8A28.tmpFilesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
memory/1716-2-0x0000000000400000-0x000000000043F000-memory.dmpFilesize
252KB
-
memory/1716-18-0x0000000000400000-0x000000000040F000-memory.dmpFilesize
60KB
-
memory/1716-19-0x0000000000435000-0x000000000043A000-memory.dmpFilesize
20KB
-
memory/1716-8-0x00000000002F0000-0x00000000002F2000-memory.dmpFilesize
8KB
-
memory/1716-4-0x0000000000280000-0x000000000029B000-memory.dmpFilesize
108KB
-
memory/1716-0-0x0000000000400000-0x000000000043F000-memory.dmpFilesize
252KB
-
memory/1716-3-0x0000000000400000-0x000000000043F000-memory.dmpFilesize
252KB
-
memory/1716-1-0x0000000000435000-0x000000000043A000-memory.dmpFilesize
20KB