Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01-06-2024 19:01
Static task
static1
Behavioral task
behavioral1
Sample
8b72e36dea293047dee3ab9374a8973d_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
8b72e36dea293047dee3ab9374a8973d_JaffaCakes118.exe
-
Size
269KB
-
MD5
8b72e36dea293047dee3ab9374a8973d
-
SHA1
4441a6a7fe6f386427b0d5836d624de348028da6
-
SHA256
1222cd81b54edc2295d094e40971acb8be0a01d0b7aa80bdde88182b8625b253
-
SHA512
6f6fd1ae1a3e728b65a9624ca978e3620850084a9eb4aba1021ea251d2187095ba32776072ddf5a1717267d59bfbe4f2e7982f608a6a9a68fec219916f2b8a9d
-
SSDEEP
6144:EVfmmDgASD5W/adCxsT4/YFqBcIsBGOhN/35:EVfjDmtW/adCC4/UIsBhN/5
Malware Config
Extracted
gozi
-
build
215165
Extracted
gozi
3151
zardinglog.com
sycingshbo.com
imminesenc.com
-
build
215165
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0a3ae4956b4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{749C71F1-2049-11EF-B27B-DA219DA76A91} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000008d7084d9134f227688a2bb4bc42f86c5be4bac441e451659efd8965a581ff1c1000000000e8000000002000020000000d1b66dfb01b48ddc805d956cc68f5f4f6ebab957aa55dab43d591dd4f86faee2200000009db8e2ad001759f93f03b94e29ec791682e53116be41ee578403f31fb7114e4040000000be994fd639c63ef203b2b5a3ec1b399d6531a34888e5dfbe9686035e317fd1ae2b4fbd4beead466e17a92fdeb7605412feb1f91a7581540aeee535287946c481 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2604 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2604 iexplore.exe 2604 iexplore.exe 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2604 wrote to memory of 2480 2604 iexplore.exe IEXPLORE.EXE PID 2604 wrote to memory of 2480 2604 iexplore.exe IEXPLORE.EXE PID 2604 wrote to memory of 2480 2604 iexplore.exe IEXPLORE.EXE PID 2604 wrote to memory of 2480 2604 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b72e36dea293047dee3ab9374a8973d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8b72e36dea293047dee3ab9374a8973d_JaffaCakes118.exe"1⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2604 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD563a09dd81ec9a80781346fe8b2c2b1c4
SHA11979ba47ce48cdb02e4df72a0122068afefbe4ea
SHA256d22074871a3dd9b968fb7d9ce57e91e9179f2a554f6edcd261f92b7ef03bd050
SHA51269be792bbd947093c4fd8b351b6ba1cbca22c81cd8a0a2452a0e72d28843d0bca8f4112ccb02abd8d2d5d342e7fcde2461cd6272504a9ae39a6cceb93e813be5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD55b6055ed406347a33acfe4a4475cd75b
SHA117d7ec3c6d5837880ffb1e7817ecb27d0c3a2804
SHA256957443df236e9db33bc821100939682c2f3863152d33c1d17747e7663d030e53
SHA512fbea5c76e561d7d42c8bda2251854b3a05cb8b50833e10ea4897871171e00c489f88a944829afc14a7c058db60f665131e1de12a924c1ee1fdafc918e57f2031
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5d7ea6e4f15e4fd0dae27895552bb5acf
SHA1aff75effa5ac931dee93734b9702aed08d31a6a2
SHA256cd1c6c30a18ef0fa0dd966527b613c9d447148b4ce35b5239eb764f7baa9e5e5
SHA512087a59d6e18022c51efc2bb14d9dd85a308436e1620ecc5508bc80d037e921162635a938a304b3f7f37556c84d8edbdb38a1d6043f97d284c3216c2dbd544841
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5a6c7b717a31f576cd0fb5829251a2586
SHA1ada1067bbbc9d6aedfab94ffeac6ca439cbbabc1
SHA256f0a9f2106d57ef8969918df4b355d6e6f364e34aeba499e4ebd97902871aac01
SHA512d26273470812a7b9403a80d364c88ed45830b87721c0bad3611158d0424e132feb25b07e68a1616b5a316032a819c41e4f203bd374b27022f130ca20ca971a41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD51820bb8139ab69d050f09163e7eadb8e
SHA1aa1d70ce929059dfe759ce69c152f4018f315b38
SHA256ba35ba898375d65c5a55c56d00af71bf54cc8607aa74577a53012bcd94efa143
SHA512250fdccaac5d45c84eaa0f9043d3353412528a3d2a21eda35b54e056f38b19ffb8435e5e75f29283280ea54b8f1b390a485faca9b3472e5948c3b07709c7431d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5da6d9aeecbfcf5fec3255c2bbfaafe59
SHA1c5457d59139da872a05e71b22733994994be2f71
SHA2561a419bf44683bbe685795f22e49664c6c18272f9da3ad88876a5b85ae81a21e4
SHA5128e5c8abe617d5ddaf18e986f60acc708f370f482bf6f74df94b5e3211801f142adb5faf971484d3ea9def45255c846001920262764f82ae1e5e51d2bd6fe7c6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD51cc71dbe983ab686755b20485dd93ede
SHA149d9f8827bc564ffa20603b478dcd5065beff4ad
SHA256cdf15abd0b25ee78e4ca72aa0e9d1d1761c1c74fced4629d60ae18c863e41a0b
SHA5120d805e0c0d0c53271d65533eb7a95f214e4f3306b70528b5f7302e8b46e1a165a35aeecbd22cd175b0e6431526219f78cca308990eaebe4f464456bc576f007b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5c44c1480068481eb2176b676d7095955
SHA1cdf9ff18eb31fd3dc58b6e76819598e9d1cd88a8
SHA256267b06d96e50765ec6a782975c3d3d7cc1f34630206207eda0eaaf7bc3b04c9d
SHA512400257ea0b4da5d0776d1dbabfc11e9543408f61b2cdd72a787c6b56af05f56712a9f687403d9c94db7570e59dd29c8301447f35cceef3c1466b83fbe353b549
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5bcdee09193f8887c5644127efb0405d4
SHA1473c53aa1e84814bc24eeaef5d2f22484144eedc
SHA256751a35f406eaa9057db324c6d8e9bf8322716e4009d476a4786597e7267fdcb8
SHA512239b6d81d7245a622c428eab9b7348dccbfbf8ec9507a6b7ffbfa3e5a5c143c44dbca9917d51739d78b4441e516c70e189763df2d7b42d73abb954753e12cb17
-
C:\Users\Admin\AppData\Local\Temp\Cab9F2E.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\Tar9FD2.tmpFilesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
memory/1900-0-0x0000000000C50000-0x0000000000CA3000-memory.dmpFilesize
332KB
-
memory/1900-6-0x00000000001A0000-0x00000000001A2000-memory.dmpFilesize
8KB
-
memory/1900-2-0x0000000000160000-0x000000000017B000-memory.dmpFilesize
108KB
-
memory/1900-1-0x0000000000130000-0x0000000000131000-memory.dmpFilesize
4KB