Analysis

  • max time kernel
    142s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    04-06-2024 21:27

General

  • Target

    9651c307b062f1b14c1082cd955eb04d_JaffaCakes118.exe

  • Size

    197KB

  • MD5

    9651c307b062f1b14c1082cd955eb04d

  • SHA1

    e525a3864763fd21a7a0a03f9fcb109da43dead0

  • SHA256

    af0dc450b80d7c48217564285509da1a2c349fdbea88eb93674c50daae0abc26

  • SHA512

    131e5d87c96c6074ac417d7f0e0232eb760be761c3f08c9eb0e46f536e0367ce1935621f991487504bafdeea940a43b7c1ae9555ae83295d7251969bdf544a9f

  • SSDEEP

    3072:pWDdCZn+MHTptyZ1+5Ck15lxYY54Fp3QT2kZz2yDj0EQ8x7xSJM7UmA0ox6:pWkdVlS1oCPY5+QT2kx5HlS27Umg

Malware Config

Extracted

Family

gozi

Attributes
  • build

    215165

Extracted

Family

gozi

Botnet

3135

C2

zweideckei.com

ziebelschr.com

endetztera.com

Attributes
  • build

    215165

  • dga_base_url

    constitution.org/usdeclar.txt

  • dga_crc

    0x4eb7d2ca

  • dga_season

    10

  • dga_tlds

    com

    ru

    org

  • exe_type

    loader

  • server_id

    12

rsa_pubkey.plain
serpent.plain

Signatures

  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9651c307b062f1b14c1082cd955eb04d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\9651c307b062f1b14c1082cd955eb04d_JaffaCakes118.exe"
    1⤵
      PID:2184
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2748
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2748 CREDAT:275457 /prefetch:2
        2⤵
        • Suspicious use of SetWindowsHookEx
        PID:2696
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2976
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2976 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2848
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2640
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2640 CREDAT:275457 /prefetch:2
        2⤵
        • Suspicious use of SetWindowsHookEx
        PID:2280
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2356
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2356 CREDAT:275457 /prefetch:2
        2⤵
        • Suspicious use of SetWindowsHookEx
        PID:2136

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      aef4c2fadfd76b51c4a7001793a34ae7

      SHA1

      0d369b2e70e4b3e970c1057070ed2e8a47e023f5

      SHA256

      d41aeb6658ac843511c3f984786df0bab1567ec1affbf98af1815c49cf6dc534

      SHA512

      639d5ff3f61f5436f261fd2b033790ab1752075363947936df9e75434b4386dcb0adc0156f0f14c92467c37b46ac37d15f7d716b3049afbbbfbcf7b391af02e7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      08c2bd082a6c20e4cfa8e34b1767afdf

      SHA1

      079dbec0a74ec38a072f74fd17a301eafa68c271

      SHA256

      3fdcf3019636668016191c5d62c8c7b927df99ecb7a771cf8e79b64d4e20d6ad

      SHA512

      b4248a13d7398145a7e38b820355894b10eb355c614bfdc14d10e133a7c3eed64c8a0716184ebba9f3c35e6a49069b5441def8f6736ea9da0db1d3bbaa8065bd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      d0b82a6e209c213be72a6c8800481436

      SHA1

      7041ade867e4e1dbbc888995ff3aeb55878ced59

      SHA256

      80470c57c1c688345fc59ac5c1a6ba2a7a2db62156fb160f22b70eb6beae78bf

      SHA512

      0d2cc7b97f5e3cb95ba84aaf6996dd71f3ed6c05dd69b7cb81057f8203f6b651cd5effb5ff7820e7f25d660100feec7cf0ae9577fc3e6459825a5956ddcc5160

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      e2b8cda14f004e20b23b41fc09410784

      SHA1

      8d8c96ffd3ce3de007a0ba1f61eb1a6df96fd3b7

      SHA256

      00e36c0f0fd8bf21d54829b72bb856f6e786007da02d06bc5e173a735942a7b2

      SHA512

      8ecdd0c3a2190c7c61e1bd493c83deadc44b9f9ec6969ac7e497c3320cbe600b5b172d65f1138b885432eb962216de771966e5d674243f06df2ceda1c624666a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      a8511ae5a9ca9b53486f798e381db9e3

      SHA1

      03ab0d4e65521bdf0f2e08f8da6d25b1cd03630f

      SHA256

      1004785bc911748eb1b711a010eb0deccfea6190ec63b2440f6620c9fc90942f

      SHA512

      c4da4d4bc387a1387aea2ca353745195ded200d1e9d4bfb354eb786fe64eff4a3451bec61fde8d555c18566c7312d7df47d59b7dff59e2a630d111319e6ec653

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      26d76e5465daeb20490ccf39ab83b823

      SHA1

      e45edac8e0e656b09e5740fad3086afbb89bcfe2

      SHA256

      c10512c6289ffb5ba5e18767709216c7448cb6dcd78653eb8713a8000b4ca76d

      SHA512

      1ad32be747c89071fc4003785edd4d283794200e369a51f36fb6cb9affe8c54808704de7d28bae7c82562b4c604fe7a25fe5c2ee641af91fd0e5edec45029274

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      649ebb29aea221b2c57dcb183793b9d9

      SHA1

      141268e245e089c086f3050046ed29b4709dc4a7

      SHA256

      5cc9ba91a55fb4f797bcb474d68d3f896fb288eaef6f93723fe67031b9f91fda

      SHA512

      e8d1c8825d7947587af50633a70eca61f9d1b381d535661888f3e5f3b234b19ea1553b9ed645427257d1ed79be736d7624153308dc9d63c669ac8de4aa29911b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      a2c9eb5fde24b90fb041a7bcb2cc9a2d

      SHA1

      a6ab73bfa443eb581e302bbd6f1ee235dee544fb

      SHA256

      e9f183d7ac28daa9562072c1332f0319737f193996513e22a857c80456a3b15f

      SHA512

      691b36309d905dfde85718f8c089bc735604701a07527649ea75d93dbdd598ad255e32438405368708474528ccb70d3081fe2ad26dd35de4637487a8d5c26c45

    • C:\Users\Admin\AppData\Local\Temp\CabA7F.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\CabB6B.tmp
      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarB80.tmp
      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Users\Admin\AppData\Local\Temp\~DF8626A604D54D4BAD.TMP
      Filesize

      16KB

      MD5

      67aa6f9b69e64d8cfd2ecfc3f217ed9c

      SHA1

      a1e03591a47cdf08a572f4006fabbd2bdaba0af4

      SHA256

      df811c7b1b7ad0c65dffe83c561ea1eaeb427ac5fe2c019da2beb4b4a177677e

      SHA512

      9cc8f69b91422d5a12b678bad8ae4d801f7b3af7baea9e7e58d7b3d2bdf4c7badb049a22a8abc06e3ff178ad73dd4befc6f36cbe0cd7a4ab00b7487a5cac8f1c

    • memory/2184-0-0x0000000000400000-0x0000000000447000-memory.dmp
      Filesize

      284KB

    • memory/2184-6-0x00000000003F0000-0x00000000003F2000-memory.dmp
      Filesize

      8KB

    • memory/2184-2-0x0000000000270000-0x000000000028B000-memory.dmp
      Filesize

      108KB

    • memory/2184-1-0x0000000000240000-0x0000000000241000-memory.dmp
      Filesize

      4KB