Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-06-2024 22:54
Static task
static1
Behavioral task
behavioral1
Sample
9fd1579cf1541c953eacbaf3cce0de47_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
9fd1579cf1541c953eacbaf3cce0de47_JaffaCakes118.exe
-
Size
1.8MB
-
MD5
9fd1579cf1541c953eacbaf3cce0de47
-
SHA1
9b6c1182422a09257bebe1271961f28fee704898
-
SHA256
7b2d0ae7c31282f5a52bd8f92c7e0ce46b0ae050b5853c87b57a97e4293a1f38
-
SHA512
9230f7f9e68f575df7b8a11dd9209d34c592d947cc99e06065318714f4bd4d8dbf848dd89d62cfeb687927edbe8403ec98e050eebedcd45937f416aae7f8ff67
-
SSDEEP
49152:4SuE3+trqPKIO23Hlin6COYolnyJ2WR6wOHste0uIlCj790Lhf4xC0FyQ4L6nd:3L3yqPKIOson6Cslny8WR6wOHstehsC7
Malware Config
Extracted
gozi
-
build
214062
Extracted
gozi
3184
qfelicialew.city
mzg4958lc.com
gxuxwnszau.band
-
build
214062
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AEEC1281-2845-11EF-A1FB-E299A69EE862} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f082188452bcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ddc07c449e2d39419e3e0807694e2f3500000000020000000000106600000001000020000000a9a51700f29e9f54cdf5c066a675f8c8344899cb4ead8ed6c9bfe64d151ac5b2000000000e8000000002000020000000967e9a26e518908ea999103a7633be5534a4a54e20c5af7a6e16a3c4d5385df220000000fe66ff15648220663fbb849bf18caf85aef40a8de6bb9bc81064d12b6de4a5bb40000000fc5ff2035507fe7e1f177a27a58c012e8f3b330a6373f47869d7610ace42dc9a8369f6696a25367626748d8f0603a764f872ad4f05a6fb56a4fc3df8ee0e6469 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2404 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2404 iexplore.exe 2404 iexplore.exe 2620 IEXPLORE.EXE 2620 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2404 wrote to memory of 2620 2404 iexplore.exe IEXPLORE.EXE PID 2404 wrote to memory of 2620 2404 iexplore.exe IEXPLORE.EXE PID 2404 wrote to memory of 2620 2404 iexplore.exe IEXPLORE.EXE PID 2404 wrote to memory of 2620 2404 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\9fd1579cf1541c953eacbaf3cce0de47_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9fd1579cf1541c953eacbaf3cce0de47_JaffaCakes118.exe"1⤵PID:2868
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2404 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5da61396c49e00100accd855d9dc7bd92
SHA189d529a68c101ee2c3c5b337d2f34f7acef75395
SHA256539540dadffa16a77fef15834901b6601230d961658783cd4eb103ab911ed390
SHA512ace815672879730400198c2ad3b3e7dacdae8d0c25d930985a11a15844c0dc0d815b32b432acef402484254ce14cfd9422b194d7961eb0f89d10becdbe2db80c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD52c157466c26686062d5bd64b6a11e962
SHA1c0186f1bc9d023e5b68835c556512c9f8417a13f
SHA25648569f49f0960a835dc49e477605bbb7f26cf66d0c3958868a81c377721f3479
SHA512fb3efb2ed51be10277234041c60094eb246e83f3856968121c02aa9639d0d10d1350b31b9b33bb499db342a5cf0b89763a5a05118ff64ed102eff0f1e6c6e5fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5ace790b0e15cfb16ae21ffb79dec3aca
SHA19cd693f8ef2ef5085c5b3bdbb7556446852fb1e6
SHA256cef1804b0aa5cbd5a54e9cfefaa1e8da92d0979d3d87c968dfacca3b0469bf69
SHA5129ffc83d0a921da472508115e8591f08468084d49b202e4961b742d1c0cf18562d7f3b259038e55d372628f06d87a0a0576c998772e1e0070252e4c11838ce854
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5e588797f45bcca39e4539050b1dfd0bb
SHA19aaf9cc4dc986f8b07aa3231aea42ecd1e52b3c5
SHA2569f59ec80cc4fb9bb327b53d6146e3780a02506371cba4042196d9ae4cc1a04ca
SHA5127e63d049fc6c886d1df6bbc582be6dd66bdc2f078fa3fba406db77e8341d1649d12bb3a69de5fc5ee0f1955836e50dcd0abc4c103a9f8b93938e7cf631fdc906
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5abfe919d1d2c7c2cb1fdc933e8db9814
SHA15a30bae21d1327e8274b06007afd03ea224cfd0b
SHA25679c509e991c70bc3ebe92bef15231cbdd8b68c3d96839dade987e495f629a9a4
SHA512020bceead9bfb5913e1dab70e33c1a0e34eb50c9f3b4825c50c94168b7e51e4291fedeb5610b1d7168a06980d0c1b5a25ef4df8597f34df4db55e1a13778e1f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5da64b778616bfd1c3e3582b0d74507de
SHA16a1449650daaa9cbe5c24409f3db19967ef70a86
SHA256ffadb391b22323ce83c249e6697d8c28d63f8a920126bdec54b0e8c3eb30a986
SHA5122286243680aef2cc2c75e1c8d36321efbf660b606ceb39da1e7cb41d10be669339b813f3248b0e89d8f62f233595845a6fad610021060c224c4fff82838b8c2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD55a6c6dcb46d107a18092f13573cf00e8
SHA1da982fdf8a4f65794b988453f05c07cebf83902d
SHA256f743eca7920e826a143d3a26114ba1aae89fd6e3b1b6f80beafa2cf8cbf7412a
SHA51287151404f2a2810db5e2573da5155be6a22f1ebb7e892d9026a32d8db3ca022e1a71e856e8aa4066b8ca5a21cecf789c4a46feebfda3c4d049bf7dbabdeec99a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5595d42576d723a4653707349b4d7eadd
SHA15f4c973c74a4358a1869e8f2652c10db1e56993a
SHA2563c119067c2c59b74c6caa2502b98001c84bd6c1d00b1a86a8e2a4f1d999cfa83
SHA512e35155b9dc28eae5f4bb17c2683f8b3ed3f4734e51c732f70df4af08968f786c0db304eb623ed565a1efa5ff6270341361472f5cbb9dcd99ca8cba711f05bcc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5037dbf374eba2b72a11b643e25be9152
SHA14e3b5d3a4c0ddc91ff3b9d43c118296f2f6d8955
SHA2565759701e7e500077fd493ef086a83daae26115877e0a551713fb32f6a66c21c1
SHA512e4ff55acee1a71e3df7f183f25ccc174acd9f03d1437c9eeae30f04fcea3cb298647956a3e7a0792d4725038e5229a927fa6703398772248bc33dd1fb0e0077b
-
C:\Users\Admin\AppData\Local\Temp\Cab284B.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Tar296B.tmpFilesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
memory/2868-13-0x0000000000400000-0x000000000040F000-memory.dmpFilesize
60KB
-
memory/2868-2-0x000000000058F000-0x0000000000594000-memory.dmpFilesize
20KB
-
memory/2868-4-0x00000000003A0000-0x00000000003BB000-memory.dmpFilesize
108KB
-
memory/2868-3-0x0000000000400000-0x00000000005E8000-memory.dmpFilesize
1.9MB
-
memory/2868-1-0x0000000000400000-0x00000000005E8000-memory.dmpFilesize
1.9MB
-
memory/2868-0-0x0000000000400000-0x00000000005E8000-memory.dmpFilesize
1.9MB
-
memory/2868-8-0x00000000003C0000-0x00000000003C2000-memory.dmpFilesize
8KB