Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14-06-2024 03:03
Static task
static1
Behavioral task
behavioral1
Sample
a7ca7815d041f1e3737f96f0ecfb6980_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
a7ca7815d041f1e3737f96f0ecfb6980_JaffaCakes118.exe
-
Size
215KB
-
MD5
a7ca7815d041f1e3737f96f0ecfb6980
-
SHA1
77f0ded9c76cead081901ad554e3b9bd324d8470
-
SHA256
7cd06d85c60c1584e6f9eba36a20760dac2e162015f4769235276b63583bb330
-
SHA512
e425d5fa43b588df25bad0fcf655bcc30a42de7958cf524910f394a402b4e1ad6964da9effcec28b7f0876d119be07175d7303353cf9deaf7587622513222866
-
SSDEEP
3072:Rb9pXDyUKdySqVgQZt8OdcjFfSvbke/0t4mwqWB55syoNdL0c2L6BWnqR+yV:BHXDy1qVvZnOe/HEyo7WGd
Malware Config
Extracted
gozi
-
build
215165
Extracted
gozi
3153
biesbetiop.com
kircherche.com
toforemedi.com
-
build
215165
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 104d1c8a07beda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ff63065fd33f0440b04408a17e7d4dcf000000000200000000001066000000010000200000002c9b1bfe6a99835c267e7cbb0d3dd706c28e44c43aab8f453af94e9f025ec629000000000e800000000200002000000028a44576027eae73f10ffe10050691ce8bf4c64a73683390d072ac665cf5b9b5200000000834310801408a374945eb0993c459a5a22fab24b41530418e1dbc3add2db5c440000000b7a93db5ab729c69d86544b12dbce308d346a1820694f08290aa76a7ac8b06579ef40dfdd1e3741e28e12f2d6310717412ba8ece953eeff94c70c6fc6caf1234 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B5328AF1-29FA-11EF-8A46-EA263619F6CB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2660 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2660 iexplore.exe 2660 iexplore.exe 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2660 wrote to memory of 2828 2660 iexplore.exe IEXPLORE.EXE PID 2660 wrote to memory of 2828 2660 iexplore.exe IEXPLORE.EXE PID 2660 wrote to memory of 2828 2660 iexplore.exe IEXPLORE.EXE PID 2660 wrote to memory of 2828 2660 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7ca7815d041f1e3737f96f0ecfb6980_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a7ca7815d041f1e3737f96f0ecfb6980_JaffaCakes118.exe"1⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2660 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5ac83dbd6e8bf020cc056a743b971a39a
SHA1834613337c4aa6b0c12ce92470ab1d8fe0b8c28b
SHA256e3636647fdf5620ef3f677e229fd4fcebe6f62995054bd6278054cea3ff0a625
SHA512cc59345d479f8de95f485bd8600cbeac5b479238655f101b1015f5adc5fa90adfd21cf090d32d6aaef573a029615e504375099354d3b0c7bb9581c8f4a6222e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD56cc38e8b0107096df56ba8325a1d9370
SHA1d91675c12e36f63ff468684670aad8a337010ea2
SHA256be7afda271f6df705b4e3c77c0c95c42ce528c9a2ff97df6608075445be7ab72
SHA5125ae4170b0dee47662bfab2141c1deea2b9a9fd32b3747253cd8a21ac3e4381c6f95500fb229690507c1ad2a20f57151ce6c541791a6936f07a5160975df4ffb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD59801a08c235fc4d99e04463a2b230cfd
SHA1533cdd9a80f71f310c09b29066505661ca7326db
SHA256d70207e3d9e9be3e4700544b7e939fa3b4d9bb195356070a5b9c73feb64dd988
SHA512444348c6f117147f770da36ed5614955f989d912b923b92de10c06aef22b0c9382fd1c56a6733479ccdc0d139ee1fd99247e548f187888b8630c773934477aaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD52ac6a7d16073493d228a5065cde76029
SHA1d5190cd2addc699270b5b75b298b33795c90db4f
SHA256c199904964d31dde4061fc21066099d32e2b7fd78804ccf2714e97f7a65ab3ad
SHA512c70f870d534faf778977fe964f0ec6f05db093d8523115afbdf27719c515d92246d288966759cdb4cbd5ae3923b9cad486b8b9d1fa0296171b0263d98f9d3a42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD53ba91e0ec458a6dd32bcdfab109833c0
SHA16303e843fb590dbd4c0ff4d04158f0ec9083655d
SHA256de54c67dc747fc898a7633d091af74a7a3811cc076f5edd1d0470248c7e965a3
SHA5121c95fb89e912cfcbea7c5122179f639758b868f6f8a5c90b5a588bd35b4ca007c4fbbc44fca673b41286351c05607884b9bc7d5cec7ba35fd86be925d93b562c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD56e23131ad91dce47808f0cc7c489b813
SHA1a04bbcb3cedb536e3a727312b475fb97ecb09fef
SHA2566dc3d76ad7a99a65dd28d90bb8f034aa7dee704ec30b9cf657f51a10cdcdedea
SHA51263f57e74808a5d7008d2a16306a6be997abfa7302a871423d8cf7d1e99c5d97ac47c6297237bb201a9d3d36e792cd2c20746093314ec85fda5e9a88ff148d101
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5bdb9f2cebeca57ce19c8570c5e90ee6a
SHA107a3feb2c46a7a2e658184303ecde32623a8387d
SHA256484b8481666edfb75609b664458ff0c2e2aa3d2f70a447d4a16a292d45997971
SHA5124ab4d2efcf33d8cd7b2e7660f3745091534b74401d15693882a15690ffb462b5ba4b836c93343a7584b83b057f1119a055ffba5080cc9acbd0ba94fb4d2283c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5429726564ef05c428fc51cd598f63fb7
SHA13122ae10124c73d803430f2ea841558dc3d27ae0
SHA256e16ea99b5da6dc8e48dc1b620cb88a9109f6a26d9236dc3baa955b726a6f2f6d
SHA512075c18799b908cfca16d2a6b873175ad59284f2091158697a0187aace0658cee3a5e50119d6dcd941a5a15f5d7df695396d52a1d0fd84dd38f0ed5ad8020b47b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5723ac8cd96f9380fa09130e3f7b6df57
SHA104f2da39bc7ca0044c4b28cc3e68f18b43c25bfa
SHA2564028228b2960d36e5aebc257bade9e547aa17711943a3f98a3c4dc6dbf0c2987
SHA512b7cc716cf7af2150586a32cae529b26ff0013c8abbeff4af94215d91fd560238efec8b5ad770eee682d370a66e0f287d857c84f74be2394e5323c5b73aa2e1fa
-
C:\Users\Admin\AppData\Local\Temp\CabA8A1.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\CabA97E.tmpFilesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\Local\Temp\TarA9A2.tmpFilesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
memory/2356-0-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/2356-6-0x0000000000370000-0x0000000000372000-memory.dmpFilesize
8KB
-
memory/2356-2-0x0000000000300000-0x000000000031B000-memory.dmpFilesize
108KB
-
memory/2356-1-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB