Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 12:55
Static task
static1
Behavioral task
behavioral1
Sample
ae85fac18acdbf94378104a0983da205_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
ae85fac18acdbf94378104a0983da205_JaffaCakes118.exe
-
Size
215KB
-
MD5
ae85fac18acdbf94378104a0983da205
-
SHA1
0290e95ac272d4e9227f47b89b702c3444071818
-
SHA256
dcbaa83e32d8997fe9d14d0a76a7b618b465c8e48a2fb818dba846b118b18ce1
-
SHA512
646136bd501a3226e6269f65bd49ce4848231e36cc33798f672b87ca39918a4c32710b1fc12f7cb1b252b610b17ed1e36c8bcb92555c5db3d6894d470fbe6de9
-
SSDEEP
3072:Rb9pXDyUKdySqVgQZt8OdcjFfSvbke/0t4mwqWB55syoNdL0M2L6BWnqR+yV:BHXDy1qVvZnOe/HEyo7WGd
Malware Config
Extracted
gozi
-
build
215165
Extracted
gozi
3153
biesbetiop.com
kircherche.com
toforemedi.com
-
build
215165
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A6E29221-2B16-11EF-92E0-EA483E0BCDAF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000059263bfaa8a10d46b70ed6b47563cf87000000000200000000001066000000010000200000007a22f2d7e0ab9bb3676ce69d115377c94c83e19db68eba72d5d6059d21da0894000000000e8000000002000020000000f21e2001bc86a08d9e42a8a9f6af83c8dea1be2ec2b271052fd5d339823475af20000000ed8bb666fec8e227c559c049ef29e568900ea2dc196687907b90f9a5e49d408540000000252936fed3f0e4a71a64204e8b0c3ec95da1162141aa2029bff1a1a00462c370276e60ac5e2df37a733b4e000c7065731bddec3880d42905cd29d3a3705e4537 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000059263bfaa8a10d46b70ed6b47563cf8700000000020000000000106600000001000020000000216c639a4f68e09e1be35e455898ee5c137f98624736c397df945ba0812cea23000000000e80000000020000200000001f55e181a54fc2e895f7f57f3645e19f807670fca5a60a5b330b78bac1375d2e900000002c5be996e1a609960e8145e464eb0952edecbf6cda8d3f027010e5bbbd61434dd587b02ec81e398d61c3b3b5a8fb474c9d49d1808a402ad42a7a8c3afbcb9358949140d69d885b45cdf5e727939d0fda99b59b73dd5e84d2e5e60104d05f5912f13a9ce7e582023f5abd8c86deacb16e47f1ac14e3fe390d45d6404f5e9e47d307d415ed33fd7ed806b8b08ade3df2a440000000205f8709ae54765d1f44230e1a2197a9ceefe7c913c33921b634f1fea9a40b0be573cc56a66dd28882871ce93955d14efb13a93914746fe85863583159541d03 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60dec27b23bfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2616 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2616 iexplore.exe 2616 iexplore.exe 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2616 wrote to memory of 2516 2616 iexplore.exe IEXPLORE.EXE PID 2616 wrote to memory of 2516 2616 iexplore.exe IEXPLORE.EXE PID 2616 wrote to memory of 2516 2616 iexplore.exe IEXPLORE.EXE PID 2616 wrote to memory of 2516 2616 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae85fac18acdbf94378104a0983da205_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ae85fac18acdbf94378104a0983da205_JaffaCakes118.exe"1⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2616 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD554638eedd7db611fc84b89deec6ed32e
SHA13d60e18196c9d9a6bb0502566c5d113f366d78f8
SHA25687e27301ca62b572a2198ec258b4b357293e78e5230ad7d1e2949bcb50e507f5
SHA512aa88ef1f789db5c873e8bb7d28b3bd51a3120f0b924bd616a0ac6bbf130b18d797dbe19e2f5d1ce9eff0fd31084ea24ba28be077b3d3315955d111049b262080
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5fcf2b3ddf6e290e8e608194d3ccb671d
SHA1555f7bb2eaf0e7bfcfd292d391946cec987bd6ca
SHA256836dc43f312fe8a00360cee3a4f3bb1fb2c0f9c042bb90207c5af3b8044aa425
SHA512096962abc56d4ff64c9181df3192ed8e0c49c4ce982866ebdb526b4a0f16d3f96830fc92f67ff16c6367e871e05ab401084822ea9344a8552d505eabf4131e10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5d595ce8a6042b13020ec591bfe30463a
SHA19a286209ee58d725866dae5c4d7af3e15957be47
SHA256d490fa90efc5032b1bc1493d7847f0bbd815079a80855fed9c952d214a6301cf
SHA512b5e2b25e2fce1d0400fc65520d68b4a60e16dd931ea16810ef12923ee1159b607e0ec37d014fded9b7c3cfd820f16176896b8985a22c600cac2b2e56a3e3ad66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5242acf51ae4652255709c3c7aeb6c19a
SHA18744fc6d63b8deed86d28733e337844adcd0b6d2
SHA256683997669f2af26d157d55bfd2cbf400f341f2b4030904befd5707d3fbb88ef1
SHA5124ff38bff484f2067850f926d21c9ab6d52505e3af963b9673dfe94eef805ecb55820f63f8aeced78905d045d784817e17cecef4da3d92564b4bd5998c72d1f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5cc251fc36b246393f19c5776e368cc42
SHA16e5f9f30458ee4176c5d247cdc1dcc874e477a53
SHA256fc44c4929fd5068d5664255bad1d419f85335e11f27612c632ec66a216b4145c
SHA5123ea38b5cbc207259cf27a96f7876e86fdf4fdbcc3bcc7d88d41b09a93bb0172f7f01480575ccb909726ac110a3833d21cb9d0d0e8cdbe23021c263318817bda7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5875f42c6e42470a596ee31b5d5b3be3f
SHA1b80e1fb3887c64e2746d4b387cd569a0fb42a0a9
SHA256c55758e19fa2f432fde3a5890ec44d1cfd78e2d919ca2a94529bb7f505cd8334
SHA512ac5cd8ccd1d7dd9eb716b9ca8f7a44df9d66e498b34e1a74e2bdbe12820b4e850f90416c2a246ecc809ebb6f56144a092c79ede1f744abec7040a16697d142b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5bb07209d73449c3ef4412c8047f82f01
SHA133022a47e1c258197e28c1fbba3d261daaa2be2b
SHA25622e9922d9412962d28a77b9ef6f778fdb0fc78aaa10d918b137533ab3f2b0d2a
SHA51262b46814969ed68925966d026b279a0e32a82f1067ff57b4cf06b207cd0184f2dcdbfb3f25f6c960e29a0013491e1e68bf2fa52cded15087eb0f3239a412a9f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD53bd39ad018522403b84260e838c642dc
SHA13dd900c387ba94401297b47386b6a7c6065a9804
SHA256d545ebd906c0008938af2276a78c479efb7b3edbd822de6912efa2193723a72a
SHA512269abc21d671182b2a7d3a408d946719e4f28ab55317914b9831669500a04eed9a9d12cdaf2fe968648c4961e7810ec091fb888020f86d7e04ea9d79801a8419
-
C:\Users\Admin\AppData\Local\Temp\Cab9C13.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Tar9D05.tmpFilesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
memory/1740-0-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/1740-6-0x0000000000480000-0x0000000000482000-memory.dmpFilesize
8KB
-
memory/1740-2-0x0000000000450000-0x000000000046B000-memory.dmpFilesize
108KB
-
memory/1740-1-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB