Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
16-06-2024 22:00
Static task
static1
Behavioral task
behavioral1
Sample
b5654ee2da2bc6d3d8b19c47028911a7_JaffaCakes118.exe
Resource
win7-20240611-en
General
-
Target
b5654ee2da2bc6d3d8b19c47028911a7_JaffaCakes118.exe
-
Size
269KB
-
MD5
b5654ee2da2bc6d3d8b19c47028911a7
-
SHA1
bc6b29c0145912d36068e6af1b10b391d5d12c92
-
SHA256
a9df84a82999bef0329cfc6a2ffdbf9ad037a236b25562f55075f52c2f95484a
-
SHA512
315a3d6ac566939e32311527c6667b80103c843a02b0b6af9731ac2841965a60b54b979d623654d19ce3b760070a5f01f2cc56fab61304c88e3fbf6fae0065f6
-
SSDEEP
6144:UVfmmDgASD5W/adCxsT4/YFqBcIsBGOhN/35:UVfjDmtW/adCC4/UIsBhN/5
Malware Config
Extracted
gozi
-
build
215165
Extracted
gozi
3151
zardinglog.com
sycingshbo.com
imminesenc.com
-
build
215165
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F76405B1-2C2B-11EF-AB87-5E4DB530A215} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a8076000000000200000000001066000000010000200000007db4ff705fe2db0ef8566f24f20c2e2ce4227026a20a94616a7cdb5b19ea527c000000000e80000000020000200000000d125538553abd6672fb309bb11e6319d98473e69062541d9fdd45e95220f56d900000000ced766d30ecccb9c4b5650665cb55f9b832e5fee97a3cbbf167919e0b7360b3d4d0585842ad76673e9732e0b0e104d9c76d5c3982c82101bc90722f8cd4ba14adb45776583a5a84ccd0d6cdbda0f73e5eca4cf1037888660999ab69cfa73e79455ac4bb45a9202f19693334b1a1f79a712383766d2547885a132c317a6b03eed05fed02856375c9abc620cd994dc9d340000000f7474454d2e7791189f85299948f65cec1a99e4f3e7f7079508136c56df2bd06d00b92a4714d524944fed11b178a3dd70c0a035960a52ae02f949bd82fa4d495 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80cc7fcc38c0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a807600000000020000000000106600000001000020000000b866264c2454ff13ac6567419af4f889e86f466b369e281a655525d494fb2933000000000e8000000002000020000000fde80de8dd99f2ff0fba52bcfde04af5e4648e4e7a29747067e405f7fa8ce755200000009475ae7e056eed07dff5799ba35a663ce9f860528afda7af2d0d0b70ae00989a4000000057c89eea60f8a6e025b17812fe31ef6fc9922a1b8de0b69efc93f6868808d6b37c9b7e7f3b17b60b24d57eda4f3727f96cfac564faa6bdd5b2f71fb96138dd48 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2500 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2500 iexplore.exe 2500 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2500 wrote to memory of 2540 2500 iexplore.exe IEXPLORE.EXE PID 2500 wrote to memory of 2540 2500 iexplore.exe IEXPLORE.EXE PID 2500 wrote to memory of 2540 2500 iexplore.exe IEXPLORE.EXE PID 2500 wrote to memory of 2540 2500 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5654ee2da2bc6d3d8b19c47028911a7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b5654ee2da2bc6d3d8b19c47028911a7_JaffaCakes118.exe"1⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2500 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD530e4bc3ca6202bdead54b2b09a76bd8c
SHA180eef946af9f3f67f806b6c7b20652ba1db3b873
SHA2561e1ca2355d53700c81c94a1478b17cf9987a060a730f96ee3fae819f0efb1283
SHA51298d09795ddf8f4b95dec5b6169f8f970c1cce3aab14831573455be3eb2ffa27cb9bcf7fae00db87222b2c98219b237dedcdb44c736a216b1516be4a1e1177e12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5d093034636ec7198a6b4cec7afe10bb7
SHA15cccb7358a2038e34a4bd717948f24921ff8ca21
SHA25628f280e96a832f45171c281f1ceb1ccb4b23bbe4f35c8dab67bb75be375190cf
SHA512e0d106b0b477495f469ec29af6f0d89c72bf98ec80f8148ce262b01ad9122ac3112301c828ac281a6fd01500a1b71c4c3c9b150f1dbf72b532764c36c4195ad7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD536b12296d775495e87af34fa8880f4db
SHA15f717deaedbad20f8c0afe77bde8cc0ae27e11b4
SHA256ce40f32408d9028cdc68f37d4a1fd94070fbcecb180c41dba4ec5d28d16d7a2e
SHA512b9e8566f0580a5ccc47436a76a410b9e0712bf6f930c3e410739cc58106abf56b4d9859fe62e2871be04cdf47b85f56a852d54ad9aef231fb1c5e145870cbedf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5def312ad8336151d6ab27c4bfa8bac6e
SHA1afac7c02b920e2a6c70e0882fba921a33817f555
SHA256e48e222313afa8af81afb07a9a47fccad205fd6ed883d9e9195f116bd11a02a3
SHA512224339ea864cce7dc207fb368c6d0472c7531194e313c36087123b6c45f806803096cfad65ffb29b0fed7c6f434c30d02a9dfc09dc21c45ea0230f306d8a9327
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5a39a1e00d9b1bdc2caef9204660cff7f
SHA19e10966a044303ebf252fd9ae2376338a52f6fbf
SHA256bfa74cc4e362f0c7a6ddd79bbf85a663bc1478043809d52d6a8e90ce20bd3f61
SHA51204c341e6393b53bf2c60862e09387efdc810a52766947aed78d0fd50174192bc5e0511d14c8b0ee83553fa3ba7ca04dc77ebba9c831f78d7eb6eec8aa44d7985
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5b9d513f5c0a4872b4d808de77c0671cb
SHA14e3495850bfb36b0cbfad7149fbf31fe5e38ef04
SHA2563306f36ffeeca3d4c089d3615eb151cca86185d4c3a36a8b70b1c7dfd8b602e4
SHA51207703814d4e34892e243a4873138fe15fa988892706c97ac4862b4b4b28a38ba15c5a3d7b118e3a36eed793d1d2199fc12a3ce0e6ea2584797d27ce97a3d47e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5001fe4f8528e4c92d51520f22fc2510a
SHA18ef5286cfac2e3c9c94e66e5fb779bbf3205e961
SHA2560364f106f7907791d778c9e677892395bb04180f38ddc31ed6e544fabef52a49
SHA512fdc4bdde0f657fa23ed56b4357fc82089c0cf0f52b286d0647fe33d30285e02be9fc94c25ad741bccf925c6aa50ab4a425672fc088bf8cd38a0e7ebddf863952
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD53d716759c5023006491b3d8115e0f522
SHA190eefa926c20323169a2cee9713c566048ab464e
SHA256592a5d20012010280ad4f264033c080ba18b33a29d52a4699e55fd78736fbcab
SHA512df62ec8785ab10e619474669c9883a337c39d220df418a053972bd4b92d110568fac81dbe235b23213ae638216563c9d761af3f85c6aeefb7b7a8ecdfe8fbf5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5363de3979c015e9dbee2b96e4f1598e4
SHA16621611ffaed9549ccc637e5461dd9aabd4eab89
SHA256cb889c302dd319720a17dcf073846482a0fbd804255030448c2d34b4fd82044f
SHA51249ef827c31832f0b05b244d225a38d92a83c055563e79483c6be082d85e6957b4e29f8403fb0108e2430fe67533fc9cbfd19b13ef64f99e3bd7dab034aa145d2
-
C:\Users\Admin\AppData\Local\Temp\CabDBF0.tmpFilesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\Local\Temp\TarDC9F.tmpFilesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
memory/2764-0-0x0000000000E80000-0x0000000000ED3000-memory.dmpFilesize
332KB
-
memory/2764-6-0x00000000002A0000-0x00000000002A2000-memory.dmpFilesize
8KB
-
memory/2764-2-0x0000000000260000-0x000000000027B000-memory.dmpFilesize
108KB
-
memory/2764-1-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB