Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
16-06-2024 18:25
Static task
static1
Behavioral task
behavioral1
Sample
b48e02d8f3f42ea961eb0f060af25e37_JaffaCakes118.exe
Resource
win7-20240611-en
General
-
Target
b48e02d8f3f42ea961eb0f060af25e37_JaffaCakes118.exe
-
Size
215KB
-
MD5
b48e02d8f3f42ea961eb0f060af25e37
-
SHA1
3e2220030a165c6a8043b100f3943710793aa70e
-
SHA256
455a9512d92e0b28b9858caa4247abef7c32418a76d548c92a65b07d5f8fe419
-
SHA512
5ef7c8dba9d6221f6daf8e56a535fe4206e5b20737df7f856d6e9ce7515333b868821747c579b6d5dcfe84b2320d9a221b3fad291d083980397f2067d6ab4d54
-
SSDEEP
3072:Rb9pXDyUKdySqVgQZt8OdcjFfSvbke/0t4mwqWB55syoNdL0Z2L6BWnqR+yV:BHXDy1qVvZnOe/HEyoEWGd
Malware Config
Extracted
gozi
-
build
215165
Extracted
gozi
3153
biesbetiop.com
kircherche.com
toforemedi.com
-
build
215165
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D6D3E271-2C0D-11EF-AA16-D671A15513D2} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0b2e3ab1ac0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a80760000000002000000000010660000000100002000000082dc4332ece7ce79f77828fd8376957605c7c51f1f77e31a7d1f9203236a3479000000000e800000000200002000000009042d4c65d80a7b557eca8be085308efff022d461811eb57b3b1ebb8f35b63920000000f9dff7836aa64efe2355980cfbf6c199be1a4b9b78976d7c24e28d16911ca36640000000ae652f3a53727b60513c29403907d6344f3bdaac9a0e126a884c8c578b50a997af5c5048300b42c3c93efc28ddac282a2f095d531b801df4e1694a88f9e4c3d1 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2524 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2524 iexplore.exe 2524 iexplore.exe 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2524 wrote to memory of 2244 2524 iexplore.exe IEXPLORE.EXE PID 2524 wrote to memory of 2244 2524 iexplore.exe IEXPLORE.EXE PID 2524 wrote to memory of 2244 2524 iexplore.exe IEXPLORE.EXE PID 2524 wrote to memory of 2244 2524 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\b48e02d8f3f42ea961eb0f060af25e37_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b48e02d8f3f42ea961eb0f060af25e37_JaffaCakes118.exe"1⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2524 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD56807361516812e2c4cab1ef0fd6df313
SHA110728c2f01be0fd4f256cdac5ff47c6b1db5f49f
SHA2565869fae552e0718119d3658d129e3e0983e5be83a19a0f13310b04599b96d5bf
SHA512e3a5d841119ffeb70754f427b949ec19ef51d1230b47a8f1596a2aa45e84eff6313e876c60f04d11200415b1ba2ddb10b1d8e978a2d98e8fca0307ef121b1ff3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD59a1f675f8e4e12bf92e6311d068726cc
SHA10bf585b088ec7c34b40d45ccba66bd01faa246dc
SHA256e2e3a420f5ae52707759a3db815d15a5b51e666cdd61fcb89a96557077614c8d
SHA51244d8b0dae7101622dbfb72926216709f463d05e9a08a70e280eca3d3bb6d8b7fbebccda7fb3255f59ecd02f906bad3d3171dfd79404d6e48cefe42123e71e61d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD522262bc7e47e0eea16e74e0e5d206c63
SHA1eb87aa444d4eccb6c0c7f93a8267926913d2fbe3
SHA2566c7edddae5345dbc740d1037d4e14946e67f73580833d8805bda567495db0bee
SHA512e2df0d45de4701200def7250c4faeaabd7502d22208a42f520d893be2ff51e4c2027b818cc3367a979bdf45ef396f91317fef79e41782c6bcafdaacb5f61af30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5694036ab62170a00477ee0f49be0b403
SHA1dcd2d41802cc561b743d5ef8ad0b93ce72db7289
SHA256d8a9cc177fc9840b1e2ac94361c75a2494000670aca48a937c8954a171b856b9
SHA512a867ceef1eea19d5b9ee34c504a15fa2b6c2071e0329417bb70da33d7614f95593cc3f342934eefa42b91404b014b885920c8f160b10eb65b887ad2914ec8ab7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD59e8050a2987e0f274cae730938f06f39
SHA17febd2b9e6c84b872ba707783f02877d2351665c
SHA256855f4f9999cf626abc21f85bfe60d9caf2342bf41208fa4e80233db55654e5ec
SHA512eb93353babc84908fc4cf40ae4ac6caeaf4f8cf7fd92c3f89929729c93a876a5c3d7705d1e0c7e3d983f349d166e0141a369032e267e53c207959e9ea99b7eeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5b9e149a52976e4c64284a60f5e86e2d6
SHA1ef297e0862cd6fb7dd72aee01047c400d5549091
SHA256cf53659b45d0fe315e2b995b51ecf6da5fc99d51e196082477c346af49e34ca1
SHA5126dac441f73e3ef4565a231b1fdb10a554ca273ef3e6ae79f5b02e0bce91dee66c99a36c58186805b567720b362a7303519d2277a183323e9e86789db28ab2bc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD559fc25fac1131782b84f2bb10e7c9247
SHA15af057f75fbe22ebf02d5082db92dc22af479136
SHA256e44774877ca04877371c95bce5810ad287fd514496629d92c319ae17a5917dbf
SHA5128c345b89e16a957d180c1abfd8a702e8da6ce6f7e25fcd24ae926aa05538c7e770841172d04de51c67b469937f0fd2b5d640da244d60863436c5b3fae18a469d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5c1c1d8c9933d1f2a101a82bc79b5801d
SHA1774d764c2d0cdf90aaa3dae09a4daf2c76cfe714
SHA2563b7b8b463aa6be84d1df0c50bff79924bf675bb1937669ed635ca24d47ccab3a
SHA512db901e92bb3e9b2feb675374d279aaf37f85de9cd08bd01aa23af2bdbc934cbd2b32f145d4d6a7f5a64337a5145b16bba37d14536b8e1b438f58cf500a1f101a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD593c096981fe56f9e36a6e51fd8311902
SHA1f94e7b4efe9f6e719a2440bced9c6d3b59c57dc8
SHA2564febeec6780f0fc91c87e3d8df6d090a0fcb7697d24cbe37d3508adc0891b951
SHA512ade34d101307b4001f5e2edca151116de2919f17458149126e282a0914e7466b9ff1ac51a7d15673a2e297e9d5a225b930a43a48b0e4f4125ef72c91260c9e4b
-
C:\Users\Admin\AppData\Local\Temp\CabFDD2.tmpFilesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\Local\Temp\TarFE81.tmpFilesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
memory/2580-0-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/2580-6-0x0000000000500000-0x0000000000502000-memory.dmpFilesize
8KB
-
memory/2580-3-0x0000000000450000-0x000000000046B000-memory.dmpFilesize
108KB
-
memory/2580-2-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB