Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
19-06-2024 17:23
Static task
static1
Behavioral task
behavioral1
Sample
bd7d98a255c8d799a6ca9d9eb9baf251_JaffaCakes118.exe
Resource
win7-20240611-en
General
-
Target
bd7d98a255c8d799a6ca9d9eb9baf251_JaffaCakes118.exe
-
Size
215KB
-
MD5
bd7d98a255c8d799a6ca9d9eb9baf251
-
SHA1
e72fe38180702c1b433fd80b540e0189658eb294
-
SHA256
cfc65468fa4e9d507b5ba7e84f6cf367bcec54aa528b65aa0cfb38e342a34816
-
SHA512
47ecb7ce2e0fcf6e936ba36ffe7addec5270ea353860bf7073907853ada7e6685e1e2183767a3d4c2825db6f9d8acca1995ef45b717eb9de495d544b2be6d719
-
SSDEEP
3072:Rb9pXDyUKdySqVgQZt8OdcjFfSvbke/0t4mwqWB55syoNdL0l2L6BWnqR+yV:BHXDy1qVvZnOe/HEyowWGd
Malware Config
Extracted
gozi
-
build
215165
Extracted
gozi
3153
biesbetiop.com
kircherche.com
toforemedi.com
-
build
215165
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40ee499e6dc2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a8076000000000200000000001066000000010000200000005a259aa45dbd179b6f9ccb91c93efb4f2f285539a8652d4c714c61cc6217a0dc000000000e8000000002000020000000b0a588593d5745c4dfad7f6b8f30bb954100e5684397e756d367f848fda72a932000000077814c09ad0cbc6e77513a6c38b5650f2858e320c4ee96fd8fe109f13f8a3ad940000000a2510856d85e878b0c4895a4551de4e8fe36c21d42a654e16fdeeef069f46340b088b4290e654c0d35416c5d8e09d774d75d7cf0b7f9a795780f05458575b9f9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C8F05351-2E60-11EF-A3C1-4A2B752F9250} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2800 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2800 iexplore.exe 2800 iexplore.exe 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2800 wrote to memory of 2940 2800 iexplore.exe IEXPLORE.EXE PID 2800 wrote to memory of 2940 2800 iexplore.exe IEXPLORE.EXE PID 2800 wrote to memory of 2940 2800 iexplore.exe IEXPLORE.EXE PID 2800 wrote to memory of 2940 2800 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd7d98a255c8d799a6ca9d9eb9baf251_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bd7d98a255c8d799a6ca9d9eb9baf251_JaffaCakes118.exe"1⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2800 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5230696ec9396780b7711e4f29e0400d9
SHA1cc1c3a478dc121cfdeb4e04cbd3be32e5d7cd7ec
SHA25670f6225dc51134283976a271173b041824d64356441e9c2714fa8b3719ba7a91
SHA51208ea493da039f935e1f80a2a4cfe97471c333c84b76fd57e7d1f7806bd7276fb864d654d97e9d2dd6a25531f28afb59a2e69179407ca42715a7d904477389926
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5a8dcbe74af42da27f431843da7f6da09
SHA18ba7b923fb6ab4b6516a46fee0b93a18aad2c5e3
SHA25651b41f9ee216139607178860e6169e2874fefe5f003a686ac08cf94280becbcf
SHA512787e94cba4fb59fb48bf30abd9a34f8ce4b97ff7109688ceb43a0a2275b0b5a5b608d6399707faaf2e497c9583c95fd8dc0448e02f25af2fc608c1fe00e75e93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD505b620a653b207cd018729252fcefdae
SHA1b381e705376801117e0ceb119e3cc7777e7e728f
SHA2568c46426f059bb058e0a2c59f042f1ac01af8b979ee43eb7a6deb852198a25bae
SHA512c98d613fd9196daaddf37fe76b8be8ca861f44156c674da5731d0824b8366f070af6d2cb5b37e84d3b8994b9ff9b47c9a2bbfc1cbb77136245215f35234d39d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5dcb4116f33aea6b3b3969614aeb55fd9
SHA19a14cccb9107fa9425294538bc8011bcfeebe9a2
SHA25663c7f44d60cfde239aed0c2fdfb28d48ecdd4e3383899072450884f7e3ae3a83
SHA51201ea48389768151d451753b8a76981f0134f07c9e67d5d2375a048c3ed415c19864b1cebcb53ca46668532ea39c002cddd1560bf82a2010b395c9632a51135b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5e60aa683819d8ca9de8ced01ce161d50
SHA193c0861166939f9477283a63978c40318a035551
SHA2563d779a7633258431e309b98120f9c26e4a295d698c83b7a82846a1a5d254d695
SHA51243fec9e24ddab571ef8788109e80095ca8ecfdee6c57cfbe0aea6af5f5ebb3d0dc3f3c8fa3308f858adcb30124805b885aa5066a918266f911fca4af56f600f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD57cdd26468ac4da9487ba474f59c7e248
SHA1675c3bcfb0b2b23aa22e22887299b802b8a9ce25
SHA256c1b53f503d49db59bb15a00a08fdd850c5234562f8e2acb025c9a223f42f9b3f
SHA51200c19ec730fdecb6179d4dbaabdcf226671ddf757bfea8f23ac861125153f0dfe3fc808e043e01ca66c4bd6b208383de9efbe9ae9544719ebebd947a10a072c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD55c63f9b20d8d5449ddb9152a9bffdd10
SHA19dbc791a69e88dd12e436befae93468b0c30bc4f
SHA2569fb428900d95752ebdf7960049369ea7e369d650e09f16d455a5c23e7f7ae47f
SHA512c848cbe2378bed1554aedfe62071f97313f6036d3386db1dec82c9b808147c0ebe5de54e72e9f236ee5bf11d3fa6b25ee1bc801f22794b9a5bd7af896e1d984a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD553c7569133242f813d54c719a69c304d
SHA13dcca916cb5dcc805e41812950c3d045b0e7a975
SHA256c7bc72c77c5cb4634d170814598e8a3a34ed044e84a609a30f4440df609cf15f
SHA51262254438fe435d1e6b9777f5977ef6aeca773ca60559e4a8718f0dabaa84a943149f93953603744afb2aa3592696888d802088711ed8ebfc0bd7f92ac95fb291
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD50fc90b1d907824b45f77dfbbe70b72b7
SHA14585f54c8283f9507bdc9d68ae5dfd9dc9b947c2
SHA256c4e65b4324bfa79b9230d8425f484d422dbfbe429c6bd2d34d1664a2352b447e
SHA51265e1ac389db1ef6e3d542056c8ed1631416824060f776c5a9487ebcb1b27d8813007763d0c8db19a4cac0fbf7b707786cd22926ff42815ad7582b4f7da303ae2
-
C:\Users\Admin\AppData\Local\Temp\Cab7E0.tmpFilesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\Local\Temp\Tar8BE.tmpFilesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
memory/2084-0-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/2084-6-0x00000000002F0000-0x00000000002F2000-memory.dmpFilesize
8KB
-
memory/2084-2-0x00000000001F0000-0x000000000020B000-memory.dmpFilesize
108KB
-
memory/2084-1-0x00000000001C0000-0x00000000001C1000-memory.dmpFilesize
4KB