Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/09/2024, 18:30

General

  • Target

    e0c7c3153dd109789ad5514078887443_JaffaCakes118.exe

  • Size

    149KB

  • MD5

    e0c7c3153dd109789ad5514078887443

  • SHA1

    7696b0d065ab5afde9f29d8857beebec0b5c3ca8

  • SHA256

    4bc38f181b2d96f0a3a57f3f0b9167d57b0544eb0be6e4d1ede8bf55897a982e

  • SHA512

    a9ad943b7430349b995d8ba7c57569e4d6a66ed62ebb5cfc471a54194423cc7d07d7d260715e33e28e825ae7274750d77a2d1f5a2047fc5fdfea9ca9b8ef5f09

  • SSDEEP

    3072:tzaE7ZKrQMh/x8orIrUCic0PglqlsvARnj1N2Kl55D8ejI1AbWxS/Cau2lPX3LMB:ZaE4rQqlrIQL8Eh2KloesObWxS/TzMB

Malware Config

Extracted

Family

gozi

Attributes
  • build

    214085

Extracted

Family

gozi

Botnet

3475

C2

google.com

gmail.com

q982yeq23.xyz

t7763jykqeiy.com

hjruu.com

Attributes
  • build

    214085

  • dga_base_url

    constitution.org/usdeclar.txt

  • dga_crc

    0x4eb7d2ca

  • dga_season

    10

  • dga_tlds

    com

    ru

    org

  • exe_type

    loader

  • server_id

    12

rsa_pubkey.plain
serpent.plain

Signatures

  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SetWindowsHookEx 20 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e0c7c3153dd109789ad5514078887443_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e0c7c3153dd109789ad5514078887443_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:64
  • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
    "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2552
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2272
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2272 CREDAT:17410 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1340
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5076
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5076 CREDAT:17410 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:764
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:17410 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1620
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4136
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4136 CREDAT:17410 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:912
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3120
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3120 CREDAT:17410 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\WLXU5DI6\robot[1].png

    Filesize

    6KB

    MD5

    4c9acf280b47cef7def3fc91a34c7ffe

    SHA1

    c32bb847daf52117ab93b723d7c57d8b1e75d36b

    SHA256

    5f9fc5b3fbddf0e72c5c56cdcfc81c6e10c617d70b1b93fbe1e4679a8797bff7

    SHA512

    369d5888e0d19b46cb998ea166d421f98703aec7d82a02dc7ae10409aec253a7ce099d208500b4e39779526219301c66c2fd59fe92170b324e70cf63ce2b429c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\ZK5NPJWQ\googlelogo_color_150x54dp[1].png

    Filesize

    3KB

    MD5

    9d73b3aa30bce9d8f166de5178ae4338

    SHA1

    d0cbc46850d8ed54625a3b2b01a2c31f37977e75

    SHA256

    dbef5e5530003b7233e944856c23d1437902a2d3568cdfd2beaf2166e9ca9139

    SHA512

    8e55d1677cdbfe9db6700840041c815329a57df69e303adc1f994757c64100fe4a3a17e86ef4613f4243e29014517234debfbcee58dab9fc56c81dd147fdc058

  • C:\Users\Admin\AppData\Local\Temp\~DF84717698256DDEBF.TMP

    Filesize

    16KB

    MD5

    4c4e70be411f5423c837111d73883457

    SHA1

    fea1ec4b7d8a74311976c835e7c5cd6811751707

    SHA256

    82f6bc98ee1356a182ffe2a59febb8db51fd81d647122c91769ffc1176e1ccb3

    SHA512

    6a9d3e632bbe59c2d80bf805bc0831742492af03f1d47acd5517222d9beb4043ce0d3a93ea5a187025a4678d8ffb41b5f323e3a6c71601b75675f674febbc191

  • memory/64-2-0x0000000000D35000-0x0000000000D3A000-memory.dmp

    Filesize

    20KB

  • memory/64-3-0x0000000000D10000-0x0000000000DCF000-memory.dmp

    Filesize

    764KB

  • memory/64-1-0x0000000000D10000-0x0000000000DCF000-memory.dmp

    Filesize

    764KB

  • memory/64-0-0x0000000000D10000-0x0000000000DCF000-memory.dmp

    Filesize

    764KB

  • memory/64-4-0x0000000001080000-0x000000000108F000-memory.dmp

    Filesize

    60KB

  • memory/64-11-0x0000000000D10000-0x0000000000DCF000-memory.dmp

    Filesize

    764KB