Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-09-2024 17:00
Static task
static1
Behavioral task
behavioral1
Sample
f2b8919e6b5c1eccd3e0f8d33e244971_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f2b8919e6b5c1eccd3e0f8d33e244971_JaffaCakes118.exe
-
Size
269KB
-
MD5
f2b8919e6b5c1eccd3e0f8d33e244971
-
SHA1
a53f5ce03252c9ae946774fdf508752141e512d0
-
SHA256
8d539adc3ed28c1eafffb0f31301a87e5a8b0747e921f4fc8ec8b94e021b7c48
-
SHA512
c019c5de63de23c01400fed866ce76260fdd16a53b7e570631fff11385245be0d6389bce5a749d4a956b417dd07f3bcc57943ac5a1985493004a38179f7870dc
-
SSDEEP
6144:QVfmmDgASD5W/adCxsT4/YFqBcIsBGOhN/35:QVfjDmtW/adCC4/UIsBhN/5
Malware Config
Extracted
gozi
-
build
215165
Extracted
gozi
3151
zardinglog.com
sycingshbo.com
imminesenc.com
-
build
215165
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2b8919e6b5c1eccd3e0f8d33e244971_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000006ed6a32c0d0905ace51c4490071ecbb0c7c25b4c1468fd07373bef1ef90866a9000000000e80000000020000200000009a7c4cc57f0db809b167f8ce199bd123f7d9cd9b6e4cc6080c8073b60d414b98200000008f124bdb2c577c58abcb4692feee3eef6655fffe1ae1d2ddea3cf1520727e94940000000f5dcd789ada0c61d35ddf38ad6666e477490a360980dfa2207c598cdc51cac08b757f61b00dde0b8302037c815e0f2394670eb1480778f62e86c1204415936c1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8054e832da0ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5CA56331-79CD-11EF-A6EB-D60C98DC526F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2748 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2748 iexplore.exe 2748 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2712 2748 iexplore.exe 33 PID 2748 wrote to memory of 2712 2748 iexplore.exe 33 PID 2748 wrote to memory of 2712 2748 iexplore.exe 33 PID 2748 wrote to memory of 2712 2748 iexplore.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2b8919e6b5c1eccd3e0f8d33e244971_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f2b8919e6b5c1eccd3e0f8d33e244971_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:1984
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2748 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559e5bc6f99f9c7ddda96a16b5b88546d
SHA1e5e77a1b0672c1ffe6cb88a1f50a39ddf354f8aa
SHA2565f90a68ec63ae549d4f715463c39191be3798a8337b0418427613c749f2147e3
SHA5125e94f967b38261dfbed46f30a1edd41b7ba6fa4ec3ec00260768e97cfe6c0db8a41f7926dbf5fe7b78d335e2117c7d7cf102884354b5456a9c30f23973c15deb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58155abdf09f488b71deed9e0ec719708
SHA1ea4a1519cc88fd63077832a6dd0333d8330ac531
SHA256d2ad855a01dc3409e17b6023dba4ab8cd0c3ba78daf427324a57c9dc82d7daf5
SHA5121b2b4cf4386f11572de56936ed257b6851ed50083270558a5598181870873f7465684ec5ba5d54202eec92fffbc0b6b9e305d418a2017ebd3f1d4fc587835633
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5536737b9676e276f50babed6cc197043
SHA125b10a4426eda40f822852a8424cd0ba8f4f0ccd
SHA256c3cfd3f74a15dc3e70ed98053eee746b0827e3244c5376eee97695cc9e3d5cee
SHA5127bedb0c5f04873af0401f41295755689212240ae7b83f3d3f082f8b041977f3359edd431364694c4649133bba96aa6b7242cef7287ff1dcfa0f0323434047069
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5497fce157d802e3f6a09bf107d74401b
SHA1d50cbc882586ec4cea6c96a46660c9b333ad815f
SHA25608ac9d0506c552b3968423002323660f53d92f7381cd8cf2f2048279af98c4a9
SHA512baa98786b8d9d27ac2d24c69cfdecbb58f3a1f96173a2c02ead23c4e21ea7347687751aac08611e7dc409d2e5123ef7a0059d38f9c784ec15bbf046492139f5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5397b0da1d7959f1e1c8f3c1627702c62
SHA14cf97df0c737d898e5a83c6d81f00ed8d0d13b43
SHA256224561df20b7f80ecb72b4941e1134b75b48b09d3e869cc9b12bd298854d6e27
SHA51275066670aec1d7dd3265af065b6554a874d847ab54219d0f223e547d0fa556e09ec8cd0aefbc0f416877110f1e94b4cb83d76166c3cb6590bdb4ce9a79815b84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cf91b52e06844618c80f68064d7fd5d
SHA1ae0c5fc74907a3dfda25c09d558944c77c4b522b
SHA2563394a845623bb0bcb7b37fba6fe534b5aeb4c56352081712442eecb23d6578b0
SHA51232680e001e1068c40cb38f088a7277d623aea99e2cd14edc2ef8eb99e58950aea9d7e1e0c8aa520d51122011a4e5dfc8777e7b37dc4feed0c96d5e4deac352a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dad1b9d2d7e629398d74a3bcf0676fc6
SHA10e25511f346fd4c564eea2753f41466b8823c21e
SHA2567feab4066acc036e16d97fd85e55017ef52820942379b839f15c14cbcf2bf88c
SHA5127157e1b2cd7f1fcfd4e6417353eab755c2157424dd1be88571e6dbb18df415118182df146c7a05a66492a174adc42269628d24ddb28848aacacda192201ddfa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3bbc982757df64799361553705118b2
SHA1178c58bc4a7799be6d72a68b2f28bc287bc6f378
SHA25610d9a6db7ae3a7026df949a5e69eba302b52b6ae22b36c65274c232e4c68cc03
SHA5126fc8fbfe8880e47bc1c9dc309dccdebe2987c342b6c49061422b0f660b3dceaf62a67e298c4ee96b93874c8082ee83df3f4b6530a0cb7de0a4fcef4469966e59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522696b7a49f9ecb1caf5dd490e86e8c6
SHA17c05d92457fd0ced0f0fa272649585dde9b79c44
SHA2569a9485858dba02e2db7584c1c7c75b38234e0d9d80c06d10830ac9652039f6e8
SHA512f114ce3410b98ffc7993b3997fd5b413a1c07b7b1b76c77f2a45661250205a45f183ede993350237a280ed5a6c6f65ed83f180081074f17ff0aba81550a9d73b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b