Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2024 18:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ebb94346f19c906fd5da7bef1e85950d_JaffaCakes118.dll
Resource
win7-20240220-en
windows7-x64
2 signatures
150 seconds
General
-
Target
ebb94346f19c906fd5da7bef1e85950d_JaffaCakes118.dll
-
Size
643KB
-
MD5
ebb94346f19c906fd5da7bef1e85950d
-
SHA1
7da634b0050cc24fd9cb60ac12303ea2279dbe8b
-
SHA256
60591e0599585333cb8013f02b808e18dc7c4b529bad9ed8073302a14c0179a0
-
SHA512
d2d0181f12cde858138894119ffd67efab4e5c67d60c3ce8c52123cf78ee31bdc93a8bc89cf06ee5b7e05d9f31f9f5e798c524a2b6213002a095f8e0ca65d731
-
SSDEEP
12288:HMUpikM1ABVY4lsBnllWzwazxRvwN9QKC71L715+PoR5nFIlW2i:K4Y4lglQzwyxRvwDSJLT5FIV
Malware Config
Extracted
Family
gozi
Extracted
Family
gozi
Botnet
1500
C2
gtr.antoinfer.com
app.bighomegl.at
Attributes
-
build
250211
-
exe_type
loader
-
server_id
580
rsa_pubkey.plain
aes.plain
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4196 wrote to memory of 4404 4196 rundll32.exe rundll32.exe PID 4196 wrote to memory of 4404 4196 rundll32.exe rundll32.exe PID 4196 wrote to memory of 4404 4196 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ebb94346f19c906fd5da7bef1e85950d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ebb94346f19c906fd5da7bef1e85950d_JaffaCakes118.dll,#12⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4404-0-0x0000000075780000-0x0000000075833000-memory.dmpFilesize
716KB
-
memory/4404-1-0x0000000000750000-0x0000000000751000-memory.dmpFilesize
4KB
-
memory/4404-2-0x0000000000820000-0x000000000082D000-memory.dmpFilesize
52KB
-
memory/4404-5-0x0000000075780000-0x0000000075833000-memory.dmpFilesize
716KB