Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-04-2024 09:21

General

  • Target

    fc6e37e0aed3ddf819bc3db52c3894d0_JaffaCakes118.dll

  • Size

    476KB

  • MD5

    fc6e37e0aed3ddf819bc3db52c3894d0

  • SHA1

    422ee70aa729bbc279e39a1dbd4329585d5dee90

  • SHA256

    07c4de5228d721b6ecd076e4fea4a8f1bc55ecc65e7f76e5aed8da390207db7b

  • SHA512

    93c4b86d8fe124a2926f8f1fa84e2bbb96aa41972956e24cc97ed3015044577d179ec9715b8343694712c400aeb30842ad678b5f854081c7d6afbb29c9535bb4

  • SSDEEP

    12288:SWOHbRDDziohgDTw2ZLuFeCshv6Fsgg+:SWOHdD3hmTwKn3hvkg

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

1500

C2

f1.bablefiler.at

f22.avanoruk.com

Attributes
  • build

    250211

  • exe_type

    loader

  • server_id

    580

rsa_pubkey.plain
aes.plain

Signatures

  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\fc6e37e0aed3ddf819bc3db52c3894d0_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3928
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\fc6e37e0aed3ddf819bc3db52c3894d0_JaffaCakes118.dll,#1
      2⤵
        PID:5112

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/5112-0-0x0000000075650000-0x00000000756DF000-memory.dmp
      Filesize

      572KB

    • memory/5112-1-0x0000000075650000-0x00000000756DF000-memory.dmp
      Filesize

      572KB

    • memory/5112-2-0x0000000075650000-0x00000000756DF000-memory.dmp
      Filesize

      572KB

    • memory/5112-3-0x00000000012D0000-0x00000000012D1000-memory.dmp
      Filesize

      4KB

    • memory/5112-4-0x0000000002D10000-0x0000000002D1D000-memory.dmp
      Filesize

      52KB

    • memory/5112-7-0x0000000075650000-0x00000000756DF000-memory.dmp
      Filesize

      572KB