Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2024 09:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
fc6e37e0aed3ddf819bc3db52c3894d0_JaffaCakes118.dll
Resource
win7-20231129-en
windows7-x64
2 signatures
150 seconds
General
-
Target
fc6e37e0aed3ddf819bc3db52c3894d0_JaffaCakes118.dll
-
Size
476KB
-
MD5
fc6e37e0aed3ddf819bc3db52c3894d0
-
SHA1
422ee70aa729bbc279e39a1dbd4329585d5dee90
-
SHA256
07c4de5228d721b6ecd076e4fea4a8f1bc55ecc65e7f76e5aed8da390207db7b
-
SHA512
93c4b86d8fe124a2926f8f1fa84e2bbb96aa41972956e24cc97ed3015044577d179ec9715b8343694712c400aeb30842ad678b5f854081c7d6afbb29c9535bb4
-
SSDEEP
12288:SWOHbRDDziohgDTw2ZLuFeCshv6Fsgg+:SWOHdD3hmTwKn3hvkg
Malware Config
Extracted
Family
gozi
Extracted
Family
gozi
Botnet
1500
C2
f1.bablefiler.at
f22.avanoruk.com
Attributes
-
build
250211
-
exe_type
loader
-
server_id
580
rsa_pubkey.plain
aes.plain
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3928 wrote to memory of 5112 3928 rundll32.exe rundll32.exe PID 3928 wrote to memory of 5112 3928 rundll32.exe rundll32.exe PID 3928 wrote to memory of 5112 3928 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fc6e37e0aed3ddf819bc3db52c3894d0_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fc6e37e0aed3ddf819bc3db52c3894d0_JaffaCakes118.dll,#12⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/5112-0-0x0000000075650000-0x00000000756DF000-memory.dmpFilesize
572KB
-
memory/5112-1-0x0000000075650000-0x00000000756DF000-memory.dmpFilesize
572KB
-
memory/5112-2-0x0000000075650000-0x00000000756DF000-memory.dmpFilesize
572KB
-
memory/5112-3-0x00000000012D0000-0x00000000012D1000-memory.dmpFilesize
4KB
-
memory/5112-4-0x0000000002D10000-0x0000000002D1D000-memory.dmpFilesize
52KB
-
memory/5112-7-0x0000000075650000-0x00000000756DF000-memory.dmpFilesize
572KB