Analysis
-
max time kernel
142s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2024 11:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
54645e480f42f0fd6553dd84925fc652_JaffaCakes118.dll
Resource
win7-20231129-en
windows7-x64
2 signatures
150 seconds
General
-
Target
54645e480f42f0fd6553dd84925fc652_JaffaCakes118.dll
-
Size
185KB
-
MD5
54645e480f42f0fd6553dd84925fc652
-
SHA1
55549ff0d413f169796023c502fb29e72d2217e1
-
SHA256
eac2aee6b368e21e8268c0b43dede5b863e75db8f8815d6011e9cc91d2d04334
-
SHA512
ce3bb4c95bd9fba4a46c111c6ed312fcf0404029ee9ada7c74473a5efd0450a08061d1e30d66a2d8d0799749576df534d892fcbec5d028e620e4d7b4f305a094
-
SSDEEP
3072:eu94wHeYVfD93uh/TATDB4GbUQwTOuAjOBXmBj4/s2NUamijQ+dk4a:R4/WD96oOGLuOzjYem/+F5e
Malware Config
Extracted
Family
gozi
Attributes
-
build
217108
Extracted
Family
gozi
Botnet
1000
C2
http://form-updater.at
Attributes
-
build
217108
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
dns_servers
107.174.86.134
107.175.127.22
-
exe_type
loader
-
server_id
12
rsa_pubkey.plain
serpent.plain
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 5080 wrote to memory of 4836 5080 rundll32.exe rundll32.exe PID 5080 wrote to memory of 4836 5080 rundll32.exe rundll32.exe PID 5080 wrote to memory of 4836 5080 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\54645e480f42f0fd6553dd84925fc652_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\54645e480f42f0fd6553dd84925fc652_JaffaCakes118.dll,#12⤵PID:4836