Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 21:46
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_fbf8d7453bb62faf0e0d25430d0ae2f1e74224347d3ef51c561287085c072ae9.dll
Resource
win7-20241023-en
General
-
Target
JaffaCakes118_fbf8d7453bb62faf0e0d25430d0ae2f1e74224347d3ef51c561287085c072ae9.dll
-
Size
626KB
-
MD5
6356590afc26deeef9b678d2ce08b702
-
SHA1
4a4a3c7b05422d12e64fced18daec8fff04d5bd5
-
SHA256
fbf8d7453bb62faf0e0d25430d0ae2f1e74224347d3ef51c561287085c072ae9
-
SHA512
54621268cd5c58db5895a625818acfc77fab5191dcf3bab86cf676ade0f3de1be63bd29bdac83ee8c00a5119506965773c26c6038a583d6a0e4f5ea5a5715046
-
SSDEEP
12288:+w1lEKREbddtOYRbHzcPwka1dCjc3N8Z2:+w1lEKOpuYxiwkkgjAN8Z2
Malware Config
Extracted
gozi
Extracted
gozi
999
config.edge.skype.com
146.70.35.138
146.70.35.142
-
base_path
/phpadmin/
-
build
250227
-
exe_type
loader
-
extension
.src
-
server_id
50
Signatures
-
Gozi family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2836 wrote to memory of 2852 2836 rundll32.exe 30 PID 2836 wrote to memory of 2852 2836 rundll32.exe 30 PID 2836 wrote to memory of 2852 2836 rundll32.exe 30 PID 2836 wrote to memory of 2852 2836 rundll32.exe 30 PID 2836 wrote to memory of 2852 2836 rundll32.exe 30 PID 2836 wrote to memory of 2852 2836 rundll32.exe 30 PID 2836 wrote to memory of 2852 2836 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_fbf8d7453bb62faf0e0d25430d0ae2f1e74224347d3ef51c561287085c072ae9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_fbf8d7453bb62faf0e0d25430d0ae2f1e74224347d3ef51c561287085c072ae9.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2852
-