Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 21:46
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_fbf8d7453bb62faf0e0d25430d0ae2f1e74224347d3ef51c561287085c072ae9.dll
Resource
win7-20241023-en
General
-
Target
JaffaCakes118_fbf8d7453bb62faf0e0d25430d0ae2f1e74224347d3ef51c561287085c072ae9.dll
-
Size
626KB
-
MD5
6356590afc26deeef9b678d2ce08b702
-
SHA1
4a4a3c7b05422d12e64fced18daec8fff04d5bd5
-
SHA256
fbf8d7453bb62faf0e0d25430d0ae2f1e74224347d3ef51c561287085c072ae9
-
SHA512
54621268cd5c58db5895a625818acfc77fab5191dcf3bab86cf676ade0f3de1be63bd29bdac83ee8c00a5119506965773c26c6038a583d6a0e4f5ea5a5715046
-
SSDEEP
12288:+w1lEKREbddtOYRbHzcPwka1dCjc3N8Z2:+w1lEKOpuYxiwkkgjAN8Z2
Malware Config
Extracted
gozi
Extracted
gozi
999
config.edge.skype.com
146.70.35.138
146.70.35.142
-
base_path
/phpadmin/
-
build
250227
-
exe_type
loader
-
extension
.src
-
server_id
50
Signatures
-
Gozi family
-
Blocklisted process makes network request 3 IoCs
flow pid Process 17 5012 rundll32.exe 31 5012 rundll32.exe 44 5012 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4000 wrote to memory of 5012 4000 rundll32.exe 82 PID 4000 wrote to memory of 5012 4000 rundll32.exe 82 PID 4000 wrote to memory of 5012 4000 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_fbf8d7453bb62faf0e0d25430d0ae2f1e74224347d3ef51c561287085c072ae9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_fbf8d7453bb62faf0e0d25430d0ae2f1e74224347d3ef51c561287085c072ae9.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:5012
-