Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 18:56
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1777c444d475d16b30c0476f0fa43f8d723eebff0a778b820f4cf4fd3d57a583.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_1777c444d475d16b30c0476f0fa43f8d723eebff0a778b820f4cf4fd3d57a583.dll
-
Size
626KB
-
MD5
08bac10b6b48df3cbe7f1b6d50024dbf
-
SHA1
9c8d08fd1d35e2b0e06636a2477e2a96e21706fe
-
SHA256
1777c444d475d16b30c0476f0fa43f8d723eebff0a778b820f4cf4fd3d57a583
-
SHA512
5e8b9836b3d4512561811064092aee1f13bb698ec5ff8dfd20626142be80470abcdf8ea6701d023ece10801a6759f43779a259c576d6fe0bca6771b3bc69e523
-
SSDEEP
12288:+w1lEKREbddtOYRbHzcPwka1dCjc3N8Ze:+w1lEKOpuYxiwkkgjAN8Ze
Malware Config
Extracted
gozi
Extracted
gozi
999
config.edge.skype.com
146.70.35.138
146.70.35.142
-
base_path
/phpadmin/
-
build
250227
-
exe_type
loader
-
extension
.src
-
server_id
50
Signatures
-
Gozi family
-
Blocklisted process makes network request 4 IoCs
flow pid Process 15 1880 rundll32.exe 21 1880 rundll32.exe 47 1880 rundll32.exe 48 1880 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3112 wrote to memory of 1880 3112 rundll32.exe 83 PID 3112 wrote to memory of 1880 3112 rundll32.exe 83 PID 3112 wrote to memory of 1880 3112 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1777c444d475d16b30c0476f0fa43f8d723eebff0a778b820f4cf4fd3d57a583.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1777c444d475d16b30c0476f0fa43f8d723eebff0a778b820f4cf4fd3d57a583.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:1880
-