Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 20:05
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_90084242fd519b3a14db407c7ba6fb2db26be500c2ea4f466af8887cd472fb67.dll
Resource
win7-20240708-en
General
-
Target
JaffaCakes118_90084242fd519b3a14db407c7ba6fb2db26be500c2ea4f466af8887cd472fb67.dll
-
Size
626KB
-
MD5
f2da170689dde4b9a97c5305503cb3d9
-
SHA1
89fce97c5194e0498fe9c9cc19a4f7af208aa3f0
-
SHA256
90084242fd519b3a14db407c7ba6fb2db26be500c2ea4f466af8887cd472fb67
-
SHA512
061c4ab465a38ff6341f0886e607a15921ac922a17d54e3801c06ddf356cb2a38941e9c7499c59b9fa3332dc18a6576960cd7c050b599e083b8497f9e45c28fe
-
SSDEEP
12288:QxHGz7jrsxOZWGvw2uV+HZfyWdAHKHRuhtOJbIP5UsT9GdOxRCeg:jtWGvCV+5Qo8hPNT961eg
Malware Config
Extracted
gozi
Extracted
gozi
5513
greenwoodgrace.website
-
base_path
/manifest/
-
build
250187
-
dga_season
10
-
exe_type
loader
-
extension
.cnx
-
server_id
12
Signatures
-
Gozi family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2684 2160 rundll32.exe 30 PID 2160 wrote to memory of 2684 2160 rundll32.exe 30 PID 2160 wrote to memory of 2684 2160 rundll32.exe 30 PID 2160 wrote to memory of 2684 2160 rundll32.exe 30 PID 2160 wrote to memory of 2684 2160 rundll32.exe 30 PID 2160 wrote to memory of 2684 2160 rundll32.exe 30 PID 2160 wrote to memory of 2684 2160 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_90084242fd519b3a14db407c7ba6fb2db26be500c2ea4f466af8887cd472fb67.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_90084242fd519b3a14db407c7ba6fb2db26be500c2ea4f466af8887cd472fb67.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2684
-