Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 01:47
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_19be5d581071096d88b6eb126cbd7cecc4cf82c8b9586a15b3328ca89da99032.dll
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_19be5d581071096d88b6eb126cbd7cecc4cf82c8b9586a15b3328ca89da99032.dll
-
Size
624KB
-
MD5
5daf03082ed2cfdfe4011b071e5c138b
-
SHA1
ff3fa0da81d1d436a0afdc18a57b3ec4180b6bf6
-
SHA256
19be5d581071096d88b6eb126cbd7cecc4cf82c8b9586a15b3328ca89da99032
-
SHA512
4ee9af8ccdb4bbd792777916a672aa17ac1c2fb95aa8210d83f0c2390429fdfdb61d6b62834b1b65deafaee3bfd73d85eef1882e09562a42a5a619034b7177b5
-
SSDEEP
12288:+w1lEKREbddtOYRbHzcPwka1dCjc3N8Zz:+w1lEKOpuYxiwkkgjAN8Zz
Malware Config
Extracted
gozi
Extracted
gozi
999
config.edge.skype.com
146.70.35.138
146.70.35.142
-
base_path
/phpadmin/
-
build
250227
-
exe_type
loader
-
extension
.src
-
server_id
50
Signatures
-
Gozi family
-
Blocklisted process makes network request 4 IoCs
flow pid Process 12 2620 rundll32.exe 23 2620 rundll32.exe 46 2620 rundll32.exe 47 2620 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 384 wrote to memory of 2620 384 rundll32.exe 82 PID 384 wrote to memory of 2620 384 rundll32.exe 82 PID 384 wrote to memory of 2620 384 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_19be5d581071096d88b6eb126cbd7cecc4cf82c8b9586a15b3328ca89da99032.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_19be5d581071096d88b6eb126cbd7cecc4cf82c8b9586a15b3328ca89da99032.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:2620
-