Analysis
-
max time kernel
140s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 03:22
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e739ee352a7fa996464d11da615a40e24a7608a4a7187cd9d1e373aebdc0d403.dll
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_e739ee352a7fa996464d11da615a40e24a7608a4a7187cd9d1e373aebdc0d403.dll
-
Size
625KB
-
MD5
ddbed2100c6f33448487040950877730
-
SHA1
976f4818d44db7b2ba905a1e4d683c4c73be46d6
-
SHA256
e739ee352a7fa996464d11da615a40e24a7608a4a7187cd9d1e373aebdc0d403
-
SHA512
7d7dbde4c553c1645771c50ebb25f80267cd77dd0acbe64e90a0386ea16cf3307bdb832933cde2d6707087cdfa08faf55ea7078d9e877a6703ca7f9c50118f70
-
SSDEEP
12288:+w1lEKREbddtOYRbHzcPwka1dCjc3N8Z5:+w1lEKOpuYxiwkkgjAN8Z5
Malware Config
Extracted
gozi
Extracted
gozi
999
config.edge.skype.com
146.70.35.138
146.70.35.142
-
base_path
/phpadmin/
-
build
250227
-
exe_type
loader
-
extension
.src
-
server_id
50
Signatures
-
Gozi family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2496 wrote to memory of 2488 2496 rundll32.exe 30 PID 2496 wrote to memory of 2488 2496 rundll32.exe 30 PID 2496 wrote to memory of 2488 2496 rundll32.exe 30 PID 2496 wrote to memory of 2488 2496 rundll32.exe 30 PID 2496 wrote to memory of 2488 2496 rundll32.exe 30 PID 2496 wrote to memory of 2488 2496 rundll32.exe 30 PID 2496 wrote to memory of 2488 2496 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e739ee352a7fa996464d11da615a40e24a7608a4a7187cd9d1e373aebdc0d403.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e739ee352a7fa996464d11da615a40e24a7608a4a7187cd9d1e373aebdc0d403.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2488
-