Analysis
-
max time kernel
141s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 12:04
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_a7dfadc9b0803dfe48ca908013282bd1c836232b9c52f2afe034dc65816c95ce.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_a7dfadc9b0803dfe48ca908013282bd1c836232b9c52f2afe034dc65816c95ce.dll
-
Size
626KB
-
MD5
c8e139923d147e469e26ae9cc51a03d6
-
SHA1
de390674f9c43e1378f6ebfe67de5440661f749e
-
SHA256
a7dfadc9b0803dfe48ca908013282bd1c836232b9c52f2afe034dc65816c95ce
-
SHA512
c9c8069fca7447b5d284c5c7baec6498d341ad41ac010b4f0344859050c2b5bf6a88a7b21331e2a9a167b1dd59384ed53a334dbbd8def22747fcc183e2aeb553
-
SSDEEP
12288:+w1lEKREbddtOYRbHzcPwka1dCjc3N8ZQ:+w1lEKOpuYxiwkkgjAN8ZQ
Malware Config
Extracted
gozi
Extracted
gozi
999
config.edge.skype.com
146.70.35.138
146.70.35.142
-
base_path
/phpadmin/
-
build
250227
-
exe_type
loader
-
extension
.src
-
server_id
50
Signatures
-
Gozi family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2224 wrote to memory of 1652 2224 rundll32.exe 30 PID 2224 wrote to memory of 1652 2224 rundll32.exe 30 PID 2224 wrote to memory of 1652 2224 rundll32.exe 30 PID 2224 wrote to memory of 1652 2224 rundll32.exe 30 PID 2224 wrote to memory of 1652 2224 rundll32.exe 30 PID 2224 wrote to memory of 1652 2224 rundll32.exe 30 PID 2224 wrote to memory of 1652 2224 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a7dfadc9b0803dfe48ca908013282bd1c836232b9c52f2afe034dc65816c95ce.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a7dfadc9b0803dfe48ca908013282bd1c836232b9c52f2afe034dc65816c95ce.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1652
-