Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 12:04
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_a7dfadc9b0803dfe48ca908013282bd1c836232b9c52f2afe034dc65816c95ce.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_a7dfadc9b0803dfe48ca908013282bd1c836232b9c52f2afe034dc65816c95ce.dll
-
Size
626KB
-
MD5
c8e139923d147e469e26ae9cc51a03d6
-
SHA1
de390674f9c43e1378f6ebfe67de5440661f749e
-
SHA256
a7dfadc9b0803dfe48ca908013282bd1c836232b9c52f2afe034dc65816c95ce
-
SHA512
c9c8069fca7447b5d284c5c7baec6498d341ad41ac010b4f0344859050c2b5bf6a88a7b21331e2a9a167b1dd59384ed53a334dbbd8def22747fcc183e2aeb553
-
SSDEEP
12288:+w1lEKREbddtOYRbHzcPwka1dCjc3N8ZQ:+w1lEKOpuYxiwkkgjAN8ZQ
Malware Config
Extracted
gozi
Extracted
gozi
999
config.edge.skype.com
146.70.35.138
146.70.35.142
-
base_path
/phpadmin/
-
build
250227
-
exe_type
loader
-
extension
.src
-
server_id
50
Signatures
-
Gozi family
-
Blocklisted process makes network request 3 IoCs
flow pid Process 16 1420 rundll32.exe 25 1420 rundll32.exe 43 1420 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 224 wrote to memory of 1420 224 rundll32.exe 82 PID 224 wrote to memory of 1420 224 rundll32.exe 82 PID 224 wrote to memory of 1420 224 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a7dfadc9b0803dfe48ca908013282bd1c836232b9c52f2afe034dc65816c95ce.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a7dfadc9b0803dfe48ca908013282bd1c836232b9c52f2afe034dc65816c95ce.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:1420
-