Behavioral task
behavioral1
Sample
JaffaCakes118_2d59a46827d92b7654c785a6f79a6256d399b7764fa3b6dc9c4d993b2c9693ce.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_2d59a46827d92b7654c785a6f79a6256d399b7764fa3b6dc9c4d993b2c9693ce.dll
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_2d59a46827d92b7654c785a6f79a6256d399b7764fa3b6dc9c4d993b2c9693ce
-
Size
43KB
-
MD5
268e113bca9a9aa2e62824ac6518a277
-
SHA1
ac65ddf71f623103a1071bcebea88ed258c25533
-
SHA256
2d59a46827d92b7654c785a6f79a6256d399b7764fa3b6dc9c4d993b2c9693ce
-
SHA512
773672dc51734cf54bab7d985085f91ae1f9971be6eb73b2e6ec9eacd70ddb96e8f46da302724681fb2dc8e76f814a1596cc75a80392b66fe17d0d3f027170c4
-
SSDEEP
768:5oDIq0MrJBk0+1XZtg2+JUqBbqDHqF1I7p4lNimySSO3Wo/x93Y1KsySVBnl:32J9+1Xb7+JNeDqF1I7+lNimD3Wcx9oL
Malware Config
Extracted
gozi
777999
config.edge.skype.com
146.70.35.138
146.70.35.142
-
base_path
/phpadmin/
-
build
250225
-
exe_type
loader
-
extension
.src
-
server_id
50
Signatures
-
Gozi family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_2d59a46827d92b7654c785a6f79a6256d399b7764fa3b6dc9c4d993b2c9693ce
Files
-
JaffaCakes118_2d59a46827d92b7654c785a6f79a6256d399b7764fa3b6dc9c4d993b2c9693ce.dll windows:5 windows x86 arch:x86
11e4a06aed8466f4a1d1b855f6202f8f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ntdll
memset
sprintf
strcpy
_snwprintf
ZwQueryInformationToken
wcstombs
ZwOpenProcess
ZwClose
ZwOpenProcessToken
mbstowcs
memcpy
_snprintf
_aulldiv
_allmul
_aullrem
RtlUnwind
NtQueryVirtualMemory
kernel32
RaiseException
InterlockedExchange
HeapAlloc
InterlockedIncrement
InterlockedDecrement
HeapFree
SetEvent
SleepEx
GetTickCount
GetCurrentThread
GetSystemTimeAsFileTime
HeapDestroy
HeapCreate
GetLastError
QueueUserAPC
lstrlenA
SetWaitableTimer
Process32First
WaitForSingleObject
Sleep
CreateEventA
lstrlenW
GetProcAddress
Process32Next
WaitForMultipleObjects
GetModuleHandleA
CreateToolhelp32Snapshot
CloseHandle
CreateWaitableTimerA
lstrcpyA
QueryPerformanceFrequency
LocalAlloc
lstrcmpW
LoadLibraryA
FreeLibrary
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
lstrcmpA
CreateFileMappingW
MapViewOfFile
ExpandEnvironmentStringsW
GetComputerNameExA
WideCharToMultiByte
GetComputerNameW
QueryPerformanceCounter
lstrcatA
GetCurrentProcessId
OpenProcess
GetVersion
ExpandEnvironmentStringsA
oleaut32
SysFreeString
SafeArrayDestroy
SafeArrayCreate
SysAllocString
winhttp
WinHttpQueryHeaders
WinHttpCloseHandle
WinHttpConnect
WinHttpQueryDataAvailable
WinHttpReceiveResponse
WinHttpQueryOption
WinHttpSetOption
WinHttpOpen
WinHttpOpenRequest
WinHttpReadData
WinHttpSendRequest
Sections
.text Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 936B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ