Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 12:12
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_d9f17cbe3cd38366bed092fef1ef3c50b3317ba65c5780eb2dd69e7ccdcf64a3.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_d9f17cbe3cd38366bed092fef1ef3c50b3317ba65c5780eb2dd69e7ccdcf64a3.dll
-
Size
624KB
-
MD5
d871d855e857670250712b815c945a46
-
SHA1
5f96f31b1c10d0bda568c850e3ae269a495742a0
-
SHA256
d9f17cbe3cd38366bed092fef1ef3c50b3317ba65c5780eb2dd69e7ccdcf64a3
-
SHA512
9e456ea60e3ae3718405aeba76a14441a07d7d18824a6c23c08b4d2634219271ccb1d6e2e26421fe9a0636a99e6cc7686e0d8da43f2638e33d5627d1b8283941
-
SSDEEP
12288:+w1lEKREbddtOYRbHzcPwka1dCjc3N8ZW:+w1lEKOpuYxiwkkgjAN8ZW
Malware Config
Extracted
gozi
Extracted
gozi
999
config.edge.skype.com
146.70.35.138
146.70.35.142
-
base_path
/phpadmin/
-
build
250227
-
exe_type
loader
-
extension
.src
-
server_id
50
Signatures
-
Gozi family
-
Blocklisted process makes network request 3 IoCs
flow pid Process 23 5076 rundll32.exe 37 5076 rundll32.exe 47 5076 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3280 wrote to memory of 5076 3280 rundll32.exe 82 PID 3280 wrote to memory of 5076 3280 rundll32.exe 82 PID 3280 wrote to memory of 5076 3280 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d9f17cbe3cd38366bed092fef1ef3c50b3317ba65c5780eb2dd69e7ccdcf64a3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d9f17cbe3cd38366bed092fef1ef3c50b3317ba65c5780eb2dd69e7ccdcf64a3.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:5076
-