Analysis
-
max time kernel
140s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 19:31
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_752571905b92f1672b7f8aecb6b35e79527617d8928fef9fe0907708ed81f861.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_752571905b92f1672b7f8aecb6b35e79527617d8928fef9fe0907708ed81f861.dll
-
Size
625KB
-
MD5
7fb6e4094985e463584b368661a56c34
-
SHA1
125049e4842a49ddf3f01985cb54298db560e4ae
-
SHA256
752571905b92f1672b7f8aecb6b35e79527617d8928fef9fe0907708ed81f861
-
SHA512
8d60d63562591e87954c430f9eefef510b61edf30e3e0f5506a01acb7453dd27bf1ee1b0eed2593e04fcee82722332f8693808e157a560f389879a734dd63d78
-
SSDEEP
12288:+w1lEKREbddtOYRbHzcPwka1dCjc3N8Zvl:+w1lEKOpuYxiwkkgjAN8Zvl
Malware Config
Extracted
gozi
Extracted
gozi
999
config.edge.skype.com
146.70.35.138
146.70.35.142
-
base_path
/phpadmin/
-
build
250227
-
exe_type
loader
-
extension
.src
-
server_id
50
Signatures
-
Gozi family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2124 2648 rundll32.exe 30 PID 2648 wrote to memory of 2124 2648 rundll32.exe 30 PID 2648 wrote to memory of 2124 2648 rundll32.exe 30 PID 2648 wrote to memory of 2124 2648 rundll32.exe 30 PID 2648 wrote to memory of 2124 2648 rundll32.exe 30 PID 2648 wrote to memory of 2124 2648 rundll32.exe 30 PID 2648 wrote to memory of 2124 2648 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_752571905b92f1672b7f8aecb6b35e79527617d8928fef9fe0907708ed81f861.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_752571905b92f1672b7f8aecb6b35e79527617d8928fef9fe0907708ed81f861.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2124
-