Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
23-12-2024 13:48
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_9dca2f76aa35ae4b0ebb7d64350008c021247d8a9ad6a54a709de018d61d99e8.dll
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_9dca2f76aa35ae4b0ebb7d64350008c021247d8a9ad6a54a709de018d61d99e8.dll
-
Size
626KB
-
MD5
9a6960f812f6c2994e7c375a6ec2c1d5
-
SHA1
92e96a6ad1e1735c4c40febf108961400f5c9b87
-
SHA256
9dca2f76aa35ae4b0ebb7d64350008c021247d8a9ad6a54a709de018d61d99e8
-
SHA512
e027a520ed745de1c49d5b49b5b562427041f6001b5d9bdb15b1a235d2a3eec39da93b18218df704615c6e660bdc32fa224a2d5fc8ed3381d458edeb43067cf4
-
SSDEEP
12288:+w1lEKREbddtOYRbHzcPwka1dCjc3N8ZK:+w1lEKOpuYxiwkkgjAN8ZK
Malware Config
Extracted
gozi
Extracted
gozi
999
config.edge.skype.com
146.70.35.138
146.70.35.142
-
base_path
/phpadmin/
-
build
250227
-
exe_type
loader
-
extension
.src
-
server_id
50
Signatures
-
Gozi family
-
Blocklisted process makes network request 4 IoCs
flow pid Process 4 1768 rundll32.exe 6 1768 rundll32.exe 9 1768 rundll32.exe 10 1768 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 376 wrote to memory of 1768 376 rundll32.exe 30 PID 376 wrote to memory of 1768 376 rundll32.exe 30 PID 376 wrote to memory of 1768 376 rundll32.exe 30 PID 376 wrote to memory of 1768 376 rundll32.exe 30 PID 376 wrote to memory of 1768 376 rundll32.exe 30 PID 376 wrote to memory of 1768 376 rundll32.exe 30 PID 376 wrote to memory of 1768 376 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9dca2f76aa35ae4b0ebb7d64350008c021247d8a9ad6a54a709de018d61d99e8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9dca2f76aa35ae4b0ebb7d64350008c021247d8a9ad6a54a709de018d61d99e8.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:1768
-