Analysis
-
max time kernel
140s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2024 13:48
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_9dca2f76aa35ae4b0ebb7d64350008c021247d8a9ad6a54a709de018d61d99e8.dll
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_9dca2f76aa35ae4b0ebb7d64350008c021247d8a9ad6a54a709de018d61d99e8.dll
-
Size
626KB
-
MD5
9a6960f812f6c2994e7c375a6ec2c1d5
-
SHA1
92e96a6ad1e1735c4c40febf108961400f5c9b87
-
SHA256
9dca2f76aa35ae4b0ebb7d64350008c021247d8a9ad6a54a709de018d61d99e8
-
SHA512
e027a520ed745de1c49d5b49b5b562427041f6001b5d9bdb15b1a235d2a3eec39da93b18218df704615c6e660bdc32fa224a2d5fc8ed3381d458edeb43067cf4
-
SSDEEP
12288:+w1lEKREbddtOYRbHzcPwka1dCjc3N8ZK:+w1lEKOpuYxiwkkgjAN8ZK
Malware Config
Extracted
gozi
Extracted
gozi
999
config.edge.skype.com
146.70.35.138
146.70.35.142
-
base_path
/phpadmin/
-
build
250227
-
exe_type
loader
-
extension
.src
-
server_id
50
Signatures
-
Gozi family
-
Blocklisted process makes network request 2 IoCs
flow pid Process 35 2148 rundll32.exe 37 2148 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 716 wrote to memory of 2148 716 rundll32.exe 83 PID 716 wrote to memory of 2148 716 rundll32.exe 83 PID 716 wrote to memory of 2148 716 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9dca2f76aa35ae4b0ebb7d64350008c021247d8a9ad6a54a709de018d61d99e8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9dca2f76aa35ae4b0ebb7d64350008c021247d8a9ad6a54a709de018d61d99e8.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:2148
-