Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23-12-2024 16:36
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3d08389e485bae1170d17e1966af51b7f174c98d1b9dafc4d25873eb70d4d735.dll
Resource
win7-20240708-en
General
-
Target
JaffaCakes118_3d08389e485bae1170d17e1966af51b7f174c98d1b9dafc4d25873eb70d4d735.dll
-
Size
374KB
-
MD5
81127b25e86fc1c34d4b3c234bbb7650
-
SHA1
97e8acc57e840ccc2a5caec350b69560f9d64abe
-
SHA256
3d08389e485bae1170d17e1966af51b7f174c98d1b9dafc4d25873eb70d4d735
-
SHA512
c2dcf05d65baaab85309d912dbfe01193a99ab0ac6a06ab361edab95a2dc246e56dc782e7c5235a541b8dea62a1b9c86f6211a0a7e6b6a2d197066d010d02d3d
-
SSDEEP
6144:39rzZze2Z364RyLy/tCGALXnjD93OYkEvDxaVBF6m6:39hzu4RnC97jx4EvDxX
Malware Config
Extracted
gozi
Extracted
gozi
4500
authd.feronok.com
app.bighomegl.at
-
build
250204
-
exe_type
loader
-
server_id
580
Signatures
-
Gozi family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1508 wrote to memory of 2680 1508 rundll32.exe 30 PID 1508 wrote to memory of 2680 1508 rundll32.exe 30 PID 1508 wrote to memory of 2680 1508 rundll32.exe 30 PID 1508 wrote to memory of 2680 1508 rundll32.exe 30 PID 1508 wrote to memory of 2680 1508 rundll32.exe 30 PID 1508 wrote to memory of 2680 1508 rundll32.exe 30 PID 1508 wrote to memory of 2680 1508 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3d08389e485bae1170d17e1966af51b7f174c98d1b9dafc4d25873eb70d4d735.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3d08389e485bae1170d17e1966af51b7f174c98d1b9dafc4d25873eb70d4d735.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2680
-