Analysis
-
max time kernel
140s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23-12-2024 15:53
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_20587442b6c5c5289058461103db705d04b69ee7e5c14d6a3089348c19bc0de7.dll
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_20587442b6c5c5289058461103db705d04b69ee7e5c14d6a3089348c19bc0de7.dll
-
Size
374KB
-
MD5
9d3a7a1f655bdc0714e010f31ad4c6cc
-
SHA1
5115f00d59147a3113fab9402daeb34ffe71ae39
-
SHA256
20587442b6c5c5289058461103db705d04b69ee7e5c14d6a3089348c19bc0de7
-
SHA512
65a17e759ff8b47c01e24a0eec98c6d4bcea0001613c6214a3b1f015437f2998810aef349190fcaaf75cc692e8877c1fa3901b5d69838468c1cb416ee64c4b21
-
SSDEEP
6144:39rzZze2Z364RyLy/tCGALXnjD93OYkEvDQaVBF6m6:39hzu4RnC97jx4EvDQX
Malware Config
Extracted
gozi
Extracted
gozi
4500
authd.feronok.com
app.bighomegl.at
-
build
250204
-
exe_type
loader
-
server_id
580
Signatures
-
Gozi family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2076 2488 rundll32.exe 30 PID 2488 wrote to memory of 2076 2488 rundll32.exe 30 PID 2488 wrote to memory of 2076 2488 rundll32.exe 30 PID 2488 wrote to memory of 2076 2488 rundll32.exe 30 PID 2488 wrote to memory of 2076 2488 rundll32.exe 30 PID 2488 wrote to memory of 2076 2488 rundll32.exe 30 PID 2488 wrote to memory of 2076 2488 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_20587442b6c5c5289058461103db705d04b69ee7e5c14d6a3089348c19bc0de7.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_20587442b6c5c5289058461103db705d04b69ee7e5c14d6a3089348c19bc0de7.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2076
-