Analysis
-
max time kernel
140s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 09:54
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_69a857871494a9b642e70de1dc80627737375db0c38d25ba68373bc3ca56db56.dll
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_69a857871494a9b642e70de1dc80627737375db0c38d25ba68373bc3ca56db56.dll
-
Size
624KB
-
MD5
9fae622bc67b026503380a2a76f5b044
-
SHA1
573946d23cdd22cd922322625978071b45a248f6
-
SHA256
69a857871494a9b642e70de1dc80627737375db0c38d25ba68373bc3ca56db56
-
SHA512
c0920e5f78c6fa1cd813470693251b5deb6137d0a076a12a5517025e5eaecb032650437b07ee7753c76d128f0370162c77a02e5e3c73434afdbeb22e96176744
-
SSDEEP
12288:+w1lEKREbddtOYRbHzcPwka1dCjc3N8ZsW:+w1lEKOpuYxiwkkgjAN8Zb
Malware Config
Extracted
gozi
Extracted
gozi
999
config.edge.skype.com
146.70.35.138
146.70.35.142
-
base_path
/phpadmin/
-
build
250227
-
exe_type
loader
-
extension
.src
-
server_id
50
Signatures
-
Gozi family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2676 2188 rundll32.exe 30 PID 2188 wrote to memory of 2676 2188 rundll32.exe 30 PID 2188 wrote to memory of 2676 2188 rundll32.exe 30 PID 2188 wrote to memory of 2676 2188 rundll32.exe 30 PID 2188 wrote to memory of 2676 2188 rundll32.exe 30 PID 2188 wrote to memory of 2676 2188 rundll32.exe 30 PID 2188 wrote to memory of 2676 2188 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69a857871494a9b642e70de1dc80627737375db0c38d25ba68373bc3ca56db56.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69a857871494a9b642e70de1dc80627737375db0c38d25ba68373bc3ca56db56.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2676
-