Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2024, 11:19
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7d618a32aac4de75779d8e57adc89973d472a09fc8e24fc93f17fca6a1d063e1.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_7d618a32aac4de75779d8e57adc89973d472a09fc8e24fc93f17fca6a1d063e1.dll
-
Size
626KB
-
MD5
a2add8ac228debe4cf5191ac7ea45298
-
SHA1
12456f2508e08eca0f07e1246fad4ba5ecc4cf39
-
SHA256
7d618a32aac4de75779d8e57adc89973d472a09fc8e24fc93f17fca6a1d063e1
-
SHA512
9ee18930a51d7808959ff7e7ea48a865dc5e1d7f280f00ce60612bb1a6a28a5a8153576beb8aa6b598de27d634311ea6eb142e4ca211bfab90e46356610256eb
-
SSDEEP
12288:+w1lEKREbddtOYRbHzcPwka1dCjc3N8ZY:+w1lEKOpuYxiwkkgjAN8ZY
Malware Config
Extracted
gozi
Extracted
gozi
999
config.edge.skype.com
146.70.35.138
146.70.35.142
-
base_path
/phpadmin/
-
build
250227
-
exe_type
loader
-
extension
.src
-
server_id
50
Signatures
-
Gozi family
-
Blocklisted process makes network request 4 IoCs
flow pid Process 15 2252 rundll32.exe 21 2252 rundll32.exe 41 2252 rundll32.exe 42 2252 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2252 2748 rundll32.exe 83 PID 2748 wrote to memory of 2252 2748 rundll32.exe 83 PID 2748 wrote to memory of 2252 2748 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7d618a32aac4de75779d8e57adc89973d472a09fc8e24fc93f17fca6a1d063e1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7d618a32aac4de75779d8e57adc89973d472a09fc8e24fc93f17fca6a1d063e1.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:2252
-