Analysis
-
max time kernel
141s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 11:29
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_261727ee8cc1bf60645b67cfbbc713aa202f86738b99769f7abf527157b7702a.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_261727ee8cc1bf60645b67cfbbc713aa202f86738b99769f7abf527157b7702a.dll
-
Size
624KB
-
MD5
7e6c924df081cf1c7c689187132cbbe5
-
SHA1
94aa0b04d7ab1b797fff869ece4ccfd9c0382e64
-
SHA256
261727ee8cc1bf60645b67cfbbc713aa202f86738b99769f7abf527157b7702a
-
SHA512
1ec24bd676949a721c63b8f692c8ffd701c98fe91a3fa2872bddf0b6ccbd83467a744e71b551fbdedcecbb120a10ad63747af7b7eea952f1301127c61d5f914a
-
SSDEEP
12288:+w1lEKREbddtOYRbHzcPwka1dCjc3N8ZF:+w1lEKOpuYxiwkkgjAN8ZF
Malware Config
Extracted
gozi
Extracted
gozi
999
config.edge.skype.com
146.70.35.138
146.70.35.142
-
base_path
/phpadmin/
-
build
250227
-
exe_type
loader
-
extension
.src
-
server_id
50
Signatures
-
Gozi family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1152 wrote to memory of 2680 1152 rundll32.exe 30 PID 1152 wrote to memory of 2680 1152 rundll32.exe 30 PID 1152 wrote to memory of 2680 1152 rundll32.exe 30 PID 1152 wrote to memory of 2680 1152 rundll32.exe 30 PID 1152 wrote to memory of 2680 1152 rundll32.exe 30 PID 1152 wrote to memory of 2680 1152 rundll32.exe 30 PID 1152 wrote to memory of 2680 1152 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_261727ee8cc1bf60645b67cfbbc713aa202f86738b99769f7abf527157b7702a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_261727ee8cc1bf60645b67cfbbc713aa202f86738b99769f7abf527157b7702a.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2680
-