Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 11:29
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_261727ee8cc1bf60645b67cfbbc713aa202f86738b99769f7abf527157b7702a.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_261727ee8cc1bf60645b67cfbbc713aa202f86738b99769f7abf527157b7702a.dll
-
Size
624KB
-
MD5
7e6c924df081cf1c7c689187132cbbe5
-
SHA1
94aa0b04d7ab1b797fff869ece4ccfd9c0382e64
-
SHA256
261727ee8cc1bf60645b67cfbbc713aa202f86738b99769f7abf527157b7702a
-
SHA512
1ec24bd676949a721c63b8f692c8ffd701c98fe91a3fa2872bddf0b6ccbd83467a744e71b551fbdedcecbb120a10ad63747af7b7eea952f1301127c61d5f914a
-
SSDEEP
12288:+w1lEKREbddtOYRbHzcPwka1dCjc3N8ZF:+w1lEKOpuYxiwkkgjAN8ZF
Malware Config
Extracted
gozi
Extracted
gozi
999
config.edge.skype.com
146.70.35.138
146.70.35.142
-
base_path
/phpadmin/
-
build
250227
-
exe_type
loader
-
extension
.src
-
server_id
50
Signatures
-
Gozi family
-
Blocklisted process makes network request 3 IoCs
flow pid Process 21 3480 rundll32.exe 35 3480 rundll32.exe 45 3480 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1048 wrote to memory of 3480 1048 rundll32.exe 82 PID 1048 wrote to memory of 3480 1048 rundll32.exe 82 PID 1048 wrote to memory of 3480 1048 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_261727ee8cc1bf60645b67cfbbc713aa202f86738b99769f7abf527157b7702a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_261727ee8cc1bf60645b67cfbbc713aa202f86738b99769f7abf527157b7702a.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:3480
-