Analysis
-
max time kernel
140s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 12:31
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_d2229b10ee067236978578b7120941e222e5d4e61cdb9b10795880be70ec25de.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_d2229b10ee067236978578b7120941e222e5d4e61cdb9b10795880be70ec25de.dll
-
Size
625KB
-
MD5
1bf495a37bf318e0a72b2bb096276114
-
SHA1
089f463c9f25b4711abb3c4a5d6e51d3d064566f
-
SHA256
d2229b10ee067236978578b7120941e222e5d4e61cdb9b10795880be70ec25de
-
SHA512
800eafcfb9489603e6cb21670c62d02bb3d9d783f8368d38e1b6b67f2ac7929782c818e6ee46d2ca3663b20ec306a7bbeaf5b84a4d0991e4a44966440ff98cc7
-
SSDEEP
12288:+w1lEKREbddtOYRbHzcPwka1dCjc3N8Z+:+w1lEKOpuYxiwkkgjAN8Z+
Malware Config
Extracted
gozi
Extracted
gozi
999
config.edge.skype.com
146.70.35.138
146.70.35.142
-
base_path
/phpadmin/
-
build
250227
-
exe_type
loader
-
extension
.src
-
server_id
50
Signatures
-
Gozi family
-
Blocklisted process makes network request 3 IoCs
flow pid Process 17 3648 rundll32.exe 24 3648 rundll32.exe 45 3648 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3280 wrote to memory of 3648 3280 rundll32.exe 82 PID 3280 wrote to memory of 3648 3280 rundll32.exe 82 PID 3280 wrote to memory of 3648 3280 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d2229b10ee067236978578b7120941e222e5d4e61cdb9b10795880be70ec25de.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d2229b10ee067236978578b7120941e222e5d4e61cdb9b10795880be70ec25de.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:3648
-