Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2024, 13:23
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_246558c61856da2962370102cb004b60d0ce769a9f6ee68e88a097a28a3b4fa8.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_246558c61856da2962370102cb004b60d0ce769a9f6ee68e88a097a28a3b4fa8.dll
-
Size
626KB
-
MD5
cf9ad20f6eeb86a93d1bd8f40024a438
-
SHA1
3dad5a86a774bb9c0398cc1e31361559e88d4bde
-
SHA256
246558c61856da2962370102cb004b60d0ce769a9f6ee68e88a097a28a3b4fa8
-
SHA512
c3c8ed68d4c6d3aa3d663410e2cb5ed20af4c6b4ab6c4858b030ae0a2538373f5cf64cfbad36c8398d08d40654084ccbc0c41c55bf4a9d2ded6e75cdcd58b8de
-
SSDEEP
12288:+w1lEKREbddtOYRbHzcPwka1dCjc3N8ZEZ:+w1lEKOpuYxiwkkgjAN8Z0
Malware Config
Extracted
gozi
Extracted
gozi
999
config.edge.skype.com
146.70.35.138
146.70.35.142
-
base_path
/phpadmin/
-
build
250227
-
exe_type
loader
-
extension
.src
-
server_id
50
Signatures
-
Gozi family
-
Blocklisted process makes network request 4 IoCs
flow pid Process 14 5072 rundll32.exe 23 5072 rundll32.exe 43 5072 rundll32.exe 44 5072 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4392 wrote to memory of 5072 4392 rundll32.exe 83 PID 4392 wrote to memory of 5072 4392 rundll32.exe 83 PID 4392 wrote to memory of 5072 4392 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_246558c61856da2962370102cb004b60d0ce769a9f6ee68e88a097a28a3b4fa8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_246558c61856da2962370102cb004b60d0ce769a9f6ee68e88a097a28a3b4fa8.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:5072
-