Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 15:06
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_dd5283c0cf2af868ba78c25fa48115246737ae5cd36d21fff95d03a96a1fc456.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_dd5283c0cf2af868ba78c25fa48115246737ae5cd36d21fff95d03a96a1fc456.dll
-
Size
368KB
-
MD5
37e853f4bb7a201d84da82a20fb322d5
-
SHA1
94de3379728b8bea474d492a50a144b2717d69a1
-
SHA256
dd5283c0cf2af868ba78c25fa48115246737ae5cd36d21fff95d03a96a1fc456
-
SHA512
8558c9f65df5429305673c20537878ceeeb080d1c5995270abf307c773f20d14950fdd7c7ed1757833c4ee5ca71221e4cf59c0d8d98ccf43984d942a0cbc08fa
-
SSDEEP
6144:4pW5yM4eF6MOl7SfFPFY0Hi1PkZkWM6gD2X4sCC8rJpDRjM:4Q5yB78fFPTHi1Pku6gSIsC3FvM
Malware Config
Extracted
gozi
Extracted
gozi
8877
outlook.com
lureborufer.store
dureborufer.store
-
base_path
/lucene/
-
build
250212
-
dga_season
10
-
exe_type
loader
-
extension
.keq
-
server_id
12
Signatures
-
Gozi family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1260 wrote to memory of 1232 1260 rundll32.exe 30 PID 1260 wrote to memory of 1232 1260 rundll32.exe 30 PID 1260 wrote to memory of 1232 1260 rundll32.exe 30 PID 1260 wrote to memory of 1232 1260 rundll32.exe 30 PID 1260 wrote to memory of 1232 1260 rundll32.exe 30 PID 1260 wrote to memory of 1232 1260 rundll32.exe 30 PID 1260 wrote to memory of 1232 1260 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dd5283c0cf2af868ba78c25fa48115246737ae5cd36d21fff95d03a96a1fc456.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dd5283c0cf2af868ba78c25fa48115246737ae5cd36d21fff95d03a96a1fc456.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1232
-