Analysis
-
max time kernel
140s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 18:26
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_05b887fbd0e7311834d35a5586a1a8252f45e9f8ba596ec9a94643f0a5aa52d4.dll
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_05b887fbd0e7311834d35a5586a1a8252f45e9f8ba596ec9a94643f0a5aa52d4.dll
-
Size
624KB
-
MD5
11a7a395810ee13c9d34ad9a39baae88
-
SHA1
6a249d15c3b00cc56c4a1f0d6a0e01fa31146617
-
SHA256
05b887fbd0e7311834d35a5586a1a8252f45e9f8ba596ec9a94643f0a5aa52d4
-
SHA512
90fd2d60da201209423710102bc79d21a4771204ee676dad2bdee55484c82c4038c3792e7101541401083e72ae0c6dbf54155f4d62c403b36bfbbaf2bff250f6
-
SSDEEP
12288:+w1lEKREbddtOYRbHzcPwka1dCjc3N8ZV:+w1lEKOpuYxiwkkgjAN8ZV
Malware Config
Extracted
gozi
Extracted
gozi
999
config.edge.skype.com
146.70.35.138
146.70.35.142
-
base_path
/phpadmin/
-
build
250227
-
exe_type
loader
-
extension
.src
-
server_id
50
Signatures
-
Gozi family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2268 2328 rundll32.exe 29 PID 2328 wrote to memory of 2268 2328 rundll32.exe 29 PID 2328 wrote to memory of 2268 2328 rundll32.exe 29 PID 2328 wrote to memory of 2268 2328 rundll32.exe 29 PID 2328 wrote to memory of 2268 2328 rundll32.exe 29 PID 2328 wrote to memory of 2268 2328 rundll32.exe 29 PID 2328 wrote to memory of 2268 2328 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_05b887fbd0e7311834d35a5586a1a8252f45e9f8ba596ec9a94643f0a5aa52d4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_05b887fbd0e7311834d35a5586a1a8252f45e9f8ba596ec9a94643f0a5aa52d4.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2268
-