Analysis
-
max time kernel
140s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 18:26
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_05b887fbd0e7311834d35a5586a1a8252f45e9f8ba596ec9a94643f0a5aa52d4.dll
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_05b887fbd0e7311834d35a5586a1a8252f45e9f8ba596ec9a94643f0a5aa52d4.dll
-
Size
624KB
-
MD5
11a7a395810ee13c9d34ad9a39baae88
-
SHA1
6a249d15c3b00cc56c4a1f0d6a0e01fa31146617
-
SHA256
05b887fbd0e7311834d35a5586a1a8252f45e9f8ba596ec9a94643f0a5aa52d4
-
SHA512
90fd2d60da201209423710102bc79d21a4771204ee676dad2bdee55484c82c4038c3792e7101541401083e72ae0c6dbf54155f4d62c403b36bfbbaf2bff250f6
-
SSDEEP
12288:+w1lEKREbddtOYRbHzcPwka1dCjc3N8ZV:+w1lEKOpuYxiwkkgjAN8ZV
Malware Config
Extracted
gozi
Extracted
gozi
999
config.edge.skype.com
146.70.35.138
146.70.35.142
-
base_path
/phpadmin/
-
build
250227
-
exe_type
loader
-
extension
.src
-
server_id
50
Signatures
-
Gozi family
-
Blocklisted process makes network request 3 IoCs
flow pid Process 18 4796 rundll32.exe 24 4796 rundll32.exe 45 4796 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 336 wrote to memory of 4796 336 rundll32.exe 82 PID 336 wrote to memory of 4796 336 rundll32.exe 82 PID 336 wrote to memory of 4796 336 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_05b887fbd0e7311834d35a5586a1a8252f45e9f8ba596ec9a94643f0a5aa52d4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_05b887fbd0e7311834d35a5586a1a8252f45e9f8ba596ec9a94643f0a5aa52d4.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:4796
-