Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 18:35
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_2aa3fe18612e532f4529c805befa9c64dc0a413c6c2ef4c70621d1449a00a046.dll
Resource
win7-20240708-en
General
-
Target
JaffaCakes118_2aa3fe18612e532f4529c805befa9c64dc0a413c6c2ef4c70621d1449a00a046.dll
-
Size
626KB
-
MD5
bb42f0f44c539454f792bd089fa38834
-
SHA1
74c5f93a4de1be53227989c7199c37e28710dc5d
-
SHA256
2aa3fe18612e532f4529c805befa9c64dc0a413c6c2ef4c70621d1449a00a046
-
SHA512
1533b0b17ed0773057f632bdb999812932697f1257e8ae5f4068374ff7de63f8e123cd7115c7124547415498b5bcc56fd40b2ce80d84ae2e80bee93d4fe48a24
-
SSDEEP
12288:+w1lEKREbddtOYRbHzcPwka1dCjc3N8Zr:+w1lEKOpuYxiwkkgjAN8Zr
Malware Config
Extracted
gozi
Extracted
gozi
999
config.edge.skype.com
146.70.35.138
146.70.35.142
-
base_path
/phpadmin/
-
build
250227
-
exe_type
loader
-
extension
.src
-
server_id
50
Signatures
-
Gozi family
-
Blocklisted process makes network request 4 IoCs
flow pid Process 16 1052 rundll32.exe 25 1052 rundll32.exe 47 1052 rundll32.exe 48 1052 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4648 wrote to memory of 1052 4648 rundll32.exe 82 PID 4648 wrote to memory of 1052 4648 rundll32.exe 82 PID 4648 wrote to memory of 1052 4648 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2aa3fe18612e532f4529c805befa9c64dc0a413c6c2ef4c70621d1449a00a046.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2aa3fe18612e532f4529c805befa9c64dc0a413c6c2ef4c70621d1449a00a046.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:1052
-