Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 19:27
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_d9e851f46ce57720073f2c2b7d206a923ab13277c2d5ed8da04e61672d96be5f.dll
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_d9e851f46ce57720073f2c2b7d206a923ab13277c2d5ed8da04e61672d96be5f.dll
-
Size
624KB
-
MD5
bd3c7b63bd4fb9d4fc92179dd615dee7
-
SHA1
bf0d0f1b4f5cf4f0e490bb80866abd935f036227
-
SHA256
d9e851f46ce57720073f2c2b7d206a923ab13277c2d5ed8da04e61672d96be5f
-
SHA512
137d5ef4acc257e43c494a71d78d0f0a32f06edcef27c310c04efdaa3ba961251e81c286b517bcb0e57ce0b9f2f80fabd65ff3fd74e004082ec552bc0d3069e3
-
SSDEEP
12288:+w1lEKREbddtOYRbHzcPwka1dCjc3N8ZI:+w1lEKOpuYxiwkkgjAN8ZI
Malware Config
Extracted
gozi
Extracted
gozi
999
config.edge.skype.com
146.70.35.138
146.70.35.142
-
base_path
/phpadmin/
-
build
250227
-
exe_type
loader
-
extension
.src
-
server_id
50
Signatures
-
Gozi family
-
Blocklisted process makes network request 3 IoCs
flow pid Process 15 5032 rundll32.exe 29 5032 rundll32.exe 43 5032 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4184 wrote to memory of 5032 4184 rundll32.exe 83 PID 4184 wrote to memory of 5032 4184 rundll32.exe 83 PID 4184 wrote to memory of 5032 4184 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d9e851f46ce57720073f2c2b7d206a923ab13277c2d5ed8da04e61672d96be5f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d9e851f46ce57720073f2c2b7d206a923ab13277c2d5ed8da04e61672d96be5f.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:5032
-