Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Behavioral task
behavioral1
Sample
JaffaCakes118_c5732f88cfea8fd6d5a376534140a71129213100cdd5706c18e94a8d48ebadac.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_c5732f88cfea8fd6d5a376534140a71129213100cdd5706c18e94a8d48ebadac.dll
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_c5732f88cfea8fd6d5a376534140a71129213100cdd5706c18e94a8d48ebadac
-
Size
538KB
-
MD5
66eb9a55782af246240d338f3f347a24
-
SHA1
9a6b2c9e57086a9e56ac3c610cf63c917088808b
-
SHA256
c5732f88cfea8fd6d5a376534140a71129213100cdd5706c18e94a8d48ebadac
-
SHA512
961cd2260329e6b2f12d70597a8b0c1bd31878f219c5611b7f5c3a9c58524b9c8916cd8ad8b12f2bec1157da9331d404c840fe289c0337b6cd19aa545abc3baa
-
SSDEEP
1536:W7UcWwDMbboCQc1s4f2qlalXWEj9N75mCFE:faMXoCns4f2qlalVxN75pFE
Malware Config
Extracted
gozi
7555
c.s-microsoft.com
ajax.googleapis.com
greatewallfirewall.xyz
185.186.244.130
booloolo2.com
37.120.222.107
-
base_path
/postfix/
-
build
251173
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
dns_servers
107.174.86.134
107.175.127.22
-
exe_type
loader
-
extension
.yml
-
server_id
12
Signatures
-
Gozi family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_c5732f88cfea8fd6d5a376534140a71129213100cdd5706c18e94a8d48ebadac
Files
-
JaffaCakes118_c5732f88cfea8fd6d5a376534140a71129213100cdd5706c18e94a8d48ebadac.dll windows:5 windows x86 arch:x86
8868782589bd3111ef358851558bbf50
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ntdll
wcstombs
ZwOpenProcess
ZwClose
ZwOpenProcessToken
ZwQueryInformationToken
_snwprintf
sprintf
mbstowcs
_snprintf
memset
strcpy
memcpy
_aulldiv
_allmul
_aullrem
RtlUnwind
NtQueryVirtualMemory
kernel32
RaiseException
LocalAlloc
ResetEvent
HeapAlloc
InterlockedIncrement
InterlockedDecrement
HeapFree
SetEvent
GetTickCount
GetSystemTimeAsFileTime
Sleep
HeapDestroy
HeapCreate
SwitchToThread
lstrlenA
SetWaitableTimer
Process32First
WaitForSingleObject
SleepEx
CreateEventA
lstrlenW
GetLastError
GetProcAddress
Process32Next
WaitForMultipleObjects
GetModuleHandleA
CreateToolhelp32Snapshot
CloseHandle
CreateWaitableTimerA
lstrcpyA
lstrcmpW
LoadLibraryA
FreeLibrary
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
lstrcmpA
CreateFileMappingW
MapViewOfFile
GetFileTime
FindNextFileA
FindClose
FindFirstFileA
CompareFileTime
InterlockedExchange
ExpandEnvironmentStringsW
OpenProcess
GetVersion
GetCurrentProcessId
lstrcatA
CreateFileA
QueryPerformanceCounter
GetComputerNameW
WideCharToMultiByte
GetComputerNameExA
QueryPerformanceFrequency
ExpandEnvironmentStringsA
oleaut32
SysAllocString
SafeArrayDestroy
SafeArrayCreate
SysFreeString
Sections
.text Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 840B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ