Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 05:11
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_f077eb0c494b552a33ed1d9e861729419436aa234a7e34416b3325c4708a1e98.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_f077eb0c494b552a33ed1d9e861729419436aa234a7e34416b3325c4708a1e98.dll
-
Size
626KB
-
MD5
81df1cdc0be3875e6a5ef410472b0732
-
SHA1
567d3fc663b68de333daaa050862fc1507a4448f
-
SHA256
f077eb0c494b552a33ed1d9e861729419436aa234a7e34416b3325c4708a1e98
-
SHA512
91fe924b69a74c7f8ea03f7cf54393bca5bee0b4b546532fc4af5f89a9bc9210a787c11d1d9f6ac08dfbb686c322fb84d070e883b57194b8b46b864aa0cd19bc
-
SSDEEP
12288:+w1lEKREbddtOYRbHzcPwka1dCjc3N8Z6:+w1lEKOpuYxiwkkgjAN8Z6
Malware Config
Extracted
gozi
Extracted
gozi
999
config.edge.skype.com
146.70.35.138
146.70.35.142
-
base_path
/phpadmin/
-
build
250227
-
exe_type
loader
-
extension
.src
-
server_id
50
Signatures
-
Gozi family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2828 wrote to memory of 2168 2828 rundll32.exe 30 PID 2828 wrote to memory of 2168 2828 rundll32.exe 30 PID 2828 wrote to memory of 2168 2828 rundll32.exe 30 PID 2828 wrote to memory of 2168 2828 rundll32.exe 30 PID 2828 wrote to memory of 2168 2828 rundll32.exe 30 PID 2828 wrote to memory of 2168 2828 rundll32.exe 30 PID 2828 wrote to memory of 2168 2828 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f077eb0c494b552a33ed1d9e861729419436aa234a7e34416b3325c4708a1e98.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f077eb0c494b552a33ed1d9e861729419436aa234a7e34416b3325c4708a1e98.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2168
-