Analysis
-
max time kernel
140s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 20:30
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_dc1129bb06b01aad4c969983c441b419ea1562471125f8d482ae3375429b3416.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_dc1129bb06b01aad4c969983c441b419ea1562471125f8d482ae3375429b3416.dll
-
Size
624KB
-
MD5
2a78a71b0ec4f9f406aa66d98ac44f4a
-
SHA1
faf2d1314767249f176e8ede62f726d434159dd3
-
SHA256
dc1129bb06b01aad4c969983c441b419ea1562471125f8d482ae3375429b3416
-
SHA512
03e0170d69638abffa3ae97e6140616ccf7fd2e2cebe59bdc7f157cb64a423cef2b74bd5783b8ff2b966499033685f9ad84a73a156faa102c8c4c526347cf4df
-
SSDEEP
12288:+w1lEKREbddtOYRbHzcPwka1dCjc3N8Z6:+w1lEKOpuYxiwkkgjAN8Z6
Malware Config
Extracted
gozi
Extracted
gozi
999
config.edge.skype.com
146.70.35.138
146.70.35.142
-
base_path
/phpadmin/
-
build
250227
-
exe_type
loader
-
extension
.src
-
server_id
50
Signatures
-
Gozi family
-
Blocklisted process makes network request 3 IoCs
flow pid Process 16 4188 rundll32.exe 21 4188 rundll32.exe 44 4188 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2268 wrote to memory of 4188 2268 rundll32.exe 82 PID 2268 wrote to memory of 4188 2268 rundll32.exe 82 PID 2268 wrote to memory of 4188 2268 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dc1129bb06b01aad4c969983c441b419ea1562471125f8d482ae3375429b3416.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dc1129bb06b01aad4c969983c441b419ea1562471125f8d482ae3375429b3416.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:4188
-