Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27/12/2024, 01:24
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_cf1b682283fe6f9503ccddb4fb7525d93d13001a63552ca060fcd18ff7a0d515.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_cf1b682283fe6f9503ccddb4fb7525d93d13001a63552ca060fcd18ff7a0d515.dll
-
Size
624KB
-
MD5
046ae8e3bf4774ec20308ac3e7dd36f1
-
SHA1
1bf54e3e2f355c1d6b2620ab7e223f907c814437
-
SHA256
cf1b682283fe6f9503ccddb4fb7525d93d13001a63552ca060fcd18ff7a0d515
-
SHA512
6453c57a30fe0f0419c7e5d9aa3ebbb26be8f502274a5c14dc8f1a2817f5d801bcc4c8ffaf3bcfafbc6532c8505da2f1e522c33212a3e0a53eb578bc522b1c79
-
SSDEEP
12288:+w1lEKREbddtOYRbHzcPwka1dCjc3N8Z/:+w1lEKOpuYxiwkkgjAN8Z/
Malware Config
Extracted
gozi
Extracted
gozi
999
config.edge.skype.com
146.70.35.138
146.70.35.142
-
base_path
/phpadmin/
-
build
250227
-
exe_type
loader
-
extension
.src
-
server_id
50
Signatures
-
Gozi family
-
Blocklisted process makes network request 4 IoCs
flow pid Process 12 4604 rundll32.exe 23 4604 rundll32.exe 43 4604 rundll32.exe 44 4604 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1044 wrote to memory of 4604 1044 rundll32.exe 81 PID 1044 wrote to memory of 4604 1044 rundll32.exe 81 PID 1044 wrote to memory of 4604 1044 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_cf1b682283fe6f9503ccddb4fb7525d93d13001a63552ca060fcd18ff7a0d515.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_cf1b682283fe6f9503ccddb4fb7525d93d13001a63552ca060fcd18ff7a0d515.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:4604
-