Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27/12/2024, 01:26
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4fcc552699dc2d73e5fe900cc66dba56422ebe6807c13e0cd291f4a8d7e28b6b.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_4fcc552699dc2d73e5fe900cc66dba56422ebe6807c13e0cd291f4a8d7e28b6b.dll
-
Size
626KB
-
MD5
bd0603ca281137f6fd894caaa8bdce85
-
SHA1
ad4fb9288d2a15536c58116885393d161655f30d
-
SHA256
4fcc552699dc2d73e5fe900cc66dba56422ebe6807c13e0cd291f4a8d7e28b6b
-
SHA512
1654344ba6df180d0c7e3079fefdcac53f2cc2b3b03f8c052ef8cf9bbef0dcd2a3ba127038ed11bd9949156db168f7539a774d9108ebe662f5868d515e8e7fde
-
SSDEEP
12288:+w1lEKREbddtOYRbHzcPwka1dCjc3N8Zs:+w1lEKOpuYxiwkkgjAN8Zs
Malware Config
Extracted
gozi
Extracted
gozi
999
config.edge.skype.com
146.70.35.138
146.70.35.142
-
base_path
/phpadmin/
-
build
250227
-
exe_type
loader
-
extension
.src
-
server_id
50
Signatures
-
Gozi family
-
Blocklisted process makes network request 6 IoCs
flow pid Process 18 60 rundll32.exe 19 60 rundll32.exe 20 60 rundll32.exe 40 60 rundll32.exe 46 60 rundll32.exe 47 60 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2716 wrote to memory of 60 2716 rundll32.exe 85 PID 2716 wrote to memory of 60 2716 rundll32.exe 85 PID 2716 wrote to memory of 60 2716 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4fcc552699dc2d73e5fe900cc66dba56422ebe6807c13e0cd291f4a8d7e28b6b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4fcc552699dc2d73e5fe900cc66dba56422ebe6807c13e0cd291f4a8d7e28b6b.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:60
-