Analysis
-
max time kernel
140s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2024, 23:35
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_92fb84baef0be995bba919396957e47c43dc42a3a2a21a15577a7d2fefb7d1f3.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_92fb84baef0be995bba919396957e47c43dc42a3a2a21a15577a7d2fefb7d1f3.dll
-
Size
626KB
-
MD5
75699d3c7a579a42fceba3e1297c6823
-
SHA1
44c0ad1c1bb443ce393595327c44571ffb10637e
-
SHA256
92fb84baef0be995bba919396957e47c43dc42a3a2a21a15577a7d2fefb7d1f3
-
SHA512
bef14064d236d7e277666d7f41d430b3506bbfb6e4d619c8cdfbaaca6320a1bb8c31b0e5ec135c0bda95717d27ea12f10f7f10e9c80dbc799a0bd2cb549632bb
-
SSDEEP
12288:+w1lEKREbddtOYRbHzcPwka1dCjc3N8ZuP:+w1lEKOpuYxiwkkgjAN8ZuP
Malware Config
Extracted
gozi
Extracted
gozi
999
config.edge.skype.com
146.70.35.138
146.70.35.142
-
base_path
/phpadmin/
-
build
250227
-
exe_type
loader
-
extension
.src
-
server_id
50
Signatures
-
Gozi family
-
Blocklisted process makes network request 3 IoCs
flow pid Process 15 4612 rundll32.exe 28 4612 rundll32.exe 45 4612 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2384 wrote to memory of 4612 2384 rundll32.exe 82 PID 2384 wrote to memory of 4612 2384 rundll32.exe 82 PID 2384 wrote to memory of 4612 2384 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_92fb84baef0be995bba919396957e47c43dc42a3a2a21a15577a7d2fefb7d1f3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_92fb84baef0be995bba919396957e47c43dc42a3a2a21a15577a7d2fefb7d1f3.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:4612
-