Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/12/2024, 23:43
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_a0fb5ebe300764012f9b5cb932852235dbd8ab99ea6585344199be4b7abc7ca4.dll
Resource
win7-20240708-en
General
-
Target
JaffaCakes118_a0fb5ebe300764012f9b5cb932852235dbd8ab99ea6585344199be4b7abc7ca4.dll
-
Size
626KB
-
MD5
8fe5d633bb71d5e1226dbafa7f36b7dd
-
SHA1
02131c1404f5a6d072f0ac86b1e6ab405d9a8d10
-
SHA256
a0fb5ebe300764012f9b5cb932852235dbd8ab99ea6585344199be4b7abc7ca4
-
SHA512
41a7a2c72074cebb434a6ebf6c271520bc4701dca16cd1d4f9a04d2660e4f02176eef1ef101f5f9a1a0506fc55470f67cc7168fc6b63a278aa94260b8acc3b8f
-
SSDEEP
12288:+w1lEKREbddtOYRbHzcPwka1dCjc3N8Z7:+w1lEKOpuYxiwkkgjAN8Z7
Malware Config
Extracted
gozi
Extracted
gozi
999
config.edge.skype.com
146.70.35.138
146.70.35.142
-
base_path
/phpadmin/
-
build
250227
-
exe_type
loader
-
extension
.src
-
server_id
50
Signatures
-
Gozi family
-
Blocklisted process makes network request 4 IoCs
flow pid Process 5 2320 rundll32.exe 6 2320 rundll32.exe 9 2320 rundll32.exe 10 2320 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 388 wrote to memory of 2320 388 rundll32.exe 31 PID 388 wrote to memory of 2320 388 rundll32.exe 31 PID 388 wrote to memory of 2320 388 rundll32.exe 31 PID 388 wrote to memory of 2320 388 rundll32.exe 31 PID 388 wrote to memory of 2320 388 rundll32.exe 31 PID 388 wrote to memory of 2320 388 rundll32.exe 31 PID 388 wrote to memory of 2320 388 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a0fb5ebe300764012f9b5cb932852235dbd8ab99ea6585344199be4b7abc7ca4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a0fb5ebe300764012f9b5cb932852235dbd8ab99ea6585344199be4b7abc7ca4.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:2320
-