Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2024, 04:41
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_f06ba98586aca7e491a27f5cf00275b78d808e4e4e408b648b5ff19cf7d3c018.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_f06ba98586aca7e491a27f5cf00275b78d808e4e4e408b648b5ff19cf7d3c018.dll
-
Size
624KB
-
MD5
3f59ffba06281e19a6204049365830d7
-
SHA1
6a062614fa56ac5533dd18fd02c1829425fe89f4
-
SHA256
f06ba98586aca7e491a27f5cf00275b78d808e4e4e408b648b5ff19cf7d3c018
-
SHA512
b98a2c67c3c5387216eb9c13cca09957eb5df356b0a8a1967632505fcd1bf4f751beb295fc5cc4fe91bb20857639bef2fd075fc14c86b8de1dcfe8ed4b5267fe
-
SSDEEP
12288:+w1lEKREbddtOYRbHzcPwka1dCjc3N8Zp:+w1lEKOpuYxiwkkgjAN8Zp
Malware Config
Extracted
gozi
Extracted
gozi
999
config.edge.skype.com
146.70.35.138
146.70.35.142
-
base_path
/phpadmin/
-
build
250227
-
exe_type
loader
-
extension
.src
-
server_id
50
Signatures
-
Gozi family
-
Blocklisted process makes network request 3 IoCs
flow pid Process 11 4684 rundll32.exe 25 4684 rundll32.exe 44 4684 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 8 wrote to memory of 4684 8 rundll32.exe 82 PID 8 wrote to memory of 4684 8 rundll32.exe 82 PID 8 wrote to memory of 4684 8 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f06ba98586aca7e491a27f5cf00275b78d808e4e4e408b648b5ff19cf7d3c018.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f06ba98586aca7e491a27f5cf00275b78d808e4e4e408b648b5ff19cf7d3c018.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:4684
-