Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2024, 05:17
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4a1b0afc0533d90cd4216bb9c9f0ee05e145834d32f443ce2f3499c3105a13ab.dll
Resource
win7-20240708-en
General
-
Target
JaffaCakes118_4a1b0afc0533d90cd4216bb9c9f0ee05e145834d32f443ce2f3499c3105a13ab.dll
-
Size
625KB
-
MD5
b8a1cde7a78261dd43583115e9eb107f
-
SHA1
3d3b82436ce9b43e9fe1b766fb7691eb15a92fbe
-
SHA256
4a1b0afc0533d90cd4216bb9c9f0ee05e145834d32f443ce2f3499c3105a13ab
-
SHA512
350f7356e130f6d7dd5382d0a404993dd81d5d241acfc5db4bbaafebab69384421741873e40f1c98116b540b358039ce88560e2f739e39b096ba689621349555
-
SSDEEP
12288:+w1lEKREbddtOYRbHzcPwka1dCjc3N8Zt:+w1lEKOpuYxiwkkgjAN8Zt
Malware Config
Extracted
gozi
Extracted
gozi
999
config.edge.skype.com
146.70.35.138
146.70.35.142
-
base_path
/phpadmin/
-
build
250227
-
exe_type
loader
-
extension
.src
-
server_id
50
Signatures
-
Gozi family
-
Blocklisted process makes network request 4 IoCs
flow pid Process 14 432 rundll32.exe 22 432 rundll32.exe 43 432 rundll32.exe 44 432 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3900 wrote to memory of 432 3900 rundll32.exe 83 PID 3900 wrote to memory of 432 3900 rundll32.exe 83 PID 3900 wrote to memory of 432 3900 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4a1b0afc0533d90cd4216bb9c9f0ee05e145834d32f443ce2f3499c3105a13ab.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4a1b0afc0533d90cd4216bb9c9f0ee05e145834d32f443ce2f3499c3105a13ab.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:432
-