Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/12/2024, 06:54
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7056c41bda1a71ceb28673a131cbf4bedbfd4d815f4ad46272a530a69b740aad.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_7056c41bda1a71ceb28673a131cbf4bedbfd4d815f4ad46272a530a69b740aad.dll
-
Size
626KB
-
MD5
39401c1255743aa82f1c48b1648e00bc
-
SHA1
0c3e0579a5073c35c9cd02160ec6f362938838b6
-
SHA256
7056c41bda1a71ceb28673a131cbf4bedbfd4d815f4ad46272a530a69b740aad
-
SHA512
1f63e3b077f19b09692b3e8053f4dfa8cb41befa204039968cc5f4006de79f2f44b5f8828fd249349f4b238656c95718a05756b15262092c1cd93af695f08d2d
-
SSDEEP
12288:+w1lEKREbddtOYRbHzcPwka1dCjc3N8ZBX:+w1lEKOpuYxiwkkgjAN8ZBX
Malware Config
Extracted
gozi
Extracted
gozi
999
config.edge.skype.com
146.70.35.138
146.70.35.142
-
base_path
/phpadmin/
-
build
250227
-
exe_type
loader
-
extension
.src
-
server_id
50
Signatures
-
Gozi family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2100 2104 rundll32.exe 30 PID 2104 wrote to memory of 2100 2104 rundll32.exe 30 PID 2104 wrote to memory of 2100 2104 rundll32.exe 30 PID 2104 wrote to memory of 2100 2104 rundll32.exe 30 PID 2104 wrote to memory of 2100 2104 rundll32.exe 30 PID 2104 wrote to memory of 2100 2104 rundll32.exe 30 PID 2104 wrote to memory of 2100 2104 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7056c41bda1a71ceb28673a131cbf4bedbfd4d815f4ad46272a530a69b740aad.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7056c41bda1a71ceb28673a131cbf4bedbfd4d815f4ad46272a530a69b740aad.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2100
-