Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/12/2024, 10:05
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3757177adb81f775e66db6e74e9fee00489d5cb33071b1a7e503dfa3c0ba2576.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_3757177adb81f775e66db6e74e9fee00489d5cb33071b1a7e503dfa3c0ba2576.dll
-
Size
625KB
-
MD5
a83dc9f8efcbe3563db2306557baa480
-
SHA1
5cdee47b4738db7fbac63b4068c3b70c6a216d7c
-
SHA256
3757177adb81f775e66db6e74e9fee00489d5cb33071b1a7e503dfa3c0ba2576
-
SHA512
dc833b324b733cf5000951401c90f97c47f20af67bb6145bb7d9d1115dbd8de30649fc6d66f754eb9150f7234e6a9273fa8309fc3cff9c0afe22172296b28c95
-
SSDEEP
12288:+w1lEKREbddtOYRbHzcPwka1dCjc3N8Zx:+w1lEKOpuYxiwkkgjAN8Zx
Malware Config
Extracted
gozi
Extracted
gozi
999
config.edge.skype.com
146.70.35.138
146.70.35.142
-
base_path
/phpadmin/
-
build
250227
-
exe_type
loader
-
extension
.src
-
server_id
50
Signatures
-
Gozi family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1032 wrote to memory of 2424 1032 rundll32.exe 28 PID 1032 wrote to memory of 2424 1032 rundll32.exe 28 PID 1032 wrote to memory of 2424 1032 rundll32.exe 28 PID 1032 wrote to memory of 2424 1032 rundll32.exe 28 PID 1032 wrote to memory of 2424 1032 rundll32.exe 28 PID 1032 wrote to memory of 2424 1032 rundll32.exe 28 PID 1032 wrote to memory of 2424 1032 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3757177adb81f775e66db6e74e9fee00489d5cb33071b1a7e503dfa3c0ba2576.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3757177adb81f775e66db6e74e9fee00489d5cb33071b1a7e503dfa3c0ba2576.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2424
-