Analysis
-
max time kernel
140s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2024, 03:25
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_ed43c10e69c969e149c61c4e2c6b8250869f4d505fa8f4a5b25367ee67886317.dll
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_ed43c10e69c969e149c61c4e2c6b8250869f4d505fa8f4a5b25367ee67886317.dll
-
Size
625KB
-
MD5
3fde49dd2710595d5ddab09cd252aead
-
SHA1
6661897464fdee7bf65d26fce99c4782ebaa7e5d
-
SHA256
ed43c10e69c969e149c61c4e2c6b8250869f4d505fa8f4a5b25367ee67886317
-
SHA512
76cf585b999a5a2aa004d7a1c2572285c20665b57b91f00ac206782d6953361a8c293146e4759247ccd92dad79bd2c416427aa0e5ed5a264dde78d2d788652ed
-
SSDEEP
12288:+w1lEKREbddtOYRbHzcPwka1dCjc3N8ZrJ:+w1lEKOpuYxiwkkgjAN8ZrJ
Malware Config
Extracted
gozi
Extracted
gozi
999
config.edge.skype.com
146.70.35.138
146.70.35.142
-
base_path
/phpadmin/
-
build
250227
-
exe_type
loader
-
extension
.src
-
server_id
50
Signatures
-
Gozi family
-
Blocklisted process makes network request 2 IoCs
flow pid Process 33 952 rundll32.exe 34 952 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1540 wrote to memory of 952 1540 rundll32.exe 82 PID 1540 wrote to memory of 952 1540 rundll32.exe 82 PID 1540 wrote to memory of 952 1540 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ed43c10e69c969e149c61c4e2c6b8250869f4d505fa8f4a5b25367ee67886317.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ed43c10e69c969e149c61c4e2c6b8250869f4d505fa8f4a5b25367ee67886317.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:952
-