Analysis

  • max time kernel
    142s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    03-12-2020 11:52

General

  • Target

    documenti-12.20.doc

  • Size

    92KB

  • MD5

    53915ecbd649a6008ae69c0dcacf591b

  • SHA1

    2711d278e9cf36c4924a69659157d4e7b3b05e06

  • SHA256

    0cdb011bfac8731aa990d921e6a4748a4ec75ec6e62e0f6d0da2c03d00955886

  • SHA512

    d67e429e6f00d60deefe1abb3f13b240dd020b486a09c136e0c0c8ebf1c5802d87c4bb0fc26248de1e069b6c007a6921dc6d3a78d72789b0eecfb078a96b5556

Score
10/10

Malware Config

Signatures

  • Gozi, Gozi IFSB

    Gozi ISFB is a well-known and widely distributed banking trojan.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 69 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 26 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\documenti-12.20.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1408
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1448
    • C:\users\public\ms.com
      C:\users\public\ms.com C:\users\public\ms.html
      1⤵
      • Executes dropped EXE
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:1640
      • C:\Windows\SysWOW64\regsvr32.exe
        "C:\Windows\System32\regsvr32.exe" C:\Users\Admin\AppData\Local\Temp\temp.tmp
        2⤵
        • Loads dropped DLL
        PID:484
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1084
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1084 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:360
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2204
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2260

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\temp.tmp
      MD5

      a7c80246b4dbe1085b435c505a1c6bd1

      SHA1

      a156ffca06b7f42e57bfcecadd1342adcdb44a5d

      SHA256

      eb3d0ac3165028922860c3e8e61e051faed8bf9d884ac96a8a493312aa88fe31

      SHA512

      a1fab85125bfc3c9a26c5df9a303b6fcc0cb338411b4a63a4838523b78e69052c371cac0b6292451a496426f72b605970df5421acd1b6ce98b1638766fcaee5b

    • C:\Users\Public\ms.com
      MD5

      abdfc692d9fe43e2ba8fe6cb5a8cb95a

      SHA1

      d4f0397f83083e1c6fb0894187cc72aebcf2f34f

      SHA256

      949485ba939953642714ae6831d7dcb261691cac7cbb8c1a9220333801f60820

      SHA512

      c786bfb6a2316e43cb89901fae103157ec6b65117c292dc7570dd4685891b5afbb72064789b74bf55fe012c5936ed6468876e4d2cccdeff71b4abb2d76ff395f

    • C:\users\public\ms.com
      MD5

      abdfc692d9fe43e2ba8fe6cb5a8cb95a

      SHA1

      d4f0397f83083e1c6fb0894187cc72aebcf2f34f

      SHA256

      949485ba939953642714ae6831d7dcb261691cac7cbb8c1a9220333801f60820

      SHA512

      c786bfb6a2316e43cb89901fae103157ec6b65117c292dc7570dd4685891b5afbb72064789b74bf55fe012c5936ed6468876e4d2cccdeff71b4abb2d76ff395f

    • C:\users\public\ms.html
      MD5

      3d4c1e100159158e91a1d06c6821a7cc

      SHA1

      cdc3b2a3280c6f7e8a201cb485e85222d15bd2ed

      SHA256

      042b36a012b50fd8073f3d47670dba0cefe36b71a909f6cfdc66b2c5ef4fcdb2

      SHA512

      5adf16e5bb68a114ff66a26b4a5282698968ac2ca51bb0569982408c31bd20801a8693dc8abc01d0b3f10dbf41a7f52eccb3a7911bd98ddc7098be4b707c5af9

    • \Users\Admin\AppData\Local\Temp\temp.tmp
      MD5

      a7c80246b4dbe1085b435c505a1c6bd1

      SHA1

      a156ffca06b7f42e57bfcecadd1342adcdb44a5d

      SHA256

      eb3d0ac3165028922860c3e8e61e051faed8bf9d884ac96a8a493312aa88fe31

      SHA512

      a1fab85125bfc3c9a26c5df9a303b6fcc0cb338411b4a63a4838523b78e69052c371cac0b6292451a496426f72b605970df5421acd1b6ce98b1638766fcaee5b

    • memory/360-16-0x0000000006270000-0x0000000006293000-memory.dmp
      Filesize

      140KB

    • memory/360-15-0x0000000000000000-mapping.dmp
    • memory/484-11-0x0000000000000000-mapping.dmp
    • memory/1408-5-0x00000000004C5000-0x00000000004C9000-memory.dmp
      Filesize

      16KB

    • memory/1408-2-0x0000000004DFB000-0x0000000004E24000-memory.dmp
      Filesize

      164KB

    • memory/1408-4-0x00000000004C5000-0x00000000004C9000-memory.dmp
      Filesize

      16KB

    • memory/1408-3-0x00000000004C5000-0x00000000004C9000-memory.dmp
      Filesize

      16KB

    • memory/1448-8-0x0000000000000000-mapping.dmp
    • memory/1868-9-0x000007FEF6680000-0x000007FEF68FA000-memory.dmp
      Filesize

      2.5MB

    • memory/2260-17-0x0000000000000000-mapping.dmp