Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    03-12-2020 13:08

General

  • Target

    scongiurare.12.01.2020.doc

  • Size

    91KB

  • MD5

    9edc856edd53b45e9c6f84c2e65e1cc7

  • SHA1

    f16bd28f364c678054ea5c73651a668dfd68a5bc

  • SHA256

    4d1c37dac45daec5880750b8499b337e6ccf3696bfd645c4e22f388001e79900

  • SHA512

    1f268c6b48cf7b5771947f2803ffcf8a1156102f1be6c9305e9e18972c48fa68ad2b51ed7d9a3c723a0e48cfbb9b51daf74e9167692199e5027b04ff1c671c76

Score
10/10

Malware Config

Signatures

  • Gozi, Gozi IFSB

    Gozi ISFB is a well-known and widely distributed banking trojan.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 69 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 24 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\scongiurare.12.01.2020.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1204
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:844
    • C:\users\public\ms.com
      C:\users\public\ms.com C:\users\public\ms.html
      1⤵
      • Executes dropped EXE
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:1564
      • C:\Windows\SysWOW64\regsvr32.exe
        "C:\Windows\System32\regsvr32.exe" C:\Users\Admin\AppData\Local\Temp\temp.tmp
        2⤵
        • Loads dropped DLL
        PID:1576
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1920
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1920 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:664
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1712
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1712 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:848

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\temp.tmp
      MD5

      6d7bdc2641419e23d89a1fd659b98d53

      SHA1

      00b905eae0c8b80868c2f0d4355cce0ee63887f9

      SHA256

      2aa0e1e01910526337f940b65fe2c0fee93ac7f564cfb73151ca8cd284c487e1

      SHA512

      c22e94a84d0d8c8f6a4ed2baafabca4dd2b0a4fbeb0056f6ebff9b7fe40dee2ff3c8be07119a9939be018019c250dcb30f8f26d65776040ac37dcb050f69a883

    • C:\Users\Public\ms.com
      MD5

      abdfc692d9fe43e2ba8fe6cb5a8cb95a

      SHA1

      d4f0397f83083e1c6fb0894187cc72aebcf2f34f

      SHA256

      949485ba939953642714ae6831d7dcb261691cac7cbb8c1a9220333801f60820

      SHA512

      c786bfb6a2316e43cb89901fae103157ec6b65117c292dc7570dd4685891b5afbb72064789b74bf55fe012c5936ed6468876e4d2cccdeff71b4abb2d76ff395f

    • C:\users\public\ms.com
      MD5

      abdfc692d9fe43e2ba8fe6cb5a8cb95a

      SHA1

      d4f0397f83083e1c6fb0894187cc72aebcf2f34f

      SHA256

      949485ba939953642714ae6831d7dcb261691cac7cbb8c1a9220333801f60820

      SHA512

      c786bfb6a2316e43cb89901fae103157ec6b65117c292dc7570dd4685891b5afbb72064789b74bf55fe012c5936ed6468876e4d2cccdeff71b4abb2d76ff395f

    • C:\users\public\ms.html
      MD5

      c95ad501989d92e932c8b38d52955a9c

      SHA1

      19223f16652ae22baca91cb4030e7f81aa3efff1

      SHA256

      37ed664d7ba10c77315d7190e5b335e4ca4c46bc7255b76314ad7ab694db6ae0

      SHA512

      13bd20b2b890c8a03e4064da2dbe799f66c8d4fa43b0eb33b6b552155e123c2d39faff4834b4078d8b732f7ba69a8ab338924cf908d55fd5007d630641cb5c85

    • \Users\Admin\AppData\Local\Temp\temp.tmp
      MD5

      6d7bdc2641419e23d89a1fd659b98d53

      SHA1

      00b905eae0c8b80868c2f0d4355cce0ee63887f9

      SHA256

      2aa0e1e01910526337f940b65fe2c0fee93ac7f564cfb73151ca8cd284c487e1

      SHA512

      c22e94a84d0d8c8f6a4ed2baafabca4dd2b0a4fbeb0056f6ebff9b7fe40dee2ff3c8be07119a9939be018019c250dcb30f8f26d65776040ac37dcb050f69a883

    • memory/664-16-0x0000000005D10000-0x0000000005D33000-memory.dmp
      Filesize

      140KB

    • memory/664-15-0x0000000000000000-mapping.dmp
    • memory/844-8-0x0000000000000000-mapping.dmp
    • memory/848-17-0x0000000000000000-mapping.dmp
    • memory/1204-4-0x00000000003B5000-0x00000000003B9000-memory.dmp
      Filesize

      16KB

    • memory/1204-2-0x000000000042A000-0x000000000042D000-memory.dmp
      Filesize

      12KB

    • memory/1204-5-0x00000000003B5000-0x00000000003B9000-memory.dmp
      Filesize

      16KB

    • memory/1204-3-0x00000000003B5000-0x00000000003B9000-memory.dmp
      Filesize

      16KB

    • memory/1368-9-0x000007FEF7510000-0x000007FEF778A000-memory.dmp
      Filesize

      2.5MB

    • memory/1576-11-0x0000000000000000-mapping.dmp