Analysis

  • max time kernel
    122s
  • max time network
    8s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    14-12-2020 16:38

General

  • Target

    cf49fa463bfe3404408c88335565bde7.exe

  • Size

    933KB

  • MD5

    cf49fa463bfe3404408c88335565bde7

  • SHA1

    14f00190487fa5b351c5ed396b90228138ce01b4

  • SHA256

    9f82497e7c205ee0d312af9eb90340cad637e89240b25addb5a25b290dd3f8c9

  • SHA512

    cea82e4aa3f198977a9f9d63b25d584e42af906a7dc19d05abd6953938ef9fff79101b5e87834f35866f14c2c674f67dc2ddde28f142e6b3224e050cc51000e3

Malware Config

Signatures

  • Gozi, Gozi IFSB

    Gozi ISFB is a well-known and widely distributed banking trojan.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies registry class 30 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf49fa463bfe3404408c88335565bde7.exe
    "C:\Users\Admin\AppData\Local\Temp\cf49fa463bfe3404408c88335565bde7.exe"
    1⤵
    • Adds Run key to start application
    • Modifies registry class
    • NTFS ADS
    • Suspicious use of WriteProcessMemory
    PID:1824
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\B01E\580F.bat" "C:\Users\Admin\AppData\Roaming\apssclnt\chsbmifs.exe" "C:\Users\Admin\AppData\Local\Temp\CF49FA~1.EXE""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1716
      • C:\Windows\SysWOW64\cmd.exe
        cmd /C ""C:\Users\Admin\AppData\Roaming\apssclnt\chsbmifs.exe" "C:\Users\Admin\AppData\Local\Temp\CF49FA~1.EXE""
        3⤵
          PID:1080
        • C:\Windows\SysWOW64\cmd.exe
          cmd /C ""C:\Users\Admin\AppData\Roaming\apssclnt\chsbmifs.exe" "C:\Users\Admin\AppData\Local\Temp\CF49FA~1.EXE""
          3⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:432
          • C:\Users\Admin\AppData\Roaming\apssclnt\chsbmifs.exe
            "C:\Users\Admin\AppData\Roaming\apssclnt\chsbmifs.exe" "C:\Users\Admin\AppData\Local\Temp\CF49FA~1.EXE"
            4⤵
            • Executes dropped EXE
            • NTFS ADS
            PID:764

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\B01E\580F.bat
      MD5

      1536f621491b421b30da20f5895ab255

      SHA1

      03a73ecf0123d1cd12d152f2c20f3cbf1658cac1

      SHA256

      4507a760a731e7e8c31a063fe3bd235788a093524f94dcfc25c6e65f529d7b19

      SHA512

      9d175b9140ee503dd206d0b90f1045c42dd13a4b304e0d109ad95e53a969bbcc88fed39d23348b50440e062871ae2c0e7242def698102dd12ecd433df88022e4

    • C:\Users\Admin\AppData\Roaming\apssclnt\chsbmifs.exe
      MD5

      cf49fa463bfe3404408c88335565bde7

      SHA1

      14f00190487fa5b351c5ed396b90228138ce01b4

      SHA256

      9f82497e7c205ee0d312af9eb90340cad637e89240b25addb5a25b290dd3f8c9

      SHA512

      cea82e4aa3f198977a9f9d63b25d584e42af906a7dc19d05abd6953938ef9fff79101b5e87834f35866f14c2c674f67dc2ddde28f142e6b3224e050cc51000e3

    • C:\Users\Admin\AppData\Roaming\apssclnt\chsbmifs.exe
      MD5

      cf49fa463bfe3404408c88335565bde7

      SHA1

      14f00190487fa5b351c5ed396b90228138ce01b4

      SHA256

      9f82497e7c205ee0d312af9eb90340cad637e89240b25addb5a25b290dd3f8c9

      SHA512

      cea82e4aa3f198977a9f9d63b25d584e42af906a7dc19d05abd6953938ef9fff79101b5e87834f35866f14c2c674f67dc2ddde28f142e6b3224e050cc51000e3

    • \Users\Admin\AppData\Roaming\apssclnt\chsbmifs.exe
      MD5

      cf49fa463bfe3404408c88335565bde7

      SHA1

      14f00190487fa5b351c5ed396b90228138ce01b4

      SHA256

      9f82497e7c205ee0d312af9eb90340cad637e89240b25addb5a25b290dd3f8c9

      SHA512

      cea82e4aa3f198977a9f9d63b25d584e42af906a7dc19d05abd6953938ef9fff79101b5e87834f35866f14c2c674f67dc2ddde28f142e6b3224e050cc51000e3

    • memory/432-5-0x0000000000000000-mapping.dmp
    • memory/764-8-0x0000000000000000-mapping.dmp
    • memory/1080-4-0x0000000000000000-mapping.dmp
    • memory/1716-2-0x0000000000000000-mapping.dmp