Analysis

  • max time kernel
    137s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    16-12-2020 12:14

General

  • Target

    ph0t0.jpg.dll

  • Size

    160KB

  • MD5

    49fc40f6d58c4f97a38283cd530bf3bb

  • SHA1

    03a0799b99bef6cabb8e4c704cc1dded20ff6590

  • SHA256

    4d36701a7ece574dda56feaca4b70d9ee395ccf6c6522142028120b62324efc8

  • SHA512

    ebba44ce0c524d15a831ac5b02bd23a9eb6635c9e8f51df507dd8fa80035fe833c4935fd6ad2c7f20a8a71f88a728c377f9e93e6d99fa89f698773d7697d675c

Score
10/10

Malware Config

Signatures

  • Gozi, Gozi IFSB

    Gozi ISFB is a well-known and widely distributed banking trojan.

  • Modifies Internet Explorer settings 1 TTPs 83 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\ph0t0.jpg.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:748
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\ph0t0.jpg.dll
      2⤵
        PID:2004
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:608
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:608 CREDAT:275457 /prefetch:2
        2⤵
        • Suspicious use of SetWindowsHookEx
        PID:1012
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:800
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:800 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1120
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:328
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:328 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:552

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\G4DQYRA5.txt
      MD5

      0cd2e1df2a20ab338c5c6cd55d33522e

      SHA1

      1277ed7509705817819ddc76dd06059b54cc920b

      SHA256

      e21ad7b6842458ba81908921fc9c780c9c730e93d9ee297f1a151ee5a8b981e3

      SHA512

      dc36b52ef3d41328b93a582a00d62d26221c5e38bbef456eb352174defd0d70db5600440e38b6073f3880f3d29516b7866388238d052440dcd0fbf10890ff62e

    • memory/552-7-0x0000000000000000-mapping.dmp
    • memory/1012-4-0x0000000000000000-mapping.dmp
    • memory/1012-5-0x0000000005C30000-0x0000000005C53000-memory.dmp
      Filesize

      140KB

    • memory/1120-6-0x0000000000000000-mapping.dmp
    • memory/1760-3-0x000007FEF6350000-0x000007FEF65CA000-memory.dmp
      Filesize

      2.5MB

    • memory/2004-2-0x0000000000000000-mapping.dmp