Analysis

  • max time kernel
    137s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    16-12-2020 06:39

General

  • Target

    ph0t0.dll

  • Size

    202KB

  • MD5

    5715725f0d532d84a8c39a08f36814ec

  • SHA1

    8e5068375871b21d1aad30b56362dd5ef38bf334

  • SHA256

    550baac0b4b99acf919e29a691523acb8c1b88277b1d2f2340b2e9dc37f9110a

  • SHA512

    b09ca6b7dff475bcee5bd675e4fac7b9827f067b2859912854fbe6277bd022db4810ece5172f9e3be0ec8ba01126c7b1eafc66fe4f3e362cfa0634a8f57dc18c

Score
10/10

Malware Config

Signatures

  • Gozi, Gozi IFSB

    Gozi ISFB is a well-known and widely distributed banking trojan.

  • Modifies Internet Explorer settings 1 TTPs 81 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\ph0t0.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1080
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\ph0t0.dll
      2⤵
        PID:1324
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1212
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1212 CREDAT:275457 /prefetch:2
        2⤵
        • Suspicious use of SetWindowsHookEx
        PID:932
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1988
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1988 CREDAT:275457 /prefetch:2
        2⤵
        • Suspicious use of SetWindowsHookEx
        PID:1832
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1064
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1064 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:624

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\FJSCSW50.txt
      MD5

      64f22c1d475c4631dbb501b34dc9b106

      SHA1

      d4e3ddad92bad74971a983915be5fd0021fd1540

      SHA256

      ea1042030ef591c0da7059504cb8064fce00a478fccd7018459b26c42a9d1d32

      SHA512

      02288199261cb97153313a2e5821f3f4d17934f3238e4db633e66e99caf110a6017627d7843706cf9d43325ebc2e9fe9fd7483801fbb36afa1f94851b161fe36

    • memory/536-3-0x000007FEF6930000-0x000007FEF6BAA000-memory.dmp
      Filesize

      2.5MB

    • memory/624-7-0x0000000000000000-mapping.dmp
    • memory/932-4-0x0000000000000000-mapping.dmp
    • memory/932-5-0x0000000006250000-0x0000000006273000-memory.dmp
      Filesize

      140KB

    • memory/1324-2-0x0000000000000000-mapping.dmp
    • memory/1832-6-0x0000000000000000-mapping.dmp