Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    18-12-2020 13:12

General

  • Target

    p1cture3.dll

  • Size

    133KB

  • MD5

    363430ba47c7d69f75e9bc90dbbc1d8c

  • SHA1

    47fe41dd67e0245c1ece8fcd2c10c713823db833

  • SHA256

    00af5f13551c5e20fe29ec3d12dca555a56cd1edcd0a8633373872334de485ae

  • SHA512

    4e081eb20aaaa487e9047f29b12b508d62fd77517652088d86e310d7d55492ecc4fb2033778cc0e9ce863ae00f7a36aeefa52a24e1e520897b53f8206abca785

Score
10/10

Malware Config

Signatures

  • Gozi, Gozi IFSB

    Gozi ISFB is a well-known and widely distributed banking trojan.

  • Modifies Internet Explorer settings 1 TTPs 81 IoCs
  • Suspicious use of FindShellTrayWindow 1557 IoCs
  • Suspicious use of SendNotifyMessage 1554 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\p1cture3.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:836
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\p1cture3.dll
      2⤵
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1508
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1388
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1388 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1076
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:576
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:576 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:548
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1784
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1784 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:964

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\4E06HC75.txt
    MD5

    3e3119dbd57cf0abbcef13b3cf1b42cc

    SHA1

    79e5bf6508447d2219baef39de56b3daca8f2d1a

    SHA256

    0aac56538dc9959aab1f21ade784d764dd601824a1740ce4ec2012b979880c19

    SHA512

    2ae515c17b03d524ddb74f954d13a21ef18e8e69f41bdb8f1fd240e4bdc4263138a6aac3c7bd9d30988a7b7a863711e12b2a38c6ceee58fb09117271823328ce

  • memory/412-3-0x000007FEF7C70000-0x000007FEF7EEA000-memory.dmp
    Filesize

    2.5MB

  • memory/548-5-0x0000000000000000-mapping.dmp
  • memory/964-6-0x0000000000000000-mapping.dmp
  • memory/1076-4-0x0000000000000000-mapping.dmp
  • memory/1508-2-0x0000000000000000-mapping.dmp