Analysis

  • max time kernel
    127s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    24-12-2020 01:21

General

  • Target

    DSC_Canon_23.12.2020.zip.exe

  • Size

    255KB

  • MD5

    1900f3bd2b1848b0f4b1a0495f11d84e

  • SHA1

    38de4f6bbd82ee58259d39db4cbb14c505837b88

  • SHA256

    dddf5829a3bdcb2b6562eb194a138f8de5da26eb5dda0bbfacbbf1124ad51ec6

  • SHA512

    d16dbd03da41abc45247f9c7c00a1d363e13949c0203077806996d17982788207318ffd7c5e5a835cb3eddfff556843a34baef93c8547e4001cc2fc017e3b60a

Score
10/10

Malware Config

Signatures

  • Gozi, Gozi IFSB

    Gozi ISFB is a well-known and widely distributed banking trojan.

  • Modifies Internet Explorer settings 1 TTPs 118 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DSC_Canon_23.12.2020.zip.exe
    "C:\Users\Admin\AppData\Local\Temp\DSC_Canon_23.12.2020.zip.exe"
    1⤵
      PID:1944
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1720
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1720 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1148
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1688
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1688 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1112
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1200
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1200 CREDAT:275457 /prefetch:2
        2⤵
        • Suspicious use of SetWindowsHookEx
        PID:328
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1828
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1828 CREDAT:275457 /prefetch:2
        2⤵
        • Suspicious use of SetWindowsHookEx
        PID:1376

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\w5ukms8\imagestore.dat
      MD5

      b35e5bd9ce806488cf0b0540d527e8b0

      SHA1

      fcd080851101676181ad087a8a01745de8bb22b6

      SHA256

      c4aa9ec70c9df41a960b8400cabbc95961e38cc28c62d3287cfcca2a1ba6e2d7

      SHA512

      ec40ae4a5608e198bb0b15d7af9a7bb19e40de3ab9688844bb05ac3dc8aadab4f5be9b4f81fde07b80dbd3aa0332d0062da556f828b40c2c1dccb35bcc800990

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\w5ukms8\imagestore.dat
      MD5

      1f8025ed8b62526ae17e30c35e05fedf

      SHA1

      4adc9b85f69942971832a618fb96552948abb2e3

      SHA256

      c0d900828727b9fa025dab2bd3338110d5bd9d495db23a78112d888828e0d5ff

      SHA512

      7753aa69859437964945cf8a29e14a72aba11a3d7225f9b9dc1ce5c0d3053acdd1c508b62c5781416294638509eb9e40307d281fd486b7502786bbb3f78cf894

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\w5ukms8\imagestore.dat
      MD5

      1f8025ed8b62526ae17e30c35e05fedf

      SHA1

      4adc9b85f69942971832a618fb96552948abb2e3

      SHA256

      c0d900828727b9fa025dab2bd3338110d5bd9d495db23a78112d888828e0d5ff

      SHA512

      7753aa69859437964945cf8a29e14a72aba11a3d7225f9b9dc1ce5c0d3053acdd1c508b62c5781416294638509eb9e40307d281fd486b7502786bbb3f78cf894

    • memory/328-13-0x0000000000000000-mapping.dmp
    • memory/1112-11-0x0000000000000000-mapping.dmp
    • memory/1148-10-0x0000000000000000-mapping.dmp
    • memory/1376-15-0x0000000000000000-mapping.dmp
    • memory/1804-9-0x000007FEF7430000-0x000007FEF76AA000-memory.dmp
      Filesize

      2.5MB

    • memory/1944-2-0x00000000052F9000-0x00000000052FA000-memory.dmp
      Filesize

      4KB

    • memory/1944-3-0x00000000053E0000-0x00000000053F1000-memory.dmp
      Filesize

      68KB