Analysis

  • max time kernel
    132s
  • max time network
    132s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    05-01-2021 22:49

General

  • Target

    plaukbp.dll

  • Size

    704KB

  • MD5

    f349a2c12a3114f0e60aae0f48d704d9

  • SHA1

    560ccc4002e62179709d3493aa12fb2b5110def3

  • SHA256

    ee683452d552bcc84964b3fbdfcfebcc281978115aa26a1413ae730a2c5032b1

  • SHA512

    0d4d806d81a7e9dd873fd4ab3a03dcb8a191a821aee68aa923cadfabe4776345cdef37135a7c67be609faaed5418519da82ae5d8d91ffe4785d72865aad6734e

Score
10/10

Malware Config

Signatures

  • Gozi, Gozi IFSB

    Gozi ISFB is a well-known and widely distributed banking trojan.

  • Modifies Internet Explorer settings 1 TTPs 71 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\plaukbp.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4640
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\plaukbp.dll,#1
      2⤵
        PID:4796
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3988
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3988 CREDAT:82945 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1872
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1984
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1984 CREDAT:82945 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4400
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1152
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1152 CREDAT:82945 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1408
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1960
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1960 CREDAT:82945 /prefetch:2
        2⤵
        • Suspicious use of SetWindowsHookEx
        PID:2272

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_BACC6CD2B29F18349081C9FD2343833B
      MD5

      53c9a3b414afa3d2579f625780bfabfe

      SHA1

      36ead707d16cb13cfa485235c15eb3c6a34bda2a

      SHA256

      1d00ea6e61a6584d95f4f0c9e0869ae9a8762906215bcb85b7d21ae1f0d7ce5c

      SHA512

      d6300e42bbf3c90a23cf5bd841611d461e74e560ac71e8c6b66bcef35b8c106d999f6f3a2581b06180e9fd4cc7d535382db0452cf740f7e7b3c6431f5c95bce7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\72BA427A91F50409B9EAC87F2B59B951_771D63D2BF22FBD3F874CC100340041C
      MD5

      8b5a1841ec6a9b3ded29272bc5e88a4c

      SHA1

      c5ce8fee863f1f0939014c34656ca6751b5b5378

      SHA256

      94bb3e6699a35698af435a9bd6b83cc45b48e241f9eac6686a4f8894e7d72d35

      SHA512

      55d0b79658ad7b123420f119dbf58469155da953f160073693fe748ea3055399d26d7a199a3295a35a874e24ec1d3f5d004cbd0d19903cb156b12fcc63ea993d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_BACC6CD2B29F18349081C9FD2343833B
      MD5

      17c9a68bd37d39e8a5770b97350273db

      SHA1

      6a5c512357f960bd5d96f672c81b40534389bcb1

      SHA256

      5cd6fc15bf0778d52784871dec55ed94307c984ab47a9bfffd4f474b31df15a1

      SHA512

      a233f973502e840b28fa3f62e51c4c0b2c2f35c042438ae534ce2c118aa9fc8680619103ad555c70fa79a7f76ee0cb14891f94a21054921db925518c940e4e9e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\72BA427A91F50409B9EAC87F2B59B951_771D63D2BF22FBD3F874CC100340041C
      MD5

      cecbae88b34860bf347706d9cbc863db

      SHA1

      120ed0b5b85ae6f1cedccc4527ccb20fa3ef7513

      SHA256

      dfec3f29f4e43ae4372696c83eb98aa145ce05a4cc23402b4f6ec6582c818984

      SHA512

      800b580dcfac494e88f403f3ee037643ee30c642542e5d5e8c31dfcfb9795361a6f73e5d9555399f475da219de2b4eb5bef659257f2a8ddebaa99e2dd6212285

    • memory/1408-10-0x0000000000000000-mapping.dmp
    • memory/1872-4-0x0000000000000000-mapping.dmp
    • memory/2272-11-0x0000000000000000-mapping.dmp
    • memory/4400-5-0x0000000000000000-mapping.dmp
    • memory/4796-2-0x0000000000000000-mapping.dmp
    • memory/4796-3-0x0000000010000000-0x0000000010010000-memory.dmp
      Filesize

      64KB