Analysis
-
max time kernel
126s -
max time network
128s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
05-02-2021 14:10
Static task
static1
Behavioral task
behavioral1
Sample
ioir.png.dll
Resource
win7v20201028
General
-
Target
ioir.png.dll
-
Size
539KB
-
MD5
d31c0491f522d6b9f2102109bd2420af
-
SHA1
dc1cccf0e43ec5a68326ae4faf1a8cbc5ac00708
-
SHA256
f7c79c0c3feb7c0032424f5f6a9bcdf78d1815ee53f807cc192c2c1f8f21270f
-
SHA512
48d659660654800da4eb3909a06572dfcf5f05ebdfb8629fafdfeab601673e3377d9a3a241f4bd36c3f4f912ac838dbc73926f734bfa8a76ec43fa726b28c3bd
Malware Config
Extracted
gozi_rm3
201193207
https://topitophug.xyz
-
build
300932
-
exe_type
loader
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 17 1916 rundll32.exe -
Processes:
iexplore.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e7c32f603594754399685aba64b76bd10000000002000000000010660000000100002000000049726499e25fde7cd09a2434fc8c2dac7035584c3385bb47de6ec5675d0e8f4c000000000e800000000200002000000057ecb56f9c7c4ec10aed3f8de7eef26cfa93c3dfee0a71667255973613d0957f20000000716fe87d071d492bd100cda6cb39843971e1224dd9d6535a38ac332a1dbd4704400000003399dce9743d500c409e72da9aed90762c65d51ed67a716b6820d8e330aec180cb2ea3b1fe40bd9039f6912b8d3a240898340b766df3fa80277046b1e70cffe5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BE1500B1-67C3-11EB-885E-DA18B1AB4242} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0e8b797d0fbd601 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F3AD7631-67C3-11EB-885E-DA18B1AB4242} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
iexplore.exeiexplore.exepid process 1460 iexplore.exe 1976 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
iexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEpid process 1460 iexplore.exe 1460 iexplore.exe 972 IEXPLORE.EXE 972 IEXPLORE.EXE 1976 iexplore.exe 1976 iexplore.exe 1828 IEXPLORE.EXE 1828 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
rundll32.exeiexplore.exeiexplore.exedescription pid process target process PID 1096 wrote to memory of 1916 1096 rundll32.exe rundll32.exe PID 1096 wrote to memory of 1916 1096 rundll32.exe rundll32.exe PID 1096 wrote to memory of 1916 1096 rundll32.exe rundll32.exe PID 1096 wrote to memory of 1916 1096 rundll32.exe rundll32.exe PID 1096 wrote to memory of 1916 1096 rundll32.exe rundll32.exe PID 1096 wrote to memory of 1916 1096 rundll32.exe rundll32.exe PID 1096 wrote to memory of 1916 1096 rundll32.exe rundll32.exe PID 1460 wrote to memory of 972 1460 iexplore.exe IEXPLORE.EXE PID 1460 wrote to memory of 972 1460 iexplore.exe IEXPLORE.EXE PID 1460 wrote to memory of 972 1460 iexplore.exe IEXPLORE.EXE PID 1460 wrote to memory of 972 1460 iexplore.exe IEXPLORE.EXE PID 1976 wrote to memory of 1828 1976 iexplore.exe IEXPLORE.EXE PID 1976 wrote to memory of 1828 1976 iexplore.exe IEXPLORE.EXE PID 1976 wrote to memory of 1828 1976 iexplore.exe IEXPLORE.EXE PID 1976 wrote to memory of 1828 1976 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ioir.png.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ioir.png.dll,#12⤵
- Blocklisted process makes network request
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1460 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1976 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\61F95D72644321B3AD7A1D512B8D6E8BMD5
9bc7c66842ce55fb615785434a1e4ae2
SHA10841bba8f45cc927201dab1668d7de43c808f3a8
SHA256cdf81a744d87fcc80a9593edceb9103d9eb19ee8023da16b26c17844ffa88eaa
SHA512e85136f1da80428111ce2f626f6e90dff88d11f2de62f461d292104f2807b08ae2c625397d6c889544566c15cd772e1ed45b2fa18d89489140d59b6bb7fc9eba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\644B8874112055B5E195ECB0E8F243A4MD5
0cb6aff7f00ffdce23877e0fd80f88d5
SHA17cb46bde95f4e57c108100dff3786dc9d6169389
SHA256fb6bd4558196dad5d2767534f435159f7ce7d69f8e0bb21d73af02b8778f5ad0
SHA51204bfc5e5430709750613273778c7fc3a5d9eedc618fc60b6db2a55247c3a30609fbb0758f8923e3a84984ecae4903e68ee165f3c8515b8e922b70dceb9f402b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\61F95D72644321B3AD7A1D512B8D6E8BMD5
82ba4e1c91dae0caf0cf8aef6421befd
SHA19fd3d2ca7a3baaec8ea594959113032d746218ae
SHA256760ddd4eed786e3810e01a5f0f523e2e4f46f548d81e8dd0582e40909a7e1e95
SHA512c9b5747ee435b4ebf97eabbe857e266673f9b6c841b22874f2ce8c4631b849b6ffafc4f4d34a4aae6e153c51fef97db9da9504bc4573aa6e6b40d74489fe6066
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\644B8874112055B5E195ECB0E8F243A4MD5
c1e8a97908c354f844c2c6d8f8e576a4
SHA187891109d7a3f9128d8709a5c2d1f2752c0d7458
SHA2561bfb8434f81748eb1cc342547d69421a276e6c65c547cf903c932dbdc660fe22
SHA5129f86739f378f1c1bb93d150c8a53eb3859a162d285086072e029a5ccb532c93c40855ac84977746bb37707a6a967ba9346137cedf7c511c232ba323e61a06a78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
90dd44622f638999528a71a22633e5b3
SHA129beadb2e36a3174279428e9a130ed1676c43f4a
SHA2567c6e4a7cc4d3718a04217c5b620a53f513f089b71c613d726dba437b8b45fe7e
SHA51210d64ec299809b53630cea8c685ceb42e4190a16b3ce2d915fd404a1cd34be0d6234e422eb1d0ee2deb33e755826c6d7c0bf1a77b15117882ca14d3b9440c01d
-
memory/856-9-0x000007FEF7500000-0x000007FEF777A000-memory.dmpFilesize
2.5MB
-
memory/972-10-0x0000000000000000-mapping.dmp
-
memory/1460-8-0x000007FEFBBB1000-0x000007FEFBBB3000-memory.dmpFilesize
8KB
-
memory/1828-11-0x0000000000000000-mapping.dmp
-
memory/1916-2-0x0000000000000000-mapping.dmp
-
memory/1916-7-0x0000000000270000-0x0000000000280000-memory.dmpFilesize
64KB
-
memory/1916-6-0x0000000000290000-0x00000000002A2000-memory.dmpFilesize
72KB
-
memory/1916-4-0x00000000001C0000-0x00000000001C1000-memory.dmpFilesize
4KB
-
memory/1916-5-0x0000000000250000-0x000000000025E000-memory.dmpFilesize
56KB
-
memory/1916-3-0x0000000075301000-0x0000000075303000-memory.dmpFilesize
8KB