Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    13-03-2021 12:50

General

  • Target

    nextClear.jpg.dll

  • Size

    563KB

  • MD5

    9d7f1e8c8fca96cc2cbed2c7d1b954ca

  • SHA1

    f086f0be7d9ed6fe64291bf64f456630fb81cb70

  • SHA256

    f87ed79fbb1a2228c97fb59127eade39c4f8218fa28ddd76b50da177d81438e3

  • SHA512

    9f311d61716c0ab2f4dd059505ac8b4def4db90815f422b5f236b8b1c929dabe3d3d5223d834357431f9bd8d5578c179c7f78a131f0428cf0e3a304edc741113

Malware Config

Extracted

Family

gozi_ifsb

Botnet

5500

C2

windows.update.com

shop.microsoft.com

fraloopilo.xyz

paladingrazz.xyz

Attributes
  • build

    250177

  • dga_season

    10

  • exe_type

    loader

  • server_id

    12

rsa_pubkey.base64
serpent.plain

Signatures

  • Gozi, Gozi IFSB

    Gozi ISFB is a well-known and widely distributed banking trojan.

  • Modifies Internet Explorer settings 1 TTPs 52 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\nextClear.jpg.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2604
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\nextClear.jpg.dll
      2⤵
        PID:3788
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3676
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3676 CREDAT:82945 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1344
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2740
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2740 CREDAT:82945 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3412
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2740 CREDAT:82951 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1788

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\WTV3NVJ9.cookie
      MD5

      e37ef730a02b3e6ef303a649809af377

      SHA1

      241101af4841b25b626a593bb2c596ee1d667b91

      SHA256

      5b2043a93c8c289b6d437699f80d03fd9cf6bfc3f95c268ee6c4a54ae85c623a

      SHA512

      49181ad0a04d3d46e36568b0695addbc84263f129d611ce17fb12410da6d6e1a8af19d8c5a0bd3a252399f5a1e7fd4b4a37c2cf8ae1949255b961655327ed7c9

    • memory/1344-5-0x0000000000000000-mapping.dmp
    • memory/1788-8-0x0000000000000000-mapping.dmp
    • memory/3412-6-0x0000000000000000-mapping.dmp
    • memory/3788-2-0x0000000000000000-mapping.dmp
    • memory/3788-3-0x0000000073CC0000-0x0000000073CCF000-memory.dmp
      Filesize

      60KB

    • memory/3788-4-0x0000000002710000-0x0000000002711000-memory.dmp
      Filesize

      4KB