Analysis

  • max time kernel
    144s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    10-06-2021 14:23

General

  • Target

    decree 06.21.doc

  • Size

    45KB

  • MD5

    46e887ac0d356a30dc8a9971d9486dbe

  • SHA1

    60468618a0e2e4d815af07e8652fba0437ddc5e6

  • SHA256

    83439db58d913186b422724bea2ed8d674956e8f1c2b3f00dc6c8b91d60ffdba

  • SHA512

    83a59a9afb67d5e4f9f49938df7a496839cda47d425b74405052ddc864a480efb4dfd0a55847e5dbe866762cc9f10210fa23cd5a8a40a06b2a0b002fff916d63

Malware Config

Extracted

Family

gozi_ifsb

Botnet

6000

C2

authd.feronok.com

app.bighomegl.at

Attributes
  • build

    250204

  • exe_type

    loader

  • server_id

    580

rsa_pubkey.base64
serpent.plain

Signatures

  • Gozi, Gozi IFSB

    Gozi ISFB is a well-known and widely distributed banking trojan.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Loads dropped DLL 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 24 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\decree 06.21.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1888
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe" c:\programdata\beforeObj.hta
      2⤵
      • Process spawned unexpected child process
      PID:2028
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:552
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1820
      • C:\Windows\SysWOW64\mshta.exe
        "C:\Windows\SysWOW64\mshta.exe" "C:\ProgramData\beforeObj.hta"
        2⤵
        • Blocklisted process makes network request
        • Modifies Internet Explorer settings
        • Suspicious use of WriteProcessMemory
        PID:1832
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\System32\regsvr32.exe" c:\users\public\beforeObj.jpg
          3⤵
          • Loads dropped DLL
          PID:1640
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1744
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1744 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1624
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1668
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1668 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1180

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\beforeObj.hta
      MD5

      bb28452e52cf940a7cd3d3ab386bfd81

      SHA1

      6784811a716bdeb1871296b256847b7ec4aec26a

      SHA256

      79a5b5ed478100c39eda1c4c32280296d585991d2ab0722bf69be0460f3136cc

      SHA512

      45f512467a70da4afc118f5a1348980026ea668cf488b13578544f18e4719d92186c111c43ba565ebee50b2d117939d2a6199bc1fb1f57ceb321aeddb9ed2179

    • \??\c:\users\public\beforeObj.jpg
      MD5

      ac96eacfbae61a8fcf57eaf2cd106f1e

      SHA1

      ea2ecda37757a808cb162e7388bfe22c0329bc2e

      SHA256

      6bd5b6695804be9d0b8688fd7b9a0195fb981553e47e34c8f4c4d6b2434a5923

      SHA512

      7f164d39ec17933763cc928690c3fdf44b83abfa114f9700f804be8dd4a4e52c5133201941052e5293f22be58cca69d5c3d83f7245d5a6e95d66fb683fab211d

    • \Users\Public\beforeObj.jpg
      MD5

      ac96eacfbae61a8fcf57eaf2cd106f1e

      SHA1

      ea2ecda37757a808cb162e7388bfe22c0329bc2e

      SHA256

      6bd5b6695804be9d0b8688fd7b9a0195fb981553e47e34c8f4c4d6b2434a5923

      SHA512

      7f164d39ec17933763cc928690c3fdf44b83abfa114f9700f804be8dd4a4e52c5133201941052e5293f22be58cca69d5c3d83f7245d5a6e95d66fb683fab211d

    • memory/552-67-0x0000000000000000-mapping.dmp
    • memory/1180-81-0x0000000000800000-0x0000000000802000-memory.dmp
      Filesize

      8KB

    • memory/1180-79-0x0000000000000000-mapping.dmp
    • memory/1624-77-0x0000000000000000-mapping.dmp
    • memory/1640-71-0x0000000075161000-0x0000000075163000-memory.dmp
      Filesize

      8KB

    • memory/1640-70-0x0000000000000000-mapping.dmp
    • memory/1640-75-0x000000006AAB0000-0x000000006AB5F000-memory.dmp
      Filesize

      700KB

    • memory/1640-74-0x000000006AAB0000-0x000000006AABD000-memory.dmp
      Filesize

      52KB

    • memory/1640-76-0x00000000000C0000-0x00000000000C1000-memory.dmp
      Filesize

      4KB

    • memory/1832-69-0x0000000003470000-0x00000000035CC000-memory.dmp
      Filesize

      1.4MB

    • memory/1832-66-0x0000000000000000-mapping.dmp
    • memory/1888-59-0x0000000072121000-0x0000000072124000-memory.dmp
      Filesize

      12KB

    • memory/1888-78-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1888-61-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1888-60-0x000000006FBA1000-0x000000006FBA3000-memory.dmp
      Filesize

      8KB

    • memory/2028-63-0x000007FEFB571000-0x000007FEFB573000-memory.dmp
      Filesize

      8KB

    • memory/2028-62-0x0000000000000000-mapping.dmp