Analysis
-
max time kernel
122s -
max time network
155s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
11-06-2021 19:00
Static task
static1
Behavioral task
behavioral1
Sample
9d3a7a1f655bdc0714e010f31ad4c6cc.ttf.dll
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
9d3a7a1f655bdc0714e010f31ad4c6cc.ttf.dll
-
Size
374KB
-
MD5
9d3a7a1f655bdc0714e010f31ad4c6cc
-
SHA1
5115f00d59147a3113fab9402daeb34ffe71ae39
-
SHA256
20587442b6c5c5289058461103db705d04b69ee7e5c14d6a3089348c19bc0de7
-
SHA512
65a17e759ff8b47c01e24a0eec98c6d4bcea0001613c6214a3b1f015437f2998810aef349190fcaaf75cc692e8877c1fa3901b5d69838468c1cb416ee64c4b21
Malware Config
Extracted
Family
gozi_ifsb
Botnet
4500
C2
authd.feronok.com
app.bighomegl.at
Attributes
-
build
250204
-
exe_type
loader
-
server_id
580
rsa_pubkey.base64
serpent.plain
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1924 wrote to memory of 1236 1924 rundll32.exe rundll32.exe PID 1924 wrote to memory of 1236 1924 rundll32.exe rundll32.exe PID 1924 wrote to memory of 1236 1924 rundll32.exe rundll32.exe PID 1924 wrote to memory of 1236 1924 rundll32.exe rundll32.exe PID 1924 wrote to memory of 1236 1924 rundll32.exe rundll32.exe PID 1924 wrote to memory of 1236 1924 rundll32.exe rundll32.exe PID 1924 wrote to memory of 1236 1924 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9d3a7a1f655bdc0714e010f31ad4c6cc.ttf.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9d3a7a1f655bdc0714e010f31ad4c6cc.ttf.dll,#12⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1236-60-0x0000000000000000-mapping.dmp
-
memory/1236-61-0x0000000076691000-0x0000000076693000-memory.dmpFilesize
8KB
-
memory/1236-63-0x0000000074CC0000-0x0000000074D65000-memory.dmpFilesize
660KB
-
memory/1236-62-0x0000000074CC0000-0x0000000074CCD000-memory.dmpFilesize
52KB
-
memory/1236-64-0x0000000000120000-0x0000000000121000-memory.dmpFilesize
4KB