Analysis
-
max time kernel
75s -
max time network
54s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
02-07-2021 07:24
Static task
static1
Behavioral task
behavioral1
Sample
spoolres.dll
Resource
win7v20210410
0 signatures
0 seconds
General
-
Target
spoolres.dll
-
Size
937KB
-
MD5
7c78fb4fa292f9345bc49677d95040b5
-
SHA1
39212550527cb1605279d5a0aa6362ca21afea55
-
SHA256
f068defa1da6d30ce649b2eb04468987fb9e055cab5cc3389112014cb5a74e59
-
SHA512
7aaa27d5632bb8bf62a18bc6782eff2d330042feeb613e0c8d2b296459f38bcc66321f3ea6edd109455479de60d1c89142913830c72e33284ffddd93b834794f
Malware Config
Extracted
Family
gozi_ifsb
Botnet
4500
C2
app3.maintorna.com
chat.billionady.com
app5.folion.xyz
wer.defone.click
Attributes
-
build
250188
-
exe_type
loader
-
server_id
580
rsa_pubkey.plain
aes.plain
Signatures
-
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1916 wrote to memory of 2036 1916 rundll32.exe rundll32.exe PID 1916 wrote to memory of 2036 1916 rundll32.exe rundll32.exe PID 1916 wrote to memory of 2036 1916 rundll32.exe rundll32.exe PID 1916 wrote to memory of 2036 1916 rundll32.exe rundll32.exe PID 1916 wrote to memory of 2036 1916 rundll32.exe rundll32.exe PID 1916 wrote to memory of 2036 1916 rundll32.exe rundll32.exe PID 1916 wrote to memory of 2036 1916 rundll32.exe rundll32.exe PID 2036 wrote to memory of 1336 2036 rundll32.exe cmd.exe PID 2036 wrote to memory of 1336 2036 rundll32.exe cmd.exe PID 2036 wrote to memory of 1336 2036 rundll32.exe cmd.exe PID 2036 wrote to memory of 1336 2036 rundll32.exe cmd.exe PID 2036 wrote to memory of 1968 2036 rundll32.exe cmd.exe PID 2036 wrote to memory of 1968 2036 rundll32.exe cmd.exe PID 2036 wrote to memory of 1968 2036 rundll32.exe cmd.exe PID 2036 wrote to memory of 1968 2036 rundll32.exe cmd.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\spoolres.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\spoolres.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cd Island3⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cd Matter m3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1336-61-0x0000000000000000-mapping.dmp
-
memory/1968-62-0x0000000000000000-mapping.dmp
-
memory/2036-59-0x0000000000000000-mapping.dmp
-
memory/2036-60-0x0000000074FB1000-0x0000000074FB3000-memory.dmpFilesize
8KB
-
memory/2036-64-0x0000000074620000-0x0000000074724000-memory.dmpFilesize
1.0MB
-
memory/2036-63-0x0000000074620000-0x000000007462E000-memory.dmpFilesize
56KB
-
memory/2036-65-0x00000000000C0000-0x00000000000C1000-memory.dmpFilesize
4KB