Analysis
-
max time kernel
65s -
max time network
119s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
02-07-2021 07:24
Static task
static1
Behavioral task
behavioral1
Sample
spoolres.dll
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
spoolres.dll
-
Size
937KB
-
MD5
7c78fb4fa292f9345bc49677d95040b5
-
SHA1
39212550527cb1605279d5a0aa6362ca21afea55
-
SHA256
f068defa1da6d30ce649b2eb04468987fb9e055cab5cc3389112014cb5a74e59
-
SHA512
7aaa27d5632bb8bf62a18bc6782eff2d330042feeb613e0c8d2b296459f38bcc66321f3ea6edd109455479de60d1c89142913830c72e33284ffddd93b834794f
Malware Config
Extracted
Family
gozi_ifsb
Botnet
4500
C2
app3.maintorna.com
chat.billionady.com
app5.folion.xyz
wer.defone.click
Attributes
-
build
250188
-
exe_type
loader
-
server_id
580
rsa_pubkey.plain
aes.plain
Signatures
-
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 740 wrote to memory of 1284 740 rundll32.exe rundll32.exe PID 740 wrote to memory of 1284 740 rundll32.exe rundll32.exe PID 740 wrote to memory of 1284 740 rundll32.exe rundll32.exe PID 1284 wrote to memory of 2976 1284 rundll32.exe cmd.exe PID 1284 wrote to memory of 2976 1284 rundll32.exe cmd.exe PID 1284 wrote to memory of 2976 1284 rundll32.exe cmd.exe PID 1284 wrote to memory of 68 1284 rundll32.exe cmd.exe PID 1284 wrote to memory of 68 1284 rundll32.exe cmd.exe PID 1284 wrote to memory of 68 1284 rundll32.exe cmd.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\spoolres.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\spoolres.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cd Island3⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cd Matter m3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/68-116-0x0000000000000000-mapping.dmp
-
memory/1284-114-0x0000000000000000-mapping.dmp
-
memory/1284-118-0x0000000074350000-0x0000000074454000-memory.dmpFilesize
1.0MB
-
memory/1284-117-0x0000000074350000-0x000000007435E000-memory.dmpFilesize
56KB
-
memory/1284-119-0x00000000001C0000-0x00000000001C1000-memory.dmpFilesize
4KB
-
memory/2976-115-0x0000000000000000-mapping.dmp