Resubmissions

24-08-2021 14:41

210824-gbqdf47416 10

23-08-2021 18:15

210823-78r35g4gms 10

19-12-2020 05:48

201219-8fefrsq5f2 10

Analysis

  • max time kernel
    150s
  • max time network
    15s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    23-08-2021 18:15

General

  • Target

    37e185e2b05b3d448b2096d3b5d104fafce47991e6a7634340c1b28b2bee8028.exe

  • Size

    539KB

  • MD5

    10fda777cc56f004e90a4037e1e2cdcc

  • SHA1

    2827b8e86f8eb6a2f07ed13d7e237eef5420e5e9

  • SHA256

    37e185e2b05b3d448b2096d3b5d104fafce47991e6a7634340c1b28b2bee8028

  • SHA512

    9a9c6af054c8bc6d53e44dcb1650b17409d2229d539272d73b86c001a04f775d78c543361c4d8d53204a4519899ca31a3e4db31e02503e17a561621dc15ff088

Malware Config

Signatures

  • Gozi, Gozi IFSB

    Gozi ISFB is a well-known and widely distributed banking trojan.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\37e185e2b05b3d448b2096d3b5d104fafce47991e6a7634340c1b28b2bee8028.exe
    "C:\Users\Admin\AppData\Local\Temp\37e185e2b05b3d448b2096d3b5d104fafce47991e6a7634340c1b28b2bee8028.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\911A\C88D.bat" "C:\Users\Admin\AppData\Roaming\bididlgs\ctl3prop.exe" "C:\Users\Admin\AppData\Local\Temp\37E185~1.EXE""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1660
      • C:\Windows\SysWOW64\cmd.exe
        cmd /C ""C:\Users\Admin\AppData\Roaming\bididlgs\ctl3prop.exe" "C:\Users\Admin\AppData\Local\Temp\37E185~1.EXE""
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1684
        • C:\Users\Admin\AppData\Roaming\bididlgs\ctl3prop.exe
          "C:\Users\Admin\AppData\Roaming\bididlgs\ctl3prop.exe" "C:\Users\Admin\AppData\Local\Temp\37E185~1.EXE"
          4⤵
          • Executes dropped EXE
          PID:1580

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\911A\C88D.bat

    MD5

    3e1f8dfc8ad1e573743156fd2bd7af64

    SHA1

    50b47d8af0e4da85007e1fca873f9fa9d475fca1

    SHA256

    385c03673b6cbb7cb6b5d545ea2a4ff1f646471d82c27a9a99cb5abf5413caf9

    SHA512

    4f63fb1966f887b1f3dc4995e3a04e8ab26286af33e3cba6891eb3ed6fe0e87aec7637c4281c6005ac924fc89b257ba2b323aef683384cd27329286a3b690516

  • C:\Users\Admin\AppData\Roaming\bididlgs\ctl3prop.exe

    MD5

    10fda777cc56f004e90a4037e1e2cdcc

    SHA1

    2827b8e86f8eb6a2f07ed13d7e237eef5420e5e9

    SHA256

    37e185e2b05b3d448b2096d3b5d104fafce47991e6a7634340c1b28b2bee8028

    SHA512

    9a9c6af054c8bc6d53e44dcb1650b17409d2229d539272d73b86c001a04f775d78c543361c4d8d53204a4519899ca31a3e4db31e02503e17a561621dc15ff088

  • C:\Users\Admin\AppData\Roaming\bididlgs\ctl3prop.exe

    MD5

    10fda777cc56f004e90a4037e1e2cdcc

    SHA1

    2827b8e86f8eb6a2f07ed13d7e237eef5420e5e9

    SHA256

    37e185e2b05b3d448b2096d3b5d104fafce47991e6a7634340c1b28b2bee8028

    SHA512

    9a9c6af054c8bc6d53e44dcb1650b17409d2229d539272d73b86c001a04f775d78c543361c4d8d53204a4519899ca31a3e4db31e02503e17a561621dc15ff088

  • \Users\Admin\AppData\Roaming\bididlgs\ctl3prop.exe

    MD5

    10fda777cc56f004e90a4037e1e2cdcc

    SHA1

    2827b8e86f8eb6a2f07ed13d7e237eef5420e5e9

    SHA256

    37e185e2b05b3d448b2096d3b5d104fafce47991e6a7634340c1b28b2bee8028

    SHA512

    9a9c6af054c8bc6d53e44dcb1650b17409d2229d539272d73b86c001a04f775d78c543361c4d8d53204a4519899ca31a3e4db31e02503e17a561621dc15ff088

  • memory/1580-69-0x0000000000000000-mapping.dmp

  • memory/1660-64-0x0000000000000000-mapping.dmp

  • memory/1684-66-0x0000000000000000-mapping.dmp

  • memory/1944-60-0x00000000760B1000-0x00000000760B3000-memory.dmp

    Filesize

    8KB

  • memory/1944-61-0x0000000000400000-0x0000000000493000-memory.dmp

    Filesize

    588KB

  • memory/1944-63-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB