Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
23-08-2021 11:13
Static task
static1
Behavioral task
behavioral1
Sample
6.tar.dll
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
6.tar.dll
-
Size
544KB
-
MD5
ed60097b0bca7f9c4649ba5d5a088fc9
-
SHA1
19b5c95728b212a75adf3e4d2932f411f6c68f9d
-
SHA256
a5540f6dd0f7761dd3f7e52f5e1d25332b99d95cccf63401d202406160948750
-
SHA512
0b505fd6aeea6d2ccab97a5989357985b8bc5081dd2fd7801fb8b7cfd201d4479ad256bf35acf04ad41e9b972a7a6ebd41ba593b083cfdae29f78ebd29d19340
Malware Config
Extracted
Family
gozi_ifsb
Botnet
8877
C2
outlook.com
xaaorunokee.site
taaorunokee.site
Attributes
-
build
250212
-
dga_season
10
-
exe_type
loader
-
server_id
12
rsa_pubkey.plain
serpent.plain
Signatures
-
suricata: ET MALWARE Ursnif Variant CnC Beacon - URI Struct M1 (_2B)
suricata: ET MALWARE Ursnif Variant CnC Beacon - URI Struct M1 (_2B)
-
suricata: ET MALWARE Ursnif Variant CnC Beacon - URI Struct M2 (_2F)
suricata: ET MALWARE Ursnif Variant CnC Beacon - URI Struct M2 (_2F)
-
Blocklisted process makes network request 8 IoCs
Processes:
rundll32.exeflow pid process 15 3236 rundll32.exe 17 3236 rundll32.exe 19 3236 rundll32.exe 21 3236 rundll32.exe 23 3236 rundll32.exe 25 3236 rundll32.exe 27 3236 rundll32.exe 29 3236 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4016 wrote to memory of 3236 4016 rundll32.exe rundll32.exe PID 4016 wrote to memory of 3236 4016 rundll32.exe rundll32.exe PID 4016 wrote to memory of 3236 4016 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6.tar.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6.tar.dll,#12⤵
- Blocklisted process makes network request
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3236-114-0x0000000000000000-mapping.dmp
-
memory/3236-116-0x0000000010000000-0x0000000010124000-memory.dmpFilesize
1.1MB
-
memory/3236-115-0x0000000010000000-0x000000001000F000-memory.dmpFilesize
60KB
-
memory/3236-117-0x00000000029F0000-0x00000000029F1000-memory.dmpFilesize
4KB