Analysis
-
max time kernel
134s -
max time network
152s -
platform
windows10_x64 -
resource
win10-en -
submitted
20-09-2021 08:33
Static task
static1
Behavioral task
behavioral1
Sample
6.tar.dll
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
6.tar.dll
-
Size
392KB
-
MD5
9a024750ca83441f6a1eb0357207f832
-
SHA1
98451fe991746d4fb0ecade9a0bd318ba4eb9b6a
-
SHA256
2e5118d15a18ae852bf94d91707ff634d9d8354fef492f5c4e1c46b9cf96184c
-
SHA512
ef98bac4edbe11e4710d76774c692f8a9cae52048e49cfb73db74291a408edf93ef5cb5c5eb55e6f9ba51ee10820d2bd560aed917a4eafef9f29ee4d8d0e2d69
Malware Config
Extracted
Family
gozi_ifsb
Botnet
8877
C2
outlook.com
jkdoiloooooo1.nl
nkdlooooalksloooo.nl
Attributes
-
build
250212
-
dga_season
10
-
exe_type
loader
-
server_id
12
rsa_pubkey.plain
serpent.plain
Signatures
-
suricata: ET MALWARE Ursnif Variant CnC Beacon - URI Struct M1 (_2B)
suricata: ET MALWARE Ursnif Variant CnC Beacon - URI Struct M1 (_2B)
-
Blocklisted process makes network request 9 IoCs
Processes:
rundll32.exeflow pid process 21 4656 rundll32.exe 23 4656 rundll32.exe 25 4656 rundll32.exe 27 4656 rundll32.exe 29 4656 rundll32.exe 31 4656 rundll32.exe 33 4656 rundll32.exe 35 4656 rundll32.exe 36 4656 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4640 wrote to memory of 4656 4640 rundll32.exe rundll32.exe PID 4640 wrote to memory of 4656 4640 rundll32.exe rundll32.exe PID 4640 wrote to memory of 4656 4640 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6.tar.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6.tar.dll,#12⤵
- Blocklisted process makes network request
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4656-115-0x0000000000000000-mapping.dmp
-
memory/4656-117-0x0000000010000000-0x0000000010076000-memory.dmpFilesize
472KB
-
memory/4656-116-0x0000000010000000-0x000000001000F000-memory.dmpFilesize
60KB
-
memory/4656-118-0x0000000003370000-0x00000000034BA000-memory.dmpFilesize
1.3MB