Resubmissions
26-10-2021 19:46
211026-yhefzaaahj 10Analysis
-
max time kernel
144s -
max time network
161s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
26-10-2021 19:46
Static task
static1
Behavioral task
behavioral1
Sample
b76097aaa0ca490e5eb6b5a2dd13c5bc.dll
Resource
win7-en-20210920
General
-
Target
b76097aaa0ca490e5eb6b5a2dd13c5bc.dll
-
Size
549KB
-
MD5
b76097aaa0ca490e5eb6b5a2dd13c5bc
-
SHA1
9920ece38424d7902ffb7c28ae1b5c0d33e19aa8
-
SHA256
8f409a0d417462b342281b3f869a397ed4f5b8fd5841d140c8c57e7df39ff4b0
-
SHA512
16457a472ae064ccb3f8dc2e2d3231380c58c607f947a0570ac2a0cb54babbb27f542a778f367bcf81f15715da6378525b0e6e4fc10e2b571051a1bf8e3edb37
Malware Config
Extracted
gozi_ifsb
8899
http://microsoft.com.login/
https://premiumweare.com
https://gloverunomai.com
-
build
260212
-
dga_season
10
-
exe_type
loader
-
server_id
12
Signatures
-
suricata: ET MALWARE Ursnif Variant CnC Beacon - URI Struct M1 (_2B)
suricata: ET MALWARE Ursnif Variant CnC Beacon - URI Struct M1 (_2B)
-
suricata: ET MALWARE Ursnif Variant CnC Beacon - URI Struct M2 (_2F)
suricata: ET MALWARE Ursnif Variant CnC Beacon - URI Struct M2 (_2F)
-
Blocklisted process makes network request 14 IoCs
Processes:
rundll32.exeflow pid process 28 4076 rundll32.exe 29 4076 rundll32.exe 31 4076 rundll32.exe 32 4076 rundll32.exe 33 4076 rundll32.exe 36 4076 rundll32.exe 37 4076 rundll32.exe 38 4076 rundll32.exe 39 4076 rundll32.exe 40 4076 rundll32.exe 42 4076 rundll32.exe 43 4076 rundll32.exe 44 4076 rundll32.exe 45 4076 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4092 wrote to memory of 4076 4092 rundll32.exe rundll32.exe PID 4092 wrote to memory of 4076 4092 rundll32.exe rundll32.exe PID 4092 wrote to memory of 4076 4092 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b76097aaa0ca490e5eb6b5a2dd13c5bc.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b76097aaa0ca490e5eb6b5a2dd13c5bc.dll,#12⤵
- Blocklisted process makes network request
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4076-115-0x0000000000000000-mapping.dmp
-
memory/4076-116-0x0000000074010000-0x00000000740AB000-memory.dmpFilesize
620KB
-
memory/4076-117-0x0000000074010000-0x000000007401F000-memory.dmpFilesize
60KB
-
memory/4076-118-0x0000000074010000-0x00000000740AB000-memory.dmpFilesize
620KB
-
memory/4076-119-0x0000000002D60000-0x0000000002D61000-memory.dmpFilesize
4KB